WO2017016318A1 - 基于非对称加密算法的可信标签的生成与验证方法及系统 - Google Patents

基于非对称加密算法的可信标签的生成与验证方法及系统 Download PDF

Info

Publication number
WO2017016318A1
WO2017016318A1 PCT/CN2016/084875 CN2016084875W WO2017016318A1 WO 2017016318 A1 WO2017016318 A1 WO 2017016318A1 CN 2016084875 W CN2016084875 W CN 2016084875W WO 2017016318 A1 WO2017016318 A1 WO 2017016318A1
Authority
WO
WIPO (PCT)
Prior art keywords
trusted
label
information
tag
verification
Prior art date
Application number
PCT/CN2016/084875
Other languages
English (en)
French (fr)
Inventor
祝国龙
许田
Original Assignee
祝国龙
许田
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 祝国龙, 许田 filed Critical 祝国龙
Publication of WO2017016318A1 publication Critical patent/WO2017016318A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to the field of cryptography, computer network security and product anti-counterfeiting.
  • the invention provides a method and system for generating and verifying a trusted tag based on an asymmetric encryption algorithm.
  • Asymmetric encryption algorithm is a secret method of key.
  • An asymmetric encryption algorithm requires two keys: a public key and a private key. The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm.
  • the Identity-Based Cryptograph is an asymmetric public key cryptosystem.
  • the concept of identifying passwords was proposed by Shamir in 1984.
  • the main point of view is that no certificate is required in the system, and the user's identity such as name, IP address, email address, mobile phone number, etc. are used as the public key.
  • the user's private key is calculated by the Key Generation Center (KGC) based on the system master key and user ID.
  • KGC Key Generation Center
  • the user's public key is uniquely determined by the user ID so that the user does not need a third party to guarantee the authenticity of the public key.
  • CPK Combined Public Key
  • PKI Public Key Infrastructure
  • PKI Public Key Infrastructure
  • PKI is a universal security infrastructure that implements and provides security services using public key concepts and technologies. It is a key management platform that adheres to established standards. It provides cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications. Simply put, PKI is an infrastructure that provides security services using public key theory and technology. PKI technology is the core of information security technology and the key and basic technology of e-commerce.
  • the PKI technology uses a certificate management public key to bind the user's public key and other identification information of the user through a third-party trusted authority CA (Certificate Authority) to verify the identity of the user on the Internet.
  • CA Certificate Authority
  • the common method is to use a digital certificate based on PKI to encrypt and sign digital information to be transmitted.
  • the confidentiality, authenticity, integrity and non-repudiation of information transmission are guaranteed to ensure the secure transmission of information.
  • PKI is an infrastructure that provides security services for online communication based on public key algorithms and technologies. It is a collection of all software and hardware involved in creating, issuing, managing, and unregistering public key certificates.
  • the core element is the digital certificate
  • the core executive is the CA certification body.
  • a complete PKI system must have an authoritative digital certificate authority (CA), digital certificate store, key backup and recovery system, certificate invalidation system, application interface (API) and other basic components.
  • CA authoritative digital certificate authority
  • API application interface
  • PKI application interface
  • the construction of PKI will also surround these five systems. Come and build.
  • the basic technologies of PKI include encryption, digital signature, data integrity mechanism, digital envelope, dual digital signature and so on.
  • a typical, complete, and effective PKI application system should have at least the following parts:
  • Digital signature also known as public key digital signature, refers to a specific set of symbols or codes attached to an electronic document. It is formed by using mathematical methods and cryptographic algorithms to extract and encrypt key information of the electronic document. Used to identify the identity of the issuer and the issuer's approval of the electronic document, and can be used by the recipient to verify whether the electronic document was tampered with or forged during transmission.
  • the specific process of the digital signature operation is as follows: the sender uses the hash algorithm as a digital digest for the signed electronic file (referred to as the data message in the Electronic Signature Law), and then asymmetrically encrypts the digital digest with the signature private key, that is, the number
  • the signature is followed by adding the above signature and the original text of the electronic document and the public key of the signature certificate to form a signature result, which is sent to the receiving party for verification by the receiving party.
  • the receiver After receiving the data, the receiver first decrypts the digital signature with the sender's public key, derives the digital digest, and performs the same hash algorithm on the original text of the electronic file to obtain a new digital digest, and the hash values of the two digests are performed. The results are compared. If the results are the same, the signature is verified, otherwise the signature is invalid.
  • Digital certificates also known as "digital ID cards” and “digital IDs” are electronic documents that are issued by the Certification Authority and digitally signed by the Certification Authority CA. They contain an information about the public key owner and public key related information. To prove the true identity of the digital certificate holder.
  • the simplest certificate contains a public key, a name, and a digital signature from the certificate authority. In general, the certificate also includes the valid time of the key, the name of the issuing authority (certificate authority), the serial number of the certificate, etc.
  • the format of the certificate conforms to the ITUT X.509 international standard.
  • HASH that is, hash, also known as hash
  • hash is an input of arbitrary length (also called pre-map), which is converted into a fixed-length output by the HASH algorithm.
  • the output is a HASH value (also known as a digital digest).
  • This conversion is a compression map where the space for hashing HASH values is usually much smaller than the input space, and different inputs may produce the same output, but it is not possible to uniquely determine the input value from the hash value.
  • the trusted timestamp is a certificate that can be proved by the authoritative and trusted timestamp service center according to the international timestamp standard "RFC3161".
  • the data message (electronic file) is already present at a point in time, complete, verifiable, and legal.
  • the electronic voucher for effectiveness, the trusted timestamp is mainly used for anti-tampering and post-acquisition of electronic documents to determine the exact time when electronic documents are generated.
  • a trusted timestamp (time-stamp) is an encrypted document file that consists of three parts:
  • X.500 is a directory standard defined by the International Standards Organization (ISO), including a series of directory data services from X.501 to X.509.
  • the protocol used for X.500 client-server communication is DAP (Directory Access Protocol).
  • X.500 plays an important role in PKI. It defines the scheme of data storage and access in the PKI system. It uses standardized methods to complete the storage access of data structures such as certificates and certificate revocation lists in the directory server access portal of the PKI system.
  • LDAP Lightweight Directory Access Protocol
  • DAP Directory Access Protocol
  • the two-dimensional code also known as the two-dimensional bar code, records the data symbol information in a black and white pattern distributed in a plane (two-dimensional direction) by a certain geometric pattern according to a certain rule, and skillfully utilizes the code to compose the internal computer.
  • the concept of the logic-based "0" and "1" bitstreams uses a number of geometric shapes corresponding to binary to represent literal numerical information, which is automatically read by an image input device or an optical scanning device to achieve automatic processing of information. It has some commonalities of bar code technology: each code system has its own specific character set; each character occupies a certain width; it has a certain check function. At the same time, it also has the functions of automatic identification of different lines of information, and processing of graphic rotation changes. Commonly used code systems are: Data Matrix, MaxiCode, Aztec, QR Code, Vericode, PDF417, Ultracode, Code 49, Code 16K, etc.
  • Error correction coding block the data codeword sequence as needed, and generate an error correction codeword according to the error correction level and the block codeword, and add the error correction codeword to the data codeword sequence to become a new one. sequence.
  • the total number of codewords and the number of error correction code words that can be accommodated therein are also determined, for example, version 10, when the error correction level is H, a total of 346 can be accommodated.
  • Codeword of which 224 error correction codewords. That is to say, about 1/3 of the code words in the two-dimensional code area are redundant.
  • RFID Radio Frequency Identification
  • RFID also known as radio frequency identification
  • RFID is a non-contact automatic identification technology. It identifies specific targets by radio signals and reads and writes relevant data without the need for the identification system to have mechanical or optical contact with the target.
  • Each RFID tag has a unique electronic code.
  • NFC Near Field Communication
  • RFID contactless radio frequency identification
  • interoperability technologies combining inductive readers, inductive cards and point-to-point functions on a single chip to identify and data with compatible devices over short distances. exchange.
  • the trusted label described in this patent refers to a graphic label, a digital label or a chip label with limited storage space and carrying tamper-proof and non-repudiation information, and the information carried in the label is signed by an asymmetric encryption technology method.
  • Authentication or encryption processing which can be expressed in two-dimensional code, RFID tag, NFC tag, electronic tag, chip tag, sensor tag, etc.
  • An object of the present invention is to provide a method and system for generating and verifying a trusted label, which aims to solve the problems of poor security, complex implementation, high cost, and poor versatility of the prior art.
  • the invention proposes that the digital certificate can be directly embedded in the trusted label to realize the distribution problem of the certificate, so the verification module can conveniently obtain the digital certificate of the trusted label owner, thereby realizing the tamper-proofing of the label content by using the digital signature.
  • the CA will specify a different validity period when issuing the digital certificate.
  • the digital certificate expires, the CA will no longer guarantee the authenticity of its content information, so the expired digital certificate is invalid and untrustworthy. For some reason, such as the user's private key leakage or the change of the user's identity, the initiative to request the abolition of the original certificate, causing the CA to declare the digital certificate invalid.
  • This patent effectively addresses this shortcoming by introducing a digital timestamp in a trusted label to prove the time at which the trusted label was created. Because the digital signature and the timestamp can ensure the integrity of the information to achieve the purpose of tamper-proof, in the specific implementation scheme, the tamper resistance of the original information of the label, the label identifier and the product identifier, the network address of the verification server, etc. can be digitally
  • the signature and timestamp are implemented simultaneously, or they can be implemented by one of them.
  • the public key and private key of the trusted tag owner can be generated in three ways: 1) The public key and the private key are generated by the Key Generation Center (KGC) of the IBC, which can be used by the trusted tag owner. Identity such as company name, IP address, email address, mobile phone number and other information as public key; 2) The public key and private key are generated by the key generation center of CPK, and the identity of the trusted tag owner can be identified.
  • KGC Key Generation Center
  • the validity of the public key is verified by retrieving whether the public key exists in the public keystore.
  • the trusted tag owner signs the content of the trusted tag by using the private key generated by the above three methods, corresponding parameters, and a signature algorithm. Because the signature obtained by the private key can only be verified by the corresponding public key, thus ensuring the authenticity and non-repudiation of the identity of the owner of the trusted label.
  • this patent proposes a trusted identity timestamp based on a trusted timestamp. Different from traditional trusted timestamps, the trusted identity timestamp adds identity information, which consists of four parts:
  • trusted identity timestamps can be used not only for tamper-proof and post-meeting of electronic files, but also to determine the exact time at which electronic files are generated, and to verify the authenticity of electronic file owners. Therefore, the trusted identity timestamp is not only applicable to trusted tags, but also to other forms of electronic documents, such as electronic contracts, electronic policies, electronic invoices, and the like.
  • label information elements such as tag original information, digital certificate, digital signature, tag identification, product identification, public key information, time stamp, verification
  • the network storage address of the server, etc., or the query information used to query the database instead of the complete content of the tag information element.
  • the entire content of the tag information element is obtained by downloading or querying the database through the network, or directly in the cloud. verification.
  • label information elements such as label original information, digital certificates, digital signatures, label identifiers, product identifiers, public keys
  • the tampering of the content of the information, the timestamp, the network address of the authentication server, etc. can be implemented by the digital signature and the timestamp simultaneously, or by one of the two.
  • the print resolution is lower than the output resolution required for the trusted label graphic. Information is lost. Therefore, in order to prevent the trusted label in the graphic form from being copied, the resolution of the generated trusted label and the printing size may be adjusted, so that the picture of the trusted label obtained by reprinting or copying or the digital information contained therein is different. Therefore, by comparing the picture of the verified label or the included digital information with the saved information of the first printed trusted label, the purpose of the trusted label anti-copying is achieved; and the generated trusted label can also be adjusted.
  • the resolution and the printing size so that the label obtained in the first printing, although the information is lost or the information is wrong, can still be correctly read by the error correction, but is lost by copying the label printed for the first time. More information or introduce more errors, so that the error correction capability of the trusted label is beyond the correct reading, so as to achieve the purpose of the trusted label anti-copying; in order to avoid the copyer from amplifying the trusted label graphic
  • the method avoids the loss of the printed information, and may include the size information of the first printed trusted label in the trusted label, and The dimensions of the digital signature in order to prevent tampering, when the trusted authentication tag, by comparing the current print size to the size information included in the tag label trusted, trusted label purposes of preventing duplication.
  • the present invention discloses a method for generating and verifying a trusted tag based on an asymmetric encryption algorithm, including Next steps:
  • Step 1 Set the original information to a trusted label format
  • Step 2 Set a trusted label encryption protocol module
  • Step 3 Generate an encrypted trusted trusted label according to the original information of the trusted label format and the trusted label encryption protocol module;
  • Step 4 When verifying the trusted label, verify the integrity and non-repudiation of the original information of the trusted label and verify the authenticity and non-repudiation of the identity of the trusted label by verifying the trusted label encryption protocol module;
  • the trusted tag encryption protocol module includes digital certificate information and digital signature information; when the trusted tag encryption protocol module is verified in step four, the authenticity of the trusted tag owner is verified by verifying the validity of the digital certificate information in the trusted tag. Identity, the integrity of the original information of the trusted label is determined by verifying the digital signature information in the trusted label.
  • a method for generating and verifying a trusted tag based on an asymmetric encryption algorithm comprising the following steps:
  • Step 1 Set the original information to a trusted label format
  • Step 2 Set a trusted label encryption protocol module
  • Step 3 Generate an encrypted trusted trusted label according to the original information of the trusted label format and the trusted label encryption protocol module;
  • Step 4 When verifying the trusted label, verify the integrity and non-repudiation of the original information of the trusted label and verify the authenticity and non-repudiation of the identity of the trusted label by verifying the trusted label encryption protocol module;
  • the trusted tag encryption protocol module includes digital certificate information, digital signature information, trusted timestamp or trusted identity timestamp information; when the trusted tag encryption protocol module is verified in step four, the number in the trusted tag is verified Validity of the certificate information Authenticates the identity of the trusted tag owner, determines the integrity of the original information of the trusted tag by verifying the digital signature information in the trusted tag, by verifying the trusted timestamp or trusted identity in the trusted tag The timestamp information information ensures the time at which the trusted tag is generated and the integrity of the content.
  • a method for generating and verifying a trusted tag based on an asymmetric encryption algorithm comprising the following steps:
  • Step 1 Set the original information to a trusted label format
  • Step 2 Set a trusted label encryption protocol module
  • Step 3 Generate an encrypted trusted trusted label according to the original information of the trusted label format and the trusted label encryption protocol module;
  • Step 4 When verifying the trusted label, verify the integrity and non-repudiation of the original information of the trusted label and verify the authenticity and non-repudiation of the identity of the trusted label by verifying the trusted label encryption protocol module;
  • the trusted tag encryption protocol module includes trusted identity timestamp information; when authenticating the trusted tag encryption protocol module, the trusted identity timestamp information in the trusted tag is verified, and the trusted tag generation time and content are ensured. Finish Integrity, as well as the identity of the owner of the authenticated tag.
  • a method for generating and verifying a trusted tag based on an asymmetric encryption algorithm comprising the following steps:
  • Step 1 Set the original information to a trusted label format
  • Step 2 Set a trusted label encryption protocol module
  • Step 3 Generate an encrypted trusted trusted label according to the original information of the trusted label format and the trusted label encryption protocol module;
  • Step 4 When verifying the trusted label, verify the integrity and non-repudiation of the original information of the trusted label and verify the authenticity and non-repudiation of the identity of the trusted label by verifying the trusted label encryption protocol module;
  • the encryption protocol module includes public key information and digital signature information
  • a method for generating and verifying a trusted tag based on an asymmetric encryption algorithm comprising the following steps:
  • Step 1 Set the original information to a trusted label format
  • Step 2 Set a trusted label encryption protocol module
  • Step 3 Generate an encrypted trusted trusted label according to the original information of the trusted label format and the trusted label encryption protocol module;
  • Step 4 When verifying the trusted label, verify the integrity and non-repudiation of the original information of the trusted label and verify the authenticity and non-repudiation of the identity of the trusted label by verifying the trusted label encryption protocol module;
  • the trusted tag encryption protocol module includes public key information, digital signature information, trusted timestamp or trusted identity timestamp information;
  • Non-repudiation ensures trusted tag generation time and content integrity by verifying trusted timestamps or trusted identity timestamp information in trusted tags.
  • the public key information in the trusted tag authenticates the identity of the trusted tag owner according to the following method:
  • the public key information includes public key and parameter information of the verification signature, or includes storage disclosure Network address information of the key information, or query information for querying a database containing public key information;
  • IBC identity generation cryptosystem
  • the public key information includes a public key matrix and a mapping algorithm, or includes storing public key information.
  • the public key information includes a public key or includes network address information storing public key information, or Including the query information used to query the database containing the public key, in order to verify the validity of the public key, you need to query the public keystore in the local or cloud server.
  • the identity of the trusted label owner is considered to be authentic, otherwise it is not trusted;
  • the signature or encryption algorithm may be included in the public key information, or may be stored in Local or cloud;
  • the key information includes digital certificate information, or includes network address information for storing digital certificate information, or query information for querying a database containing digital certificate information, if the digital certificate is verified, and the digital signature verification in the trusted tag is passed The identity of the trusted tag owner is trusted, otherwise it is not trusted.
  • the trusted identity timestamp is an accurate date and time from the authoritative time source by the trusted identity timestamp server, a digital digest generated according to the original information of the trusted tag, and the identity information of the verified trusted tag owner. Generated by digital signature.
  • the trusted label is a graphic label
  • the output resolution image resolution ⁇ image output size
  • the required output resolution is high by adjusting the resolution of the generated trusted label and the printed size of the trusted label.
  • the output resolution of the actual printing device is such that the picture of the trusted label obtained after reprinting or copying or the digital information contained therein is different, thereby comparing whether the picture of the verified label or the included digital information is compared with the saved
  • the information of the first printed trusted label is consistently achieved for the purpose of anti-copying of the trusted label;
  • the trusted tag has error correction capability, you can adjust the graphics resolution of the trusted tag and the printed rule of the trusted tag. Inch, the required output resolution is higher than the output resolution of the actual printing equipment, so each printing will introduce a new printing error, so that the error generated in the first printing does not exceed the error correction level set by the trusted label. Therefore, it can still be successfully corrected and correctly read; however, when copying again by copying the first printed trusted label graphic, more error is introduced and the error correction level set by the trusted label is exceeded. Therefore, the copied trusted label will not be read correctly, thereby achieving anti-copying of the trusted label;
  • the label size information may be included in the label.
  • the graphic label is determined by comparing the actual size of the current graphic label with the nominal size in the label. Whether it is copied and modified.
  • the original information of the trusted label includes a trusted label identifier, which is a unique code for identifying a trusted label;
  • the original information of the trusted label includes a product identifier, which is a unique code for identifying an item;
  • a trusted label can be copied, it is necessary to record the verification event information in the verification module or the background server when each trusted label containing the trusted label identifier is first verified, thereby avoiding the same trusted label being reused.
  • each trusted label is kept secret before the first verification (such as adding an overlay);
  • a trusted label is not reproducible (for example, if the chip label has a unique non-reproducible ID, the information can be used as part of the label identification or label identification to ensure the uniqueness and non-reproducibility of the trusted label). Therefore, a label containing an item identification can be used for anti-counterfeiting of the item, and no confidential treatment of the trusted label is required before the first verification;
  • the tag identifier of a trusted tag is not copyable and the other content of the tag can be overwritten, the tag can be recorded and retrieved in the daemon after the item is used, and then the new item identifier is rewritten for another Anti-counterfeiting of goods, thereby reducing the cost of anti-counterfeiting;
  • the trusted tag can be bound to the item, and the trusted tag is stripped from the item and destroyed when the item is used.
  • the original information of the trusted label may include the effective use time of the label.
  • verifying the trusted label verify that the current time is within the effective use time of the label, if the current time is not within the effective use time of the label. , the trusted label is not trusted.
  • the digital certificate information is displayed in the display module when the verification is passed. Thereby facilitating the certifier to know the identity information of the trusted tag owner and the issuer information of the digital certificate;
  • the time stamp information is included in the trusted label, the time stamp information is displayed in the display module when the verification is passed, thereby facilitating the certifier to know the generation time of the trusted label;
  • the trusted identity timestamp information is displayed when the verification is passed, thereby facilitating the certifier to know the generation time of the trusted label and the identity information of the trusted label owner;
  • the trusted tag described includes at least one of the following:
  • the trusted tag includes a network certificate address of a digital certificate or a digital certificate chain, the digital certificate is downloaded through the network when the trusted tag encryption protocol module is verified;
  • the trusted tag includes information of a digital certificate library or a directory server, download or query a digital certificate through the network when verifying the trusted tag encryption protocol module;
  • the trusted tag contains a network storage address of the public key information
  • the public key information is downloaded through the network when the trusted tag encryption protocol module is verified
  • the digital signature is downloaded over the network when the trusted tag encryption protocol module is verified;
  • the trusted tag includes a network storage address of a trusted timestamp or a trusted identity timestamp
  • the trusted timestamp or trusted identity timestamp is downloaded through the network when the trusted tag encryption protocol module is verified
  • the trusted tag original information includes the identity information of the trusted tag owner
  • the trusted tag may be verified by comparing the identity information in the original information of the trusted tag, the identity information in the digital certificate, Identity information in the identity timestamp to further verify that the identity of the trusted tag owner is authentic;
  • the downloading and verification of the trusted tag information may be performed locally in the verification module or in the cloud;
  • the original information may be in plain text or encrypted
  • the original information described by J. may be the original content of the label, or the HASH value of the original content, or the network storage address of the original content, or the query information for querying the database containing the original content;
  • the trusted tag encryption protocol module may be placed after the terminator;
  • the trusted label is in printed or electronic form
  • the trusted tag described by M. is a two-dimensional code, or a custom pattern, or an RFID tag, or an NFC tag, or an electronic tag, a chip tag, or a sensor tag.
  • a security system for a trusted label comprising an asymmetric key or digital certificate generation center, a trusted label encryption protocol module storage server, a trusted label generation and verification device, and a trusted label verification server, characterized in that: asymmetrically dense a key or digital certificate generation center for generating a digital certificate or an asymmetric key for the trusted tag owner; a trusted tag encryption protocol module storage server for storing the trusted tag encryption protocol module information of the trusted tag owner, Including public key information, or digital certificate information, or digital signature information, or trusted timestamp or trusted identity timestamp information;
  • Trusted tag verification server for recording the verification event of the trusted tag and the detailed information of the anti-counterfeit goods.
  • a verification module for executing a trusted tag to implement cloud verification;
  • Trusted tag generation and verification devices include:
  • the trusted timestamp generating module generates a digital digest according to the trusted tag content, and applies a trusted timestamp to the trusted timestamp server, and inputs the trusted timestamp into the trusted tag generating module;
  • the trusted identity timestamp generating module generates a digital digest according to the trusted tag original information, and applies a trusted identity timestamp to the trusted identity timestamp server, and inputs the trusted identity timestamp into the trusted tag generation Module
  • a tag identification generating module of the trusted tag generating a unique tag identifier for each tag
  • a product identification module for a trusted label that generates a unique product identifier for each item
  • An asymmetric key generation module that generates its own private key and public key for the tag owner
  • a trusted tag generation module based on trusted tag original information, or tag identification, or merchandise identification, or tag expiration date, or public key information, or digital certificate information, or digital signature information, or trusted timestamp, or trusted Identity timestamp information, generating a trusted label;
  • the trusted label reading module extracts the digital certificate information in the verified trusted label and outputs it to the digital certificate verification module; extracts the digital signature in the verified trusted label, and outputs the digital signature to the digital signature verification module; Extracting the trusted timestamp in the verified trusted tag and outputting it to the trusted timestamp verification module; extracting the trusted identity timestamp in the verified trusted tag and outputting it to the trusted identity timestamp verification a module; extracting a tag identifier in the verified trusted tag, and outputting the tag identifier to the tag identifier verification module; extracting the product identifier in the verified trusted tag, and outputting the product identifier to the article identifier verification module;
  • a digital certificate verification module that verifies the authenticity of the identity of the owner of the trusted tag by verifying the digital certificate information
  • a digital signature verification module that verifies the digital signature to confirm the integrity of the content of the trusted label
  • a trusted timestamp verification module that verifies the integrity of the trusted tag content and the generation time of the trusted tag
  • a trusted identity timestamp verification module that verifies that the trusted identity timestamp confirms the integrity of the trusted tag content, the generation time of the trusted tag, and the authenticity of the identity of the trusted tag owner;
  • the tag identification verification module of the trusted tag queries whether the tag identifier of the local or trusted tag verification server has a verification record. If it is the first verification, the information of the verification event is recorded on the local or the verification server, otherwise the information is returned.
  • Existing verification event information
  • the commodity identification verification module of the trusted label records the current verification event information of the commodity identifier on the local or trusted label verification server, and returns the existing verification event information;
  • the trusted label verification result display module displays the digital certificate information after the verification is passed, or the trusted label generation time, or the corresponding verification event information and commodity information.
  • the storage server is an X.500 directory server, or an LDAP directory server, or Web server, or FTP server, or DNS server, or cloud storage server;
  • the trusted label verification server is a data server having a record of a trusted label verification event, a commodity purchase event, and a commodity detailed information;
  • the trusted tag verification server may execute a trusted tag verification module (including a digital certificate verification module, or a digital signature verification module, or a trusted timestamp verification module, or a trusted identity timestamp verification module, or a tag identification verification module, or an item) Identify the verification module, etc.) to implement cloud verification of trusted tags.
  • a trusted tag verification module including a digital certificate verification module, or a digital signature verification module, or a trusted timestamp verification module, or a trusted identity timestamp verification module, or a tag identification verification module, or an item
  • the present invention has the following advantages and beneficial effects:
  • the trusted tag generated by the invention can conveniently distribute the digital certificate of the trusted tag owner and can realize offline verification;
  • the present invention effectively extends the lifespan of the trusted label by using the time stamp. Even if the digital certificate of the trusted label owner has expired, the trusted label produced before the certificate is invalid can still be used;
  • the invention embeds the trusted identity timestamp information in the trusted label, which not only ensures the integrity and non-repudiation of the trusted label, but also ensures the authenticity of the identity of the trusted label owner. Therefore, the trusted tag owner does not have to apply for a digital certificate in order to generate a trusted tag, thereby reducing costs. And can also support offline verification of trusted tags;
  • the present invention replaces the digital certificate with an identification-based key, thereby eliminating the expense of applying for and maintaining the digital certificate;
  • the present invention adds a unique trusted tag identifier to the trusted tag, thereby preventing the same trusted tag from being reused;
  • the present invention adds a unique product identification to the trusted label and ensures that the same product identification is used on the same item, thereby achieving multiple security verification of the same item;
  • the present invention can reduce the cost of anti-counterfeiting by recycling non-reproducible trusted tags
  • the present invention adds the validity period of the trusted label to the trusted label, thereby making the trusted label time-sensitive;
  • the present invention can display digital certificate information, trusted tag generation time information, and identity information of the trusted tag owner in the trusted tag verification result display module, the first verification time of the product, the production and logistics of the commodity, and the like. Traceability information;
  • the present invention replaces the tag information element by using a network storage address of a tag information element (such as tag original information, digital certificate, digital signature, tag identification, product identification, public key information, etc.) or query information for querying a database.
  • a tag information element such as tag original information, digital certificate, digital signature, tag identification, product identification, public key information, etc.
  • query information for querying a database for querying a database.
  • the present invention adjusts the resolution of the generated graphical trusted label and the size of the output graphic, so that the picture of the trusted label obtained by reprinting or copying or the digital information contained therein is obtained by the first printing.
  • the trusted label is different, or the trusted label of the first printing can be correctly read and the copied trusted label cannot be read, so as to achieve the purpose of graphic trusted label anti-copying; and in the trusted label Contains the size information of the graphic label to prevent the graphic of the trusted label from being enlarged and copied.
  • the present invention embeds the digital certificate of the tag owner directly in generating the trusted tag in the generated generation and verification method and system.
  • Trusted tags not only solve the problem of certificate distribution, but also enable offline verification of trusted tags.
  • the trusted label In order to enable the trusted label to contain more original information, only part of the digital certificate content, or the network storage address of the digital certificate, or the query information for querying the digital certificate database may be embedded, thereby realizing the distribution of the digital certificate.
  • the present invention introduces a trusted timestamp in the generation and verification method and system, and ensures the trusted label against tampering and after-meeting, and also determines The exact time when a trusted label was created. Therefore, when the digital certificate has expired or expired, it can be verified whether the trusted label is still authentic according to the creation time of the trusted label. For example, although the digital certificate has expired, but the trusted label was generated during the validity period of the digital certificate, the trusted label is still trusted.
  • the trusted identity timestamp is issued after the authoritative timestamp service center verifies the identity of the applicant. Therefore, the trusted identity timestamp is a complete, verifiable, legally valid electronic voucher that proves that the electronic file is verified by the applicant at a point in time.
  • a trusted tag owner applies for a trusted identity timestamp, it can still generate a trusted trusted tag without a digital certificate.
  • the present invention uses the public key information of the label owner to replace the digital certificate information when generating a trusted label in the generated generation and verification method and system. That is, the public key information, or the network storage address of the public key information, or the query information for querying the database containing the public key information is directly embedded in the trusted tag. Verify the validity of the public key by verifying the public key or the identity in the signature, or by retrieving whether the public key exists in the local or cloud public keystore, and verifying the identity information of the trusted tag owner.
  • a unique tag identifier is added to each trusted tag, and the first verification event is recorded on the verification server, including Verify the time of the event, the IP address of the verifier, the geographic location of the verifier, and so on.
  • the present invention In order to realize multiple anti-counterfeiting verification of the same product, the present invention generates the same product identifier for a plurality of trusted labels used on the same item in the generated and verified method and system, and the product identifier is the piece Unique to the product.
  • the label identifier of the trusted label is not reproducible (for example, the RFID has a unique electronic code that cannot be modified)
  • the code can be used. Work The identification of the letter label or a part of the trusted label identifier, after the product is sold, the trusted label can be used again after the database of the verification server is recovered and modified, thereby achieving recycling.
  • the trusted label has a certain timeliness.
  • the validity period information is added to the trusted label, thereby ensuring that the trusted label can only be in the validity period. Verification passed.
  • the identity information of the owner of the trusted tag In order to facilitate the use of the trusted tag by the verifier, in the generated generation and verification method and system, the identity information of the owner of the trusted tag, the digital certificate information, the trusted tag generation time, and the first verification time of the product, Detailed information on the production and logistics of the product is displayed in the verification module to ensure that the trusted label certifier has detailed information about the trusted label and the product.
  • the present invention replaces the complete content of the tag information element by using a network storage address of a tag information element (such as tag original information, digital certificate, digital signature, tag identification, product identification, public key information, etc.) or query information for querying the database.
  • a tag information element such as tag original information, digital certificate, digital signature, tag identification, product identification, public key information, etc.
  • query information for querying the database.
  • the present invention can adjust the resolution and the printing size of the generated trusted label, so that the picture of the trusted label obtained by reprinting or copying or the digital information contained therein is different. Therefore, by comparing the picture of the verified label or the included digital information with the saved information of the first printed trusted label, the purpose of the trusted label anti-copying is achieved; and the generated trusted label can also be adjusted.
  • the resolution and the printing size make the label obtained in the first printing, although the information is lost or the information is wrong, but can still be correctly read by error correction, but lost by copying the label printed for the first time.
  • the size information of the first printed trusted label can be included in the trusted label, and The size of the digitally signed to prevent tampering, when the trusted authentication tag, the size information by comparing the current size of the printed tag label contained trusted, trusted label purposes of preventing duplication.
  • FIG. 1 is a logic structural diagram of a method and system for generating and verifying a trusted two-dimensional code applied to information tamper-proof based on PKI.
  • FIG. 2 is a logic structure diagram of a method and system for generating and verifying a trusted two-dimensional code applied to information tamper-proof using a trusted identity timestamp according to the present invention
  • FIG. 3 is a logic structural diagram of a method and system for generating and verifying a trusted tag based on PKI for commodity anti-counterfeiting according to the present invention
  • FIG. 5 is a logic structural diagram of a method and system for generating and verifying a trusted label applied to commodity anti-counterfeiting using a public key according to the present invention
  • FIG. 6 is a logical structural diagram of a method and system for generating and verifying a trusted tag based on IBC or CPK applied to commodity anti-counterfeiting according to the present invention
  • FIG. 7 is a schematic diagram of anti-copying by adjusting the output resolution of a graphical trusted label according to the present invention.
  • the user can confirm the integrity and non-repudiation of the original information contained in the trusted label.
  • a trusted two-dimensional code is taken as an example for further explanation together with a specific illustration.
  • a specific embodiment (1) of the present invention is as follows:
  • Step 1 The certification center CA generates a digital certificate for the QR code service provider
  • Step 2 The two-dimensional code service provider generates a digital signature through the digital signature module, and the timestamp server generates a timestamp for the two-dimensional code;
  • Step 3 The two-dimensional code generation module generates a two-dimensional code according to the original information of the two-dimensional code, the digital certificate information, the time stamp and the digital signature, and the appropriate generation parameters;
  • Step 4 When using or verifying the QR code, the two-dimensional code is correctly read by the two-dimensional code reading module, and the information is extracted and output to the time stamp verification module, the digital certificate verification module and the digital signature. Verification module
  • Step 5 The timestamp verification module obtains the timestamp information from the reading information and verifies it. If the verification passes, it indicates that the content of the two-dimensional code is complete, otherwise the two-dimensional code is not trusted;
  • Step 6 The digital certificate verification module obtains the digital certificate information from the reading information, and verifies the same to confirm the identity of the two-dimensional code service provider;
  • Step 7 The digital signature verification module obtains the digital signature from the reading information and verifies it. If the verification passes, the two-dimensional code is not falsified or forged, and the content in the two-dimensional code is trusted, otherwise it is not trusted.
  • the user can confirm whether the product on which the trusted label is posted is from a real commodity manufacturer.
  • the technical solution of the present invention easier to understand, further explanation will be given below in conjunction with specific illustrations.
  • a specific embodiment (ii) of the present invention is as follows:
  • Step 1 The certification center CA generates a digital certificate for the commodity manufacturer; the label identification generation module generates a label identifier; and the commodity identifier generation module generates the product identifier;
  • Step 2 The commodity manufacturer inputs the digital certificate, the original information (including the commodity batch, the commodity production time, the production location, the company website address, etc.), the label identifier and the commodity identifier obtained in the first step into the digital signature generation module to generate a digital signature.
  • Step 3 The trusted label generation module generates a trusted label according to the original information, the label identifier, the product identifier, the digital signature, the digital certificate and the time stamp, and the appropriate generation parameters.
  • Step 4 When using or verifying the trusted label, the trusted label is correctly read by the trusted label reading module, and the information is extracted and output to the label identification verification module, the commodity identification verification module, and the digital certificate. a verification module, a digital signature verification module, and a time stamp verification module;
  • Step 5 The timestamp verification module obtains the timestamp information from the reading information and verifies it. If the verification passes, it indicates that the trusted label is complete, otherwise the trusted label is not trusted and ends the entire verification process, and then verified in the trusted label. The result shows that the module prompts that the timestamp verification failed.
  • Step 6 The digital certificate verification module obtains the digital certificate information from the reading information and verifies it. If the verification fails, the trusted label is not trusted, and the entire verification process is ended, and then the prompt is displayed in the trusted label verification result display module.
  • Step 7 The digital signature verification module obtains the digital signature from the reading information and verifies it. If the verification passes, the trusted label is not falsified or forged, and the content in the trusted label is trusted, otherwise the label content is not trusted. And ending the entire verification process, and then prompting the digital signature verification failure in the trusted label verification result display module;
  • Step 8 The tag identification verification module obtains the tag identifier from the reading information, and queries whether the tag identifier in the trusted tag verification server has a verification record. If there is no record, the information of the verification event is recorded on the verification server (including Verification time, device information used by the verifier, IP address of the verifier, and geographic location at which the verifier verified Set, and continue to verify the trusted label; if the record already exists, and the trusted label is reproducible, skip to step ten;
  • Step 9 The commodity identification verification module obtains the commodity identifier from the reading information, and queries the trusted label verification server whether the commodity identifier has a verification record. If there is no record, the information of the verification event is recorded on the verification server;
  • Step 10 The trusted label verification result display module reads and displays the result returned by the label identification verification module and the product identification verification module. If the trusted label is not reproducible, the first verification time and the commodity information are displayed; if the trusted label is Reproducible, and this verification is the first verification after the purchase of the goods, and there is no verification record of the tag identification and the product identification of the trusted tag on the verification server, then the product is from the manufacturer who owns the digital certificate, Otherwise, it indicates that the trusted label is obtained by copying, and judges that the commodity is a defective product; if the verification is non-first verification after the purchase of the commodity, and the verification record of the trusted label is not existed on the verification server, the same commodity identifier already exists.
  • the verification record indicates that the product is from the manufacturer who owns the digital certificate, and purchases the time recorded in the first verification corresponding to the product identifier, otherwise it indicates that the trusted label is obtained by copying and the product is a defective product.
  • Step 1 The tag identification generating module generates a tag identifier; the product identifier generating module generates a product identifier; generates a digital digest according to the tag original information, the tag identifier and the product identifier, and the identity information of the product manufacturer, and submits the digital digest to the trusted identity time stamp service center.
  • the trusted identity time stamp service center verifies the identity of the commodity manufacturer, and generates a trusted identity time stamp according to the digital summary, the verified identity information, and the accurate date/time from the authoritative time source;
  • Step 2 The trusted label generation module generates a trusted label according to the original information, the label identifier, the product identifier, the identity information of the manufacturer, the trusted identity timestamp, and the appropriate generation parameters.
  • Step 3 When using and verifying the trusted label, the trusted label is correctly read by the trusted label reading module, the information is extracted, and output to the label identification verification module, the commodity identification verification module, and the trusted Identity timestamp verification module;
  • Step 4 The trusted identity timestamp verification module obtains the trusted identity timestamp information from the reading information and verifies it. If the verification is passed, the trusted label is complete, otherwise the trusted label is not trusted and the entire verification process is ended. Then, the trusted identity timestamp verification fails in the trusted label verification result display module;
  • Step 5 The tag identification verification module obtains the tag identifier from the reading information, and queries whether the tag identifier of the tag identifier in the trusted tag verification server already exists. If there is no record, the information of the verification event is recorded on the verification server (including The verification time, the device information used by the verifier, the IP address of the verifier, the geographic location at which the verifier was verified, etc., and continue the verification of the trusted label; if the record already exists and the trusted label is reproducible, Then jump directly to step seven;
  • Step 6 The product identification verification module obtains the product identification from the reading information, and queries the trusted label verification server whether the product identification has a verification record. If there is no record, the information of the verification event is recorded on the verification server;
  • Step 7 The trusted label verification result display module reads and displays the result returned by the label identification verification module and the product identification verification module. If the trusted label is not reproducible, the first verification time and the commodity information are displayed; if the trusted label is Reproducible, and this verification is the first verification after the purchase of the goods, and there is no verification record of the tag identification and the product identification of the trusted tag on the verification server, then the product is from the trusted identity time stamp.
  • a specific embodiment (4) of the present invention is as follows:
  • Step 1 The commodity manufacturer generates its own private key and public key through the asymmetric key generation module, and updates the public key information and the manufacturer's identity information to the public key information database, and generates the label identification generation module.
  • the tag identifier of the trusted tag, and the commodity identifier of the trusted tag is generated by the product identifier generating module;
  • Step 2 The commodity manufacturer inputs the public key, the original information (including the commodity batch, the commodity production time, the production location, the company website, etc.), the label identification, and the commodity identifier obtained in the first step into the digital signature generation module to generate a number. signature;
  • Step 3 The trusted label generation module generates a trusted label according to the original information of the trusted label, the label identifier, the product identifier, the public key information, the digital signature, and the appropriate generation parameters.
  • Step 4 When using or verifying the trusted label, the trusted label is correctly read by the trusted label reading module, the information is extracted, and output to the public key verification module, the digital signature verification module, and the label.
  • Identification verification module and commodity identification verification module
  • Step 5 The public key verification module obtains the public key information from the reading information, and queries whether the public key exists in the public key database. If it exists, the public key is considered to be legal, otherwise the verification process ends. The product was identified as a defective product.
  • Step 6 The digital signature verification module obtains the digital signature from the reading information and verifies it. If the verification passes, the trusted label is not falsified or forged, and the content in the trusted label is trusted, otherwise the verification process is ended. Identify the product as a defective product;
  • Step 7 The tag identification verification module obtains the tag identifier from the reading information, and queries whether the tag identifier of the tag identifier in the trusted tag verification server already exists. If there is no record, the letter of the verification event is recorded on the verification server. Information (including the verification time, the device information used by the verifier, the IP address of the verifier, the geographical location of the verifier's verification, etc.), and continue the verification of the trusted label; if the record already exists, and the trusted label is available If you copy it, skip to step IX;
  • Step 8 The commodity identification verification module of the trusted label obtains the commodity identifier from the reading information, and queries the trusted label verification server whether the commodity identifier has a verification record. If there is no record, the verification is recorded on the verification server. The information of the event, otherwise the existing verification event information is output to the trusted label verification result display module;
  • Step 9 The trusted label verification result display module reads and displays the result returned by the label identification verification module and the commodity identification verification module of the trusted label, and if the trusted label is not replicable, displays the first verification time and the commodity information;
  • the trusted label is reproducible, and this verification is the first verification after the purchase of the product, and if there is no verification record of the tag identifier and the product identifier of the trusted tag on the verification server, the commodity comes from owning the public key.
  • the manufacturer otherwise, indicates that the trusted label is obtained by copying and judges that the product is a defective product; if this verification is a non-first verification after the purchase of the product, and there is no record of the trusted label on the verification server, but already exists
  • the record of the same item identifier indicates that the item comes from the manufacturer who owns the public key and purchases the time recorded in the first verification corresponding to the item identifier, otherwise it indicates that the trusted label is obtained by copying and the item is Product.
  • a specific embodiment (5) of the present invention is as follows:
  • Step 1 Generate a private key and a public key for the commodity manufacturer through the IBC or CPK key generation center, generate a tag identifier of the trusted tag through the tag identifier generation module, and generate a product identifier of the trusted tag through the product identifier generation module;
  • Step 2 The commodity manufacturer inputs the public key information, the original information (including the commodity batch, the commodity production time, the production location, the company website address, etc.), the label identifier and the commodity identifier obtained in the step 1 into a digital signature generation module to generate digital signature;
  • Step 3 The trusted label generation module generates a trusted label according to the original information of the trusted label, the label identifier, the product identifier, the public key information, the digital signature, and the appropriate generation parameters.
  • Step 4 When using or verifying the trusted label, the trusted label is correctly read by the trusted label reading module, and the information is extracted and output to the digital signature verification module, the label identification verification module, and the product identifier. Verification module
  • Step 5 The digital signature verification module obtains the digital signature from the reading information and verifies it. If the verification passes, the trusted label is not falsified or forged, and the content in the trusted label is trusted, otherwise the verification process ends. Identify the product as a defective product;
  • Step 6 The tag identification verification module obtains the tag identifier from the reading information, and queries whether the tag identifier of the tag identifier in the trusted tag verification server already exists. If there is no record, the information of the verification event is recorded on the verification server (including The verification time, the device information used by the verifier, the IP address of the verifier, the geographic location at which the verifier was verified, etc., and continue the verification of the trusted label; if the record already exists and the trusted label is reproducible, Direct Skip to step eight;
  • Step 7 The commodity identification verification module of the trusted label obtains the product identifier from the reading information, and queries the trusted label verification server whether the product identifier has a verification record. If there is no record, the verification is recorded on the verification server. The information of the event, otherwise the existing verification event information is output to the trusted label verification result display module;
  • Step 8 The trusted label verification result display module reads and displays the result returned by the label identification verification module and the commodity identification verification module of the trusted label, and if the trusted label is not copyable, the first verification time and the commodity information are displayed;
  • the trusted label is reproducible, and this verification is the first verification after the purchase of the product, and if there is no verification record of the tag identifier and the product identifier of the trusted tag on the verification server, the commodity comes from owning the public key.
  • the manufacturer otherwise, indicates that the trusted label is obtained by copying and judges that the product is a defective product; if this verification is a non-first verification after the purchase of the product, and there is no record of the trusted label on the verification server, but already exists
  • the record of the same item identifier indicates that the item comes from the manufacturer who owns the public key and purchases the time recorded in the first verification corresponding to the item identifier, otherwise it indicates that the trusted label is obtained by copying and the item is Product.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

一种基于非对称加密算法的可信标签的生成与验证方法及系统,通过将可信标签原始信息、非对称加密算法的公开密钥信息、数字证书信息、数字签名信息以及可信时间戳或者可信身份时间戳信息生成可信标签;当需要使用或验证该可信标签时,通过验证可信标签中的可信时间戳或者可信身份时间戳信息确保可信标签生成时间以及内容的有效性和完整性,通过验证可信标签中的数字证书的有效性或者公开密钥的合法性,从而认证可信标签拥有者的身份,并通过验证可信标签中的数字签名,从而确定该可信标签内容的完整性。

Description

基于非对称加密算法的可信标签的生成与验证方法及系统 技术领域
本发明涉及密码学、计算机网络安全及产品防伪领域,具体的说,本发明给出了一种基于非对称加密算法的可信标签的生成与验证方法及系统。
背景技术
非对称加密算法是一种密钥的保密方法。非对称加密算法需要两个密钥:公开密钥(public key)和私有密钥(private key)。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。因为加密和解密使用的是两个不同的密钥,所以这种算法叫作非对称加密算法。
基于身份标识的密码系统(Identity-Based Cryptograph,简称IBC),是一种非对称的公钥密码体系。标识密码的概念由Shamir于1984年提出,其最主要观点是系统中不需要证书,使用用户的标识如姓名、IP地址、电子邮箱地址、手机号码等作为公钥。用户的私钥由密钥生成中心(Key Generate Center,简称KGC)根据系统主密钥和用户标识计算得出。用户的公钥由用户标识唯一确定,从而用户不需要第三方来保证公钥的真实性。
组合公钥CPK(Combined Public Key)是一种将现存的公钥体制变为基于标识的公钥体制的通用方法,通过建立科学的架构,将多种算法巧妙地加以组合,实现了基于标识的密钥生成,能够支持基于标识的数字签名和密钥交换。我国知名信息安全和密码专家南湘浩教授于1999年提出CPK组合公钥体制的构想,并于2003年对外正式公布。
PKI(Public Key Infrastructure)即"公钥基础设施",是一种用公钥概念和技术来实施和提供安全服务的具有普适性的安全基础设施,是一种遵循既定标准的密钥管理平台,它能够为所有网络应用提供加密和数字签名等密码服务及所必需的密钥和证书管理体系,简单来说,PKI就是利用公钥理论和技术建立的提供安全服务的基础设施。PKI技术是信息安全技术的核心,也是电子商务的关键和基础技术。
PKI技术采用证书管理公钥,通过第三方的可信任机构—CA(Certificate Authority)认证中心把用户的公钥和用户的其他标识信息捆绑在一起,在互联网上验证用户的身份。目前,通用的办法是采用建立在PKI基础之上的数字证书,通过把要传输的数字信息进行加密和签名, 保证信息传输的机密性、真实性、完整性和不可否认性,从而保证信息的安全传输。PKI是基于公钥算法和技术,为网上通信提供安全服务的基础设施,是创建、颁发、管理、注销公钥证书所涉及到的所有软件、硬件的集合体。其核心元素是数字证书,核心执行者是CA认证机构。
完整的PKI系统必须具有权威的数字证书认证中心(CA)、数字证书库、密钥备份及恢复系统、证书作废系统、应用接口(API)等基本构成部分,构建PKI也将围绕着这五大系统来着手构建。PKI的基础技术包括加密、数字签名、数据完整性机制、数字信封、双重数字签名等。一个典型、完整、有效的PKI应用系统至少应具有以下部分:
·公钥密码证书管理。
·黑名单的发布和管理。
·密钥的备份和恢复。
·自动更新密钥。
·自动管理历史密钥。
·支持交叉认证。
数字签名,也称公钥数字签名,是指附加在某一电子文档中的一组特定的符号或代码,它是利用数学方法和密码算法对该电子文档进行关键信息提取并进行加密而形成的,用于标识签发者的身份以及签发者对电子文档的认可,并能被接收者用来验证该电子文档在传输过程中是否被篡改或伪造。数字签名操作具体过程如下:发送方对被签名的电子文件(《电子签名法》中称数据电文)用哈希算法做数字摘要,再对数字摘要用签名私钥做非对称加密,即做数字签名,之后是将以上的签名和电子文件原文以及签名证书的公钥加在一起形成签名结果发送给收方,待收方验证。接收方收到数据后,首先用发送方的公钥解密数字签名,导出数字摘要,并对电子文件原文做同样的哈希算法,得到一个新的数字摘要,将两个摘要的哈希值进行结果比较,结果如果相同,签名得到验证,否则签名无效。
数字证书,又叫“数字身份证”、“数字ID”,是由认证中心发放并经认证中心CA数字签名的,包含公开密钥拥有者以及公开密钥相关信息的一种电子文件,可以用来证明数字证书持有者的真实身份。最简单的证书包含一个公开密钥、名称以及证书授权中心的数字签名。一般情况下证书中还包括密钥的有效时间,发证机关(证书授权中心)的名称,该证书的序列号等信息,证书的格式遵循ITUT X.509国际标准。
HASH,即散列,也称哈希,即把任意长度的输入(又叫做预映射,pre-image),通过HASH算法,变换成固定长度的输出,该输出就是HASH值(又称数字摘要)。这种转换是一种压缩映射,即散列HASH值的空间通常远小于输入的空间,不同的输入可能会生成相同的输出,但不可能从散列值来唯一的确定输入值。
可信时间戳是由权威可信时间戳服务中心根据国际时间戳标准《RFC3161》签发的一个能证明数据电文(电子文件)在一个时间点是已经存在的、完整的、可验证的,具备法律效力的电子凭证,可信时间戳主要用于电子文件防篡改和事后抵赖,确定电子文件产生的准确时间。可信时间戳(time-stamp)是一个经加密后形成的凭证文档,它包括三个部分:
(1)需加时间戳的文件的数字摘要(digest);
(2)可信时间戳服务器收到文件的日期和时间;
(3)可信时间戳服务器的数字签名(根据(1)和(2)内容生成)。
X.500是由国际标准委员会ISO(Internetional Standards Organization)定义的目录标准,包括了从X.501到X.509等一系列目录数据服务。用于X.500客户机与服务器通信的协议是DAP(Directory Access Protocol)。X.500对PKI有着重要的作用,它定义了PKI系统中数据存储和访问的方案,在PKI系统的目录服务器访问入口处使用标准化方法来完成证书和证书撤销列表等数据结构的存储访问。
LDAP(Lightweight Directory Access Protocol)是在X.500标准基础上产生的一个简化版本,是X.500标准中目录访问协议DAP的一个子集,简化了完整的X.500实现功能,并扩展了对TCP/IP协议体系的支持。
二维码,又称二维条码,是用某种特定的几何图形按一定规律在平面(二维方向)分布的黑白相间的图形记录数据符号信息的,在代码编制上巧妙地利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实现信息自动处理。它具有条码技术的一些共性:每种码制有其特定的字符集;每个字符占有一定的宽度;具有一定的校验功能等。同时还具有对不同行的信息自动识别功能、及处理图形旋转变化等特点。常用的码制有:Data Matrix,MaxiCode,Aztec,QR Code,Vericode,PDF417,Ultracode,Code 49,Code 16K等。
纠错编码:按需要将数据码字序列分块,并根据纠错等级和分块的码字,产生纠错码字,并把纠错码字加入到数据码字序列后面,成为一个新的序列。
Figure PCTCN2016084875-appb-000001
在二维码规格和纠错等级确定的情况下,其实它所能容纳的码字总数和纠错码字数也就确定了,比如:版本10,纠错等级是H时,总共能容纳346个码字,其中224个纠错码字。就是说二维码区域中大约1/3的码字是冗余的。对于这224个纠错码字,它能够纠正112个替代错误(如黑白颠倒)或者224个拒读错误(无法读到或者无法译码),这样纠错容量为:112/346=32.4%
RFID(Radio Frequency Identification),即射频识别,又称电子标签,是一种非接触式的自动识别技术。它通过无线电讯号识别特定的目标,并读写相关的数据,而不需要识别系统与这个目标有机械或者是光学接触。每个RFID标签具有唯一的电子编码。
NFC(Near Field Communication),即近距离无线通信,是由飞利浦公司发起,由诺基亚、索尼等著名厂商联合主推的一项无线技术。NFC由非接触式射频识别(RFID)及互联互通技术整合演变而来,在单一芯片上结合感应式读卡器、感应式卡片和点对点的功能,能在短距离内与兼容设备进行识别和数据交换。这项技术最初只是RFID技术和网络技术的简单合并,现在已演变成一种短距离无线通信技术,发展态势相当迅速。
本专利所述的可信标签是指存储空间有限,且承载了防篡改和防抵赖信息的图形标签、数字标签或者芯片标签,这种标签中所承载的信息通过非对称加密技术方法进行了签名认证或加密处理,其表现形式可以是二维码,RFID标签,NFC标签,电子标签,芯片标签,传感器标签等。
随着计算机安全技术的发展,非对称加密算法在国内外已得到广泛的应用。但是这个成熟的技术一直没有被用来妥善解决二维码或NFC等标签的安全性问题,其中一个根本性的问题是由于二维码、RFID标签或NFC标签等标签的固有的信息存储空间极其有限,无法在承载较多原始信息的同时再包含用于保证安全的完整的数字证书、数字签名、时间戳,或者其它非对称加密信息,因此不能解决所述验证信息的分发问题,就无法应用所述的非对称加密技术。在本专利中,我们提出了妥善解决所述分发问题的方法。
传统的防伪技术包括激光全息防伪技术、化学油墨防伪技术、隐形图像防伪技术、微缩防伪技术等。这些现有的技术不具备唯一性和独占性,易被复制从而无法实现真正意义上的防伪。目前也出现了一些通过对二维码或射频标签加密实现防伪的技术手段,但是现有技术中的防伪信息的加密处理是由发行方私有技术实现,因此不同的发行方需要用不同的设备或软件来验证,导致验证设备或软件无法通用化,而且安全性也得不到保证,从而使这些防伪技术的推广和应用受到极大的限制。
发明内容
本发明的目的在于提供一种可信标签的生成与验证方法及系统,旨在解决现有技术安全性差,实现复杂,成本高,通用性差等问题。
本发明中提出可以直接把数字证书嵌入可信标签中以实现证书的分发问题,因此验证模块可以方便的获取可信标签拥有者的数字证书,从而利用数字签名实现标签内容的防篡改目的。另外,根据数字证书的不同用途,CA在签发数字证书时会指定不同的有效期。当数字证书过期后,CA将不再保证其内容信息的真实性,因此过期的数字证书是无效的,不可信的。由于某些原因,如用户私钥泄漏或者用户的身份发生变化主动要求废除原证书,从而导致CA宣布数字证书失效。这些因素制约了可信标签的有效期。本专利在可信标签中引入数字时间戳,用来证明可信标签的制作时间,从而有效地解决了这一缺陷。因为数字签名和时间戳都可以保证信息的完整性从而达到防篡改的目的,因此在具体实现方案中,标签原始信息、标签标识和商品标识、验证服务器的网络地址等内容的防篡改可以由数字签名和时间戳同时实现,也可以分别由两者之一来实现。
可信标签拥有者每年需要为自己的数字证书支付高额的年费,因此为了降低可信标签拥有者的成本,本发明中提出了免数字证书的方案,或者使用标签拥有者自己生成的非对称密钥。可信标签拥有者的公开密钥和私有密钥可以通过三种途径来生成:1)由IBC的密钥生成中心(KGC)生成公开密钥和私有密钥,可以把可信标签拥有者的身份标识如公司名称、IP地址、电子邮箱地址、手机号码等信息作为公开密钥;2)由CPK的密钥生成中心生成公开密钥和私有密钥,可以把可信标签拥有者的身份标识如公司名称、IP地址、电子邮箱地址、手机号码等信息作为生成密钥的用户标识;3)通过非对称密钥生成工具生成公开密钥和私有密钥,并把公开密钥和身份信息保存在本地或云端的公开密钥库中,通过检索公开密钥库中是否存在该公开密钥来验证公开密钥的有效性。为了防止可信标签内容被篡改,可信标签拥有者利用上述三种方法生成的私有密钥、相应参数,以及签名算法对可信标签的内容进行签名。因为通过私有密钥得到的签名,只能通过对应的公开密钥才能验证,从而确保了可信标签的拥有者身份的真实性和不可抵赖性。
为了简化可信标签的生成和验证,以及方便没有数字证书的可信标签拥有者生成可信标签,本专利在可信时间戳的基础上提出了可信身份时间戳。与传统可信时间戳的不同特征在于,可信身份时间戳增加了身份信息,即由四部分组成:
(1)需加时间戳的文件的数字摘要(digest);
(2)需加时间戳的文件的拥有者的经过认证的身份信息;
(3)可信时间戳服务器收到文件的日期和时间;
(4)可信时间戳服务器的数字签名(根据(1),(2)和(3)内容生成)。
与可信时间戳相比,可信身份时间戳不仅可用于电子文件防篡改和事后抵赖,确定电子文件产生的准确时间,而且可以验证电子文件拥有者的可信身份。因此,可信身份时间戳不仅适用于可信标签,也适用于其它形式的电子文件,如电子合同,电子保单,电子发票等。
为了节省可信标签的开销以及解决可信标签固有信息空间有限的缺陷,可以用标签信息元素(如标签原始信息、数字证书、数字签名、标签标识、商品标识、公钥信息、时间戳、验证服务器的网络地址等)的网络存储地址或者用于查询数据库的查询信息来代替标签信息元素的完整内容,当验证标签时通过网络下载或查询数据库来获取标签信息元素的完整内容,或者在云端直接验证。
因为数字签名和时间戳都可以保证信息的完整性从而达到防篡改的目的,因此在具体实现方案中,标签信息元素(如标签原始信息、数字证书、数字签名、标签标识、商品标识、公钥信息、时间戳、验证服务器的网络地址等)内容的防篡改可以由数字签名和时间戳同时实现,也可以分别由两者之一来实现。
如图5所示,当高分辨率的图形化的可信标签在第一次印刷、再印刷和复制印刷时,由于印刷分辨率低于可信标签图形所要求的输出分辨率,因此会产生信息丢失。因此,为了防止图形形式的可信标签被复制,可以通过调整所生成的可信标签的分辨率以及印刷尺寸,使再印刷或复制后得到的可信标签的图片或所包含的数字信息不同,从而通过比较所验证的标签的图片或所包含的数字信息是否与已保存的第一次印刷的可信标签的信息一致达到可信标签防复制的目的;也可以通过调整所生成的可信标签的分辨率以及印刷尺寸,使第一次印刷得到的标签虽然产生了信息的丢失或信息的错误,但通过纠错仍然可以被正确识读,然而通过复制所述第一次印刷的标签而丢失更多的信息或引入更多的错误,以至于超过了可信标签的纠错能力以至于无法正确识读,从而达到可信标签防复制的目的;为了避免复制者通过放大可信标签图形的方法规避印刷信息的丢失,可以在可信标签中包含第一次印刷的可信标签的尺寸信息,并且对所述尺寸进行数字签名以防止被篡改,在验证可信标签时,通过比较当前可信标签的印刷尺寸与标签中所包含的尺寸信息,实现可信标签防复制的目的。
具体来说,本发明公开一种基于非对称加密算法的可信标签的生成与验证方法,包括以 下步骤:
步骤一:将原始信息设置为可信标签格式;
步骤二:设置可信标签加密协议模块;
步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
所述的可信标签加密协议模块包括数字证书信息和数字签名信息;在步骤四验证可信标签加密协议模块时,通过验证可信标签中的数字证书信息的有效性核实可信标签拥有者的身份,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性。
一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
步骤一:将原始信息设置为可信标签格式;
步骤二:设置可信标签加密协议模块;
步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
所述的可信标签加密协议模块包括数字证书信息、数字签名信息、可信时间戳或者可信身份时间戳信息;在步骤四验证可信标签加密协议模块时,通过验证可信标签中的数字证书信息的有效性认证可信标签拥有者的身份,通过验证可信标签中的数字签名信息确定可信标签的原始信息的完整性,通过验证可信标签中的可信时间戳或者可信身份时间戳信息信息确保可信标签生成时间以及内容的完整性。
一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
步骤一:将原始信息设置为可信标签格式;
步骤二:设置可信标签加密协议模块;
步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
所述的可信标签加密协议模块包括可信身份时间戳信息;在验证可信标签加密协议模块时,通过验证可信标签中的可信身份时间戳信息,确保可信标签生成时间以及内容的完 整性,以及认证可信标签拥有者的身份。
一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
步骤一:将原始信息设置为可信标签格式;
步骤二:设置可信标签加密协议模块;
步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
所述的加密协议模块包括公开密钥信息和数字签名信息;
在验证可信标签加密协议模块时,通过验证公开密钥信息来核实标签拥有者身份的真实性和不可抵赖性,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性和不可抵赖性。
一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
步骤一:将原始信息设置为可信标签格式;
步骤二:设置可信标签加密协议模块;
步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
所述的可信标签加密协议模块包括公开密钥信息、数字签名信息、可信时间戳或者可信身份时间戳信息;
在验证可信标签加密协议模块时,通过验证公开密钥信息来核实标签拥有者身份的真实性和不可抵赖性,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性和不可抵赖性,通过验证可信标签中的可信时间戳或者可信身份时间戳信息确保可信标签生成时间以及内容的完整性。
所述可信标签中的公开密钥信息,根据如下方法认证可信标签拥有者的身份:
A.如果公开密钥和私有密钥是通过基于身份标识密码系统(IBC)的密钥生成中心生成,则所述公开密钥信息包括公开密钥和验证签名的参数信息,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥信息的数据库的查询信息;
如果可信标签中的数字签名验证通过,则证明公开密钥合法,也就证明了可信标签拥有者的身份可信;
B.如果公开密钥和私有密钥是通过组合公钥管理系统(CPK)的密钥生成中心生成,则所述公开密钥信息包括公钥矩阵和映射算法,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥信息的数据库的查询信息;如果可信标签中的数字签名验证通过,则证明签名中包含的实体标识合法,也就证明了可信标签拥有者的身份可信;
C.如果公开密钥是不包含身份标识信息的普通密钥,且不包含在数字证书中,则所述公开密钥信息包括公开密钥,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥的数据库的查询信息,在验证公开密钥合法性时需要查询在本地或云端服务器中的公开密钥库,
如果公开密钥库中存在所述的公开密钥而且可信标签中的数字签名验证通过,则认为可信标签拥有者的身份可信,否则不可信;
如果公开密钥对应的私有密钥已经泄漏或失效,则在本地或云端的公开密钥库中删除对应的公开密钥信息;签名或者加密算法可以包含在公开密钥信息中,也可以存储在本地或云端;
D.如果公开密钥包含在自签名的数字证书中,认证可信标签拥有者的身份使用所述C的方法;如果公开密钥包含在认证中心CA签发的数字证书中,则所述的公开密钥信息包括数字证书信息,或者包括存储数字证书信息的网络地址信息,或者包括用于查询包含数字证书信息的数据库的查询信息,如果数字证书验证通过,而且可信标签中的数字签名验证通过,则可信标签拥有者的身份可信,否则不可信。
所述可信身份时间戳,是由可信身份时间戳服务器对来自权威时间源的准确日期和时间,根据可信标签原始信息生成的数字摘要,经过审核的可信标签拥有者的身份信息,进行数字签名而生成。
如果可信标签是一种图形标签,因为输出分辨率=图像分辨率÷图像输出尺寸,所以通过调整所生成的可信标签的分辨率以及可信标签的印刷尺寸,使要求的输出分辨率高于实际印刷设备的输出分辨率,使再印刷或复制后得到的可信标签的图片或所包含的数字信息不同,从而通过比较所验证的标签的图片或所包含的数字信息是否与已保存的第一次印刷的可信标签的信息一致达到可信标签防复制的目的;
如果可信标签具有纠错能力,则可以调整可信标签的图形分辨率以及可信标签的印刷尺 寸,使要求的输出分辨率高于实际印刷设备的输出分辨率,因此每次印刷都将引入新的印刷错误,使第一次印刷时产生的错误没有超过可信标签所设的纠错级别,因此仍然可以被成功纠错并被正确识读;然而通过复制第一次印刷的可信标签图形进行再次印刷时,因为引入了更多的印刷错误从而超过可信标签所设的纠错级别,因此该复制的可信标签将无法正确识读,从而实现可信标签的防复制;
如果可信标签是一种防复制的图形标签,则可以在标签中包含标签尺寸信息,当验证可信标签时,通过比对当前图形标签的真实尺寸与标签中标称的尺寸来确定图形标签是否被复制和修改。
所述可信标签的原始信息中包含可信标签标识,是一个用于标识一个可信标签的唯一的编码;
所述可信标签的原始信息中包含商品标识,是一个用于标识一件商品的唯一的编码;
如果一个可信标签可以被复制,则需要在每个包含可信标签标识的可信标签被首次验证时,在验证模块或者后台服务器中记录验证事件信息,从而规避同一个可信标签被重复使用,另外为了实现对一件商品的多次防伪验证,需要在该件商品上使用多个具有该商品的唯一商品标识的可信标签,其中每个可信标签具有相同的该件商品的商品标识和各自唯一的标签标识,另外,因为这些可信标签可以被复制,所以每个可信标签在首次验证前是保密的(如增加覆盖层);
如果一个可信标签是不可复制的(如芯片标签具有唯一的不可复制的ID,则可以把该信息作为标签标识或者标签标识的一部分,从而保证该可信标签的唯一性和不可复制性),所以包含某件商品标识的一个标签即可以用于该件商品的防伪,且在首次验证前不需要对该可信标签做任何的保密处理;
如果一个可信标签的标签标识是不可复制的而且标签的其它内容可以被覆写,则这个标签可以在商品被使用后在后台程序中记录并回收,然后重新写入新的商品标识用于另一件商品的防伪,从而降低防伪成本;
如果不希望可信标签被重复使用,则可以使可信标签与商品绑定,当商品被使用时可信标签从商品上剥离并遭到破坏。
所述可信标签的原始信息中可以包含该标签的有效使用时间,在验证可信标签时,同时验证当前时间是否在该标签的有效使用时间内,如果当前时间不在该标签的有效使用时间内,则该可信标签不可信。
如果可信标签中包含数字证书信息,则在验证通过时,在显示模块中显示数字证书信息, 从而方便验证者了解可信标签拥有者的身份信息以及数字证书的颁发者信息;
如果可信标签中包含时间戳信息,则在验证通过时在显示模块中显示时间戳信息,从而方便验证者了解可信标签的生成时间;
如果可信标签中包含可信身份时间戳,则在验证通过时显示可信身份时间戳信息,从而方便验证者了解可信标签的生成时间,以及可信标签拥有者的身份信息;
如果成功采集到本次验证的时间t2和位置信息P2,以及上次成功验证的时间t1和位置信息P1,则计算两次验证的位移R=(P2–P1)和时间差T=(t2–t1),并得到速度V=R/T,如果速度V的值超过设置的预警速度(如100公里每小时),则在显示模块或者云端产生告警信息,表示在本次验证和上次验证期间,所验证标签正在超过V的速度运行,根据所验证标签的实际情况以及速度V的大小,可以在一定程度上检测到所验证的标签是否被复制。
A.所述的可信标签包含以下至少之一:
a.完整的数字证书内容;
b.数字证书的部分内容;
c.数字证书的网络存储地址;
d.数字证书库信息;
e.数字证书目录服务器信息;
f.完整的数字证书链;
g.数字证书链的网络存储地址;
h.用于查询包含数字证书或数字证书链的数据库的查询信息;
i.完整的数字签名;
j.数字签名的网络存储地址;
k.用于查询包含数字签名的数据库的查询信息;
l.完整的公开密钥信息;
m.公开密钥信息的网络存储地址;
n.用于查询包含公开密钥信息的数据库的查询信息;
o.可信标签的标签标识;
p.可信标签的商品标识;
q.可信标签的有效期;
r.完整的可信标签原始信息;
s.可信标签原始信息的HASH值;
t.可信标签原始信息的网络存储地址;
u.用于查询包含原始信息的数据库的查询信息;
v.可信标签拥有者的身份信息;
w.可信标签验证服务器的网络地址;
B.如果所述的可信标签包含数字证书或数字证书链的网络存储地址,验证可信标签加密协议模块时通过网络下载数字证书;
C.如果所述的可信标签包含数字证书库或者目录服务器的信息,则验证可信标签加密协议模块时通过网络下载或查询数字证书;
D.如果所述的可信标签包含公开密钥信息的网络存储地址,验证可信标签加密协议模块时通过网络下载公开密钥信息;
E.如果所述的可信标签包含数字签名的网络存储地址,则验证可信标签加密协议模块时通过网络下载数字签名;
F.如果所述的可信标签包含可信时间戳或可信身份时间戳的网络存储地址,则验证可信标签加密协议模块时通过网络下载可信时间戳或可信身份时间戳;
G.如果所述的可信标签原始信息中包含可信标签拥有者的身份信息,则验证可信标签时可以通过比对可信标签原始信息中的身份信息、数字证书中的身份信息、可信身份时间戳中的身份信息来进一步验证可信标签拥有者的身份是否可信;
H.所述的可信标签信息的下载与验证可以运行在验证模块的本地,也可以运行在云端;
I.所述的原始信息可以是明文,也可以经过加密;
J.所述的原始信息可以是标签原始内容,或者原始内容的HASH值,或者原始内容的网络存储地址,或者用于查询包含原始内容的数据库的查询信息;
K.如果所述的可信标签具有终止符表示原始信息结束,则可以把可信标签加密协议模块放在该终止符后面;
L.所述的可信标签是印刷的或者电子的形式;
M.所述的可信标签是二维码,或者自定义的图案,或者RFID标签,或者NFC标签,或者电子标签,芯片标签,或者传感器标签。
一种可信标签的防伪系统,包括非对称密钥或数字证书生成中心、可信标签加密协议模块存储服务器、可信标签生成与验证设备以及可信标签验证服务器,其特征在于:非对称密钥或数字证书生成中心,用于给可信标签拥有者生成数字证书或非对称密钥;可信标签加密协议模块存储服务器,用于存储可信标签拥有者的可信标签加密协议模块信息,包括公开密钥信息,或数字证书信息,或数字签名信息,或可信时间戳或可信身份时间戳信息;
可信标签验证服务器,用于记录可信标签的验证事件以及防伪商品的详细信息,也可以 用于执行可信标签的验证模块,实现云端验证;
可信标签的生成与验证设备包括:
可信时间戳生成模块,根据可信标签内容生成数字摘要,并向所述可信时间戳服务器申请可信时间戳,并将所述的可信时间戳输入可信标签生成模块;
可信身份时间戳生成模块,根据可信标签原始信息生成数字摘要,并向所述可信身份时间戳服务器申请可信身份时间戳,并将所述的可信身份时间戳输入可信标签生成模块;
可信标签的标签标识生成模块,为每个标签生成唯一的标签标识;
可信标签的商品标识生成模块,为每件商品生成唯一的商品标识;
非对称密钥生成模块,为标签拥有者生成自己的私有密钥和公开密钥;
可信标签生成模块,根据可信标签原始信息、或者标签标识、或者商品标识、或者标签有效期、或者公开密钥信息、或者数字证书信息、或者数字签名信息、或者可信时间戳、或可信身份时间戳信息,生成可信标签;
可信标签识读模块,提取被验证可信标签中的数字证书信息,并将其输出到数字证书验证模块;提取被验证可信标签中的数字签名,并将其输出到数字签名验证模块;提取被验证可信标签中的可信时间戳,并将其输出到可信时间戳验证模块;提取被验证可信标签中的可信身份时间戳,并将其输出到可信身份时间戳验证模块;提取被验证可信标签中的标签标识,并将其输出到标签标识验证模块;提取被验证可信标签中的商品标识,并将其输出到商品标识验证模块;
数字证书验证模块,验证数字证书信息确认可信标签拥有者身份的真实性;
数字签名验证模块,验证数字签名确认可信标签内容的完整性;
可信时间戳验证模块,验证可信时间戳确认可信标签内容的完整性以及可信标签的生成时间;
可信身份时间戳验证模块,验证所述的可信身份时间戳确认可信标签内容的完整性,可信标签的生成时间,以及可信标签拥有者身份的真实性;
可信标签的标签标识验证模块,查询本地或可信标签验证服务器中该标签标识是否已经有验证记录,如果是首次验证,则在本地或验证服务器上记录本次验证事件的信息,否则返回已经存在的验证事件信息;
可信标签的商品标识验证模块,在本地或可信标签验证服务器上记录该商品标识的本次验证事件信息,并返回已经存在的验证事件信息;
可信标签验证结果显示模块,显示验证通过后的数字证书信息,或者可信标签生成时间,或者相应的验证事件信息和商品信息。
可信标签加密协议模块存储服务器是X.500目录服务器,或者LDAP目录服务器,或者 Web服务器,或者FTP服务器,或者DNS服务器,或者云存储服务器;
可信标签验证服务器是具有记录可信标签验证事件、商品购买事件、商品详细信息的数据服务器;
可信标签验证服务器可以执行可信标签验证模块(包括数字证书验证模块、或者数字签名验证模块、或者可信时间戳验证模块、或者可信身份时间戳验证模块、或者标签标识验证模块、或者商品标识验证模块等),从而实现可信标签的云端验证。
本发明与现有技术相比,具有如下优点和有益效果:
(1)本发明生成的可信标签可以便捷的分发可信标签拥有者的数字证书,并可以实现离线验证;
(2)本发明利用时间戳有效延长了可信标签的使用期限,即使可信标签拥有者的数字证书已经失效,但是证书失效前制作的可信标签仍然可以继续使用;
(3)本发明在可信标签中嵌入可信身份时间戳信息,不但保证了可信标签的完整性和不可抵赖性,而且也保证了可信标签拥有者身份的真实可信。因此,可信标签拥有者不必为了生成可信标签而去申请数字证书,从而降低成本。并且也可以支持离线验证可信标签;
(4)本发明使用基于标识的密钥代替数字证书,从而免去了申请和维护数字证书的费用;
(5)本发明在可信标签中增加了唯一的可信标签标识,从而避免同一个可信标签被重复使用;
(6)本发明在可信标签中增加了唯一的商品标识,并确保同一件商品上使用相同的商品标识,从而实现对同一件商品的多次防伪验证;
(7)本发明通过回收利用不可复制的可信标签,从而可以降低防伪成本;
(8)本发明在可信标签中增加了可信标签的有效期,从而使可信标签具有了时效性;
(9)本发明在可信标签验证结果显示模块中可以显示数字证书信息,可信标签生成时间信息,以及可信标签拥有者的身份信息,商品的首次验证时间,商品的生产和物流等详细溯源信息;
(10)本发明通过利用标签信息元素(如标签原始信息、数字证书、数字签名、标签标识、商品标识、公钥信息等)的网络存储地址或者用于查询数据库的查询信息来代替标签信息元素的完整内容,实现了节省可信标签开销的目的,从而使本发明的技术方案完美地解决了某些标签固有信息空间较小的缺陷;
(11)本发明通过调整所生成的图形化的可信标签的分辨率以及输出图形的尺寸,使再印刷或复制后得到的可信标签的图片或所包含的数字信息与第一次印刷得到 的可信标签不同,或者使第一次印刷的可信标签可以正确识读而再复制的可信标签无法识读,从而达到图形化的可信标签防复制的目的;并且在可信标签中包含了图形标签的尺寸信息,从而防止可信标签的图形被放大复制。
更具体的说,本发明为了实现简单分发可信标签拥有者的数字证书的发明目的,在采用的生成与验证方法及系统中,在生成可信标签时,直接把标签拥有者的数字证书嵌入可信标签,不但解决了证书分发问题,而且可以实现可信标签的离线验证。为了使可信标签可以包含更多的原始信息,可以只嵌入部分的数字证书内容,或者数字证书的网络存储地址,或者用于查询数字证书数据库的查询信息,从而实现数字证书的分发。
本发明为了解决数字证书的失效问题,在采用的生成与验证方法及系统中,在生成可信标签时引入了可信时间戳,在保证可信标签防篡改和事后抵赖的同时,也确定了可信标签制作的准确时间。因此,当数字证书已经过期或失效的时候,可以根据可信标签的制作时间来验证可信标签是否仍然可信。比如,虽然数字证书已经过期,但是可信标签是在数字证书的有效期内生成,那么可信标签仍然可信。
为了降低可信标签拥有者的成本和简化可信标签防伪的目的,在采用的生成与验证方法及系统中,提出了一种新型的带有身份信息的可信时间戳。与可信时间戳相比,可信身份时间戳是经过权威时间戳服务中心核实申请人身份后签发的。因此,可信身份时间戳是一个能证明电子文件是经过核实的申请者在一个时间点就已经存在的、完整的、可验证的、具有法律效力的电子凭证。当可信标签拥有者申请到可信身份时间戳后,在不具备数字证书的情况下,仍然能够生成可信的可信标签。
本发明为了减免可信标签拥有者申请和维护数字证书的成本,在采用的生成与验证方法及系统中,在生成可信标签时,用标签拥有者的公开密钥信息代替数字证书信息,也就是直接把公开密钥信息,或者公开密钥信息的网络存储地址,或者用于查询包含公开密钥信息的数据库的查询信息嵌入到可信标签中。通过验证公开密钥或者签名中的身份标识,或者检索公开密钥是否存在于本地或云端的公开密钥库中来验证公开密钥的有效性,以及验证可信标签拥有者的身份信息。
本发明为了避免可信标签的重复使用,在采用的生成与验证方法及系统中,在每一个可信标签中增加了一个独一无二的标签标识,并且在验证服务器上对首次验证事件进行记录,包括验证事件发生时间,验证者的IP地址,验证者所处的地理位置信息等。
本发明为了实现对同一件商品的多次防伪验证,在采用的生成与验证方法及系统中,为同一件商品上使用的多个可信标签设置相同的商品标识,而且该商品标识是该件商品独有的。
本发明为了降低可信标签的使用成本,在采用的生成与验证方法及系统中,如果可信标签的标签标识是不可复制的(如RFID具有不可修改的唯一的电子编码,此编码可被用作可 信标签的标识或可信标签标识的一部分),则当商品销售后,可以在回收并修改验证服务器的数据库后,再次使用该可信标签,从而实现循环利用。
本发明为了满足某些应用场景要求可信标签具有一定的时效性,在采用的生成与验证方法及系统中,在可信标签中增加了有效期信息,从而保证可信标签只能在该有效期内验证通过。
本发明了为了方便验证者使用可信标签,在采用的生成与验证方法及系统中,把可信标签的拥有者的身份信息,数字证书信息,可信标签生成时间,商品的首次验证时间,商品的生产和物流等详细信息显示在验证模块,从而确保可信标签验证者详细了解可信标签及商品的相关信息。
本发明通过利用标签信息元素(如标签原始信息、数字证书、数字签名、标签标识、商品标识、公钥信息等)的网络存储地址或者用于查询数据库的查询信息来代替标签信息元素的完整内容,实现了节省可信标签开销的目的,从而使本发明的技术方案完美地解决了某些可信标签固有信息空间较小的缺陷。
本发明为了防止图形形式的可信标签被复制,可以通过调整所生成的可信标签的分辨率以及印刷尺寸,使再印刷或复制后得到的可信标签的图片或所包含的数字信息不同,从而通过比较所验证的标签的图片或所包含的数字信息是否与已保存的第一次印刷的可信标签的信息一致达到可信标签防复制的目的;也可以通过调整所生成的可信标签的分辨率以及印刷尺寸,使第一次印刷得到的标签虽然产生了信息的丢失或信息的错误,但通过纠错仍然可以正确识读,然而通过复制所述第一次印刷的标签而丢失更多的信息或引入更多的错误,以至于超过了可信标签的纠错能力以至于无法正确识读,从而达到可信标签防复制的目的;为了避免复制者通过放大可信标签图形的方法规避印刷信息的丢失,可以在可信标签中包含第一次印刷的可信标签的尺寸信息,并且对所述尺寸进行数字签名以防止被篡改,在验证可信标签时,通过比较当前可信标签的印刷尺寸与标签中包含的尺寸信息,实现可信标签防复制的目的。
附图说明
图1为本发明采用基于PKI的应用于信息防篡改的可信二维码的生成与验证方法及系统的逻辑结构图
图2为本发明采用可信身份时间戳的应用于信息防篡改的可信二维码的生成与验证方法及系统的逻辑结构图
图3为本发明采用基于PKI的应用于商品防伪的可信标签的生成与验证方法及系统的逻辑结构图
图4为本发明采用可信身份时间戳的应用于商品防伪的可信标签的生成与验证方法及系统 的逻辑结构图
图5为本发明采用公开密钥的应用于商品防伪的可信标签的生成与验证方法及系统的逻辑结构图
图6为本发明采用基于IBC或CPK的应用于商品防伪的可信标签的生成与验证方法及系统的逻辑结构图
图7为本发明通过调整图形可信标签的输出分辨率实现防复制的原理图
具体实施方式
通过采用本发明的技术方案可以让用户确认可信标签所包含的原始信息的完整性和防抵赖性。为了使本发明的技术方案更加易于理解,下面以可信二维码为例结合具体图示作进一步的阐述。
根据图1,本发明的具体实施方案(一)如下所述:
步骤一:认证中心CA为二维码服务提供商生成数字证书;
步骤二:二维码服务提供商通过数字签名模块生成数字签名,时间戳服务器为二维码生成时间戳;
步骤三:二维码生成模块根据二维码原始信息、数字证书信息、时间戳和数字签名,以及适当的生成参数,生成二维码;
步骤四:在使用或验证二维码时,通过二维码识读模块对二维码进行正确识读,提取其中的信息,并将其输出到时间戳验证模块、数字证书验证模块和数字签名验证模块;
步骤五:时间戳验证模块从识读信息中获取时间戳信息并对其验证,如果验证通过,则表明二维码内容完整,否则二维码不可信;
步骤六:数字证书验证模块从识读信息中获取数字证书信息,并对其进行验证以确认二维码服务提供商的身份;
A.如果数字证书合法且仍在有效期,则认为二维码服务提供商的身份可信;
B.如果数字证书虽然合法但已被撤销,但时间戳的生成时间早于数字证书撤销时间,且证书的撤销原因是因为证书过期,则二维码服务提供商的身份可信,并提示数字证书的撤销原因是证书过期;
C.如果数字证书虽然合法但已被撤销,但时间戳的生成时间早于数字证书撤销时间,且证书的撤销原因是因为证书私钥泄密,则二维码服务提供商身份仍然具有较低的可信度,需要向用户明确提示数字证书的撤销原因是证书私钥泄密。
步骤七:数字签名验证模块从识读信息中获取数字签名并对其进行验证,如果验证通过,则该二维码没有被篡改或伪造,二维码中的内容可信,否则不可信。
通过采用本发明的技术方案可以让用户确认张贴了可信标签的商品是否来自真实的商品生产厂商。为了使本发明的技术方案更加易于理解,下面结合具体图示作进一步的阐述。
根据图3,本发明的具体实施方案(二)如下所述:
步骤一:认证中心CA为商品生产厂商生成数字证书;标签标识生成模块生成标签标识;商品标识生成模块生成商品标识;
步骤二:商品生产厂商把所述步骤一获得的数字证书、原始信息(包括商品批次,商品生产时间,生产地点,公司网址等)、标签标识和商品标识输入数字签名生成模块以生成数字签名;根据原始信息、标签标识和商品标识生成数字摘要并向时间戳服务器申请时间戳;
步骤三:可信标签生成模块根据原始信息、标签标识、商品标识、数字签名、数字证书和时间戳,以及适当的生成参数,生成可信标签;
步骤四:在使用或验证可信标签时,通过可信标签识读模块对可信标签进行正确识读,提取其中的信息,并将其输出到标签标识验证模块、商品标识验证模块、数字证书验证模块、数字签名验证模块和时间戳验证模块;
步骤五:时间戳验证模块从识读信息中获取时间戳信息并对其验证,如果验证通过,则表明可信标签完整,否则可信标签不可信并结束整个验证过程,然后在可信标签验证结果显示模块提示时间戳验证失败;
步骤六:数字证书验证模块从识读信息中获取数字证书信息,并对其进行验证,如果验证失败则可信标签不可信,并结束整个验证过程,然后在可信标签验证结果显示模块中提示数字证书验证失败,符合下列三种情况可认为可信标签拥有者(即商品生产厂商)的身份可信:
A.如果数字证书合法且仍在有效期,则认为商品生产厂商的身份可信;
B.如果数字证书虽然合法但已被撤销,但时间戳的生成时间早于数字证书撤销时间,且证书的撤销原因是因为证书过期,则商品生产厂商的身份可信,并在验证结果显示模块中提示数字证书的撤销原因是证书过期;
C.如果数字证书虽然合法但已被撤销,但时间戳的生成时间早于数字证书撤销时间,且证书的撤销原因是因为证书私钥泄密,则商品生产厂商的身份仍然具有较低的可信度,需要在验证结果显示模块中向用户明确提示数字证书的撤销原因是证书私钥泄密。
步骤七:数字签名验证模块从识读信息中获取数字签名并对其进行验证,如果验证通过,则该可信标签没有被篡改或伪造,可信标签中的内容可信,否则标签内容不可信并结束整个验证过程,然后在可信标签验证结果显示模块中提示数字签名验证失败;
步骤八:标签标识验证模块从识读信息中获取标签标识,查询可信标签验证服务器中该标签标识是否已经有验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息(包括验证时间、验证者所用的设备信息、验证者的IP地址、验证者验证时所处的地理位 置等),并继续可信标签的验证;如果已经存在记录,而且可信标签是可复制的,则直接跳到步骤十;
步骤九:商品标识验证模块从识读信息中获取商品标识,在可信标签验证服务器中查询该商品标识是否已经有验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息;
步骤十:可信标签验证结果显示模块读取并显示标签标识验证模块和商品标识验证模块返回的结果,如果可信标签是不可复制的,则显示首次验证时间和商品信息;如果可信标签是可复制的,而且本次验证是购买商品后的首次验证,并且在验证服务器上没有该可信标签的标签标识和商品标识的验证记录,则该商品来自于拥有所述数字证书的生产厂商,否则表明该可信标签是通过复制得到,并判断该商品为赝品;如果本次验证是购买商品后的非首次验证,并且在验证服务器上没有该可信标签的验证记录但已经存在相同商品标识的验证记录,则表明该商品来自于拥有所述数字证书的生产厂商,并购买于该商品标识对应的首次验证所记录的时间,否则表明该可信标签是通过复制得到且该商品为赝品。
根据图4,本发明的具体实施方案(三)如下所述:
步骤一:标签标识生成模块生成标签标识;商品标识生成模块生成商品标识;根据标签原始信息、标签标识和商品标识以及商品生产厂商的身份信息生成数字摘要,并向可信身份时间戳服务中心提出申请,可信身份时间戳服务中心核实商品生产厂商的身份后,根据所述数字摘要,经过审核的身份信息,以及来自权威时间源的准确日期/时间进行签名,生成可信身份时间戳;
步骤二:可信标签生成模块根据原始信息、标签标识、商品标识、生产厂商的身份信息和可信身份时间戳,以及适当的生成参数,生成可信标签;
步骤三:在使用和验证可信标签时,通过可信标签识读模块对可信标签进行正确识读,提取其中的信息,并将其输出到标签标识验证模块、商品标识验证模块和可信身份时间戳验证模块;
步骤四:可信身份时间戳验证模块从识读信息中获取可信身份时间戳信息并对其验证,如果验证通过,则表明可信标签完整,否则可信标签不可信并结束整个验证过程,然后在可信标签验证结果显示模块中提示可信身份时间戳验证失败;
步骤五:标签标识验证模块从识读信息中获取标签标识,查询可信标签验证服务器中该标签标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息(包括验证时间、验证者所用的设备信息、验证者的IP地址、验证者验证时所处的地理位置等),并继续可信标签的验证;如果已经存在记录,而且可信标签是可复制的,则直接跳到步骤七;
步骤六:商品标识验证模块从识读信息中获取商品标识,在可信标签验证服务器中查询该商品标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息;
步骤七:可信标签验证结果显示模块读取并显示标签标识验证模块和商品标识验证模块返回的结果,如果可信标签是不可复制的,则显示首次验证时间和商品信息;如果可信标签是可复制的,而且本次验证是购买商品后的首次验证,并且在验证服务器上没有该可信标签的标签标识和商品标识的验证记录,则该商品来自于可信身份时间戳中所述的身份信息对应的生产厂商,否则表明该可信标签是通过复制得到,并判断该商品为赝品;如果本次验证是购买商品后的非首次验证,并且在验证服务器上没有该可信标签的验证记录但已经存在相同商品标识的验证记录,则表明该商品来自于可信身份时间戳中所述的身份信息对应的生产厂商,并购买于该商品标识对应的首次验证所记录的时间,否则表明该可信标签是通过复制得到且该商品为赝品。
根据图5,本发明的具体实施方案(四)如下所述:
步骤一:商品生产厂商通过非对称密钥生成模块生成自己的私有密钥和公开密钥,并把公开密钥信息与生产厂商的身份信息更新到公开密钥信息库,通过标签标识生成模块生成可信标签的标签标识,通过商品标识生成模块生成可信标签的商品标识;
步骤二:商品生产厂商把所述步骤一获得的公开密钥、原始信息(包括商品批次,商品生产时间,生产地点,公司网址等)、标签标识和商品标识输入数字签名生成模块以生成数字签名;
步骤三:可信标签生成模块根据可信标签原始信息、标签标识、商品标识、公开密钥信息、数字签名,以及适当的生成参数,生成可信标签;
步骤四:在使用或验证可信标签时,通过可信标签识读模块对可信标签进行正确识读,提取其中的信息,并将其输出到公开密钥验证模块、数字签名验证模块、标签标识验证模块和商品标识验证模块;
步骤五:公开密钥验证模块从识读信息中获取公开密钥信息,并在公开密钥库中查询是否存在该公开密钥,如果存在,则认为该公开密钥合法,否则结束验证过程并认定该商品为赝品。
步骤六:数字签名验证模块从识读信息中获取数字签名并对其进行验证,如果验证通过,则该可信标签没有被篡改或伪造,可信标签中的内容可信,否则结束验证过程并认定该商品为赝品;
步骤七:标签标识验证模块从识读信息中获取标签标识,查询可信标签验证服务器中该标签标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信 息(包括验证时间、验证者所用的设备信息、验证者的IP地址、验证者验证时所处的地理位置等),并继续可信标签的验证;如果已经存在记录,而且可信标签是可复制的,则直接跳到步骤九;
步骤八:可信标签的商品标识验证模块从识读信息中获取商品标识,在可信标签验证服务器中查询该商品标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息,否则把已经存在的验证事件信息输出给可信标签验证结果显示模块;
步骤九:可信标签验证结果显示模块读取并显示可信标签的标签标识验证模块和商品标识验证模块返回的结果,如果可信标签是不可复制的,则显示首次验证时间和商品信息;如果可信标签是可复制的,而且本次验证是购买商品后的首次验证,并且在验证服务器上没有该可信标签的标签标识和商品标识的验证记录,则该商品来自于拥有该公开密钥的生产厂商,否则表明该可信标签是通过复制得到,并判断该商品为赝品;如果本次验证是购买商品后的非首次验证,并且在验证服务器上没有该可信标签的记录但已经存在相同商品标识的记录,则表明该商品来自于拥有该公开密钥的生产厂商,并购买于该商品标识对应的首次验证所记录的时间,否则表明该可信标签是通过复制得到且该商品为赝品。
根据图6,本发明的具体实施方案(五)如下所述:
步骤一:通过IBC或CPK密钥生成中心为商品生产厂商生成私有密钥和公开密钥,通过标签标识生成模块生成可信标签的标签标识,通过商品标识生成模块生成可信标签的商品标识;
步骤二:商品生产厂商把所述步骤一获得的公开密钥信息、原始信息(包括商品批次,商品生产时间,生产地点,公司网址等)、标签标识和商品标识输入数字签名生成模块以生成数字签名;
步骤三:可信标签生成模块根据可信标签原始信息、标签标识、商品标识、公开密钥信息、数字签名,以及适当的生成参数,生成可信标签;
步骤四:在使用或验证可信标签时,通过可信标签识读模块对可信标签进行正确识读,提取其中的信息,并将其输出到数字签名验证模块、标签标识验证模块和商品标识验证模块;
步骤五:数字签名验证模块从识读信息中获取数字签名并对其进行验证,如果验证通过,则该可信标签没有被篡改或伪造,可信标签中的内容可信,否则结束验证过程并认定该商品为赝品;
步骤六:标签标识验证模块从识读信息中获取标签标识,查询可信标签验证服务器中该标签标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息(包括验证时间、验证者所用的设备信息、验证者的IP地址、验证者验证时所处的地理位置等),并继续可信标签的验证;如果已经存在记录,而且可信标签是可复制的,则直接 跳到步骤八;
步骤七:可信标签的商品标识验证模块从识读信息中获取商品标识,在可信标签验证服务器中查询该商品标识是否已经存在验证记录,如果没有记录,则在验证服务器上记录本次验证事件的信息,否则把已经存在的验证事件信息输出给可信标签验证结果显示模块;
步骤八:可信标签验证结果显示模块读取并显示可信标签的标签标识验证模块和商品标识验证模块返回的结果,如果可信标签是不可复制的,则显示首次验证时间和商品信息;如果可信标签是可复制的,而且本次验证是购买商品后的首次验证,并且在验证服务器上没有该可信标签的标签标识和商品标识的验证记录,则该商品来自于拥有该公开密钥的生产厂商,否则表明该可信标签是通过复制得到,并判断该商品为赝品;如果本次验证是购买商品后的非首次验证,并且在验证服务器上没有该可信标签的记录但已经存在相同商品标识的记录,则表明该商品来自于拥有该公开密钥的生产厂商,并购买于该商品标识对应的首次验证所记录的时间,否则表明该可信标签是通过复制得到且该商品为赝品。
以上显示和描述了本发明的基本原理和主要特征和优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化,这些变化都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书界定。

Claims (14)

  1. 一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
    步骤一:将原始信息设置为可信标签格式;
    步骤二:设置可信标签加密协议模块;
    步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
    步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
    所述的可信标签加密协议模块包括数字证书信息和数字签名信息;在步骤四验证可信标签加密协议模块时,通过验证可信标签中的数字证书信息的有效性核实可信标签拥有者的身份,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性。
  2. 一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
    步骤一:将原始信息设置为可信标签格式;
    步骤二:设置可信标签加密协议模块;
    步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
    步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
    所述的可信标签加密协议模块包括数字证书信息、数字签名信息、可信时间戳或者可信身份时间戳信息;在步骤四验证可信标签加密协议模块时,通过验证可信标签中的数字证书信息的有效性认证可信标签拥有者的身份,通过验证可信标签中的数字签名信息确定可信标签的原始信息的完整性,通过验证可信标签中的可信时间戳或者可信身份时间戳信息确保可信标签生成时间以及内容的完整性。
  3. 一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
    步骤一:将原始信息设置为可信标签格式;
    步骤二:设置可信标签加密协议模块;
    步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
    步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
    所述的可信标签加密协议模块包括可信身份时间戳信息;在验证可信标签加密协议模块时,通过验证可信标签中的可信身份时间戳信息,确保可信标签生成时间以及内容的完 整性,以及认证可信标签拥有者的身份。
  4. 一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
    步骤一:将原始信息设置为可信标签格式;
    步骤二:设置可信标签加密协议模块;
    步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
    步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
    所述的加密协议模块包括公开密钥信息和数字签名信息;
    在验证可信标签加密协议模块时,通过验证公开密钥信息来核实标签拥有者身份的真实性和不可抵赖性,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性和不可抵赖性。
  5. 一种基于非对称加密算法的可信标签的生成与验证方法,包括以下步骤:
    步骤一:将原始信息设置为可信标签格式;
    步骤二:设置可信标签加密协议模块;
    步骤三:根据可信标签格式的原始信息和可信标签加密协议模块生成加密可信的可信标签;
    步骤四:验证可信标签时,通过验证可信标签加密协议模块,确定可信标签原始信息的完整性和不可否认性,以及可信标签拥有者身份的真实性和不可抵赖性;
    所述的可信标签加密协议模块包括公开密钥信息、数字签名信息、可信时间戳或者可信身份时间戳信息;
    在验证可信标签加密协议模块时,通过验证公开密钥信息来核实标签拥有者身份的真实性和不可抵赖性,通过验证可信标签中的数字签名信息确定可信标签原始信息的完整性和不可抵赖性,通过验证可信标签中的可信时间戳或者可信身份时间戳信息确保可信标签生成时间以及内容的完整性。
  6. 根据权利要求4或5所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:所述可信标签中的公开密钥信息,根据如下方法认证可信标签拥有者的身份:
    A.如果公开密钥和私有密钥是通过基于身份标识密码系统(IBC)的密钥生成中心生成,则所述公开密钥信息包括公开密钥和验证签名的参数信息,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥信息的数 据库的查询信息;
    如果可信标签中的数字签名验证通过,则证明公开密钥合法,也就证明了可信标签拥有者的身份可信;
    B.如果公开密钥和私有密钥是通过组合公钥管理系统(CPK)的密钥生成中心生成,则所述公开密钥信息包括公钥矩阵和映射算法,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥信息的数据库的查询信息;
    如果可信标签中的数字签名验证通过,则证明签名中包含的实体标识合法,也就证明了可信标签拥有者的身份可信;
    C.如果公开密钥是不包含身份标识信息的普通密钥,且不包含在数字证书中,则所述公开密钥信息包括公开密钥,或者包括存储公开密钥信息的网络地址信息,或者包括用于查询包含公开密钥信息的数据库的查询信息,在验证公开密钥合法性时需要查询在本地或云端服务器中的公开密钥库,
    如果公开密钥库中存在所述的公开密钥信息而且可信标签中的数字签名验证通过,则认为可信标签拥有者的身份可信,否则不可信;
    如果公开密钥对应的私有密钥已经泄漏或失效,则在本地或云端的公开密钥库中删除对应的公开密钥信息;签名或者加密算法可以包含在公开密钥信息中,也可以存储在本地或云端;
    D.如果公开密钥包含在自签名的数字证书中,认证可信标签拥有者的身份使用所述C的方法;如果公开密钥包含在认证中心CA签发的数字证书中,则所述的公开密钥信息包括数字证书信息,或者包括存储数字证书信息的网络地址信息,或者包括用于查询包含数字证书信息的数据库的查询信息,如果数字证书验证通过,而且可信标签中的数字签名验证通过,则可信标签拥有者的身份可信,否则不可信。
  7. 根据权利要求2或3所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:所述可信身份时间戳,是由可信身份时间戳服务器对来自权威时间源的准确日期和时间,根据可信标签原始信息生成的数字摘要,经过审核的可信标签拥有者的身份信息,进行数字签名而生成。
  8. 根据权利要求1-5中任一所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:
    如果可信标签是一种图形标签,则通过调整所生成的可信标签的分辨率和图形印刷尺寸,使再印刷或复制后得到的可信标签的图片或所包含的数字信息不同,从而通过比较所验 证的标签的图片或所包含的数字信息是否与已保存的第一次印刷的可信标签的图片或数字信息一致达到可信标签防复制的目的;
    如果可信标签具有纠错能力,则通过调整可信标签图形的分辨率和图形印刷尺寸,使第一次印刷引入的错误在可信标签的纠错能力范围内,而使通过复制第一次印刷的可信标签图形的再次印刷引入的错误超过可信标签的纠错能力,从而实现第一次印刷的可信标签可以被正确识读,而复制印刷的可信标签无法被正确识读;
    如果可信标签是一种防复制的图形标签,则在标签中包含标签印刷图形的尺寸信息,当验证可信标签时,通过比对当前图形标签的真实尺寸与标签中标称的尺寸来确定图形标签是否被复制。
  9. 根据权利要求1-5中任一所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:
    所述可信标签的原始信息中包含可信标签标识,是一个用于标识一个可信标签的唯一的编码;
    所述可信标签的原始信息中包含商品标识,是一个用于标识一件商品的唯一的编码;
    如果一个可信标签可以被复制,则需要在每个包含可信标签标识的可信标签被首次验证时,在验证模块或者后台服务器中记录验证事件信息,在该件商品上使用一个或多个具有该商品的唯一商品标识的可信标签,其中每个可信标签具有相同的该件商品的商品标识和各自唯一的标签标识,每个可信标签在首次验证前是保密的;
    如果一个可信标签是不可复制的,在首次验证前不需要对该可信标签做任何的保密处理;
    如果一个可信标签的标签标识是不可复制的而且标签的其它内容可以被覆写,则这个标签可以在商品被使用后在后台程序中记录并回收,然后重新写入新的商品标识用于另一件商品的防伪。
  10. 根据权利要求1-5中任一所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:
    所述可信标签的原始信息中包含该标签的有效使用时间,在验证可信标签时,同时验证当前时间是否在该标签的有效使用时间内,如果当前时间不在该标签的有效使用时间内,则该可信标签不可信。
  11. 根据权利要求1-5中任一所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:
    如果可信标签中包含数字证书信息,则在验证通过时,在显示模块中显示数字证书信息, 从而方便验证者了解可信标签拥有者的身份信息以及数字证书的颁发者信息;
    如果可信标签中包含时间戳信息,则在验证通过时在显示模块中显示时间戳信息,从而方便验证者了解可信标签的生成时间;
    如果可信标签中包含可信身份时间戳,则在验证通过时显示可信身份时间戳信息,从而方便验证者了解可信标签的生成时间,以及可信标签拥有者的身份信息;
    如果成功采集到本次验证的时间t2和位置信息P2,以及上次成功验证的时间t1和位置信息P1,则计算两次验证的位移R=(P2–P1)和时间差T=(t2–t1),并得到速度V=R/T,
    如果速度V的值超过设置的预警速度,则在显示模块产生告警信息。
  12. 根据权利要求1-5中任一所述的基于非对称加密算法的可信标签的生成与验证方法,其特征在于:
    A.所述的可信标签包含以下至少之一:
    a.完整的数字证书内容;
    b.数字证书的部分内容;
    c.数字证书的网络存储地址;
    d.数字证书库信息;
    e.数字证书目录服务器信息;
    f.完整的数字证书链信息;
    g.数字证书链的网络存储地址;
    h.用于查询包含数字证书或数字证书链的数据库的查询信息;
    i.完整的数字签名;
    j.数字签名的网络存储地址;
    k.用于查询包含数字签名的数据库的查询信息;
    l.完整的公开密钥信息;
    m.公开密钥信息的网络存储地址;
    n.用于查询包含公开密钥信息的数据库的查询信息;
    o.可信标签的标签标识;
    p.可信标签的商品标识;
    q.可信标签的有效期;
    r.完整的可信标签原始信息;
    s.可信标签原始信息的HASH值;
    t.可信标签原始信息的网络存储地址;
    u.用于查询包含原始信息的数据库的查询信息;
    v.可信标签拥有者的身份信息;
    w.可信标签验证服务器的网络地址;
    B.如果所述的可信标签包含数字证书或数字证书链的网络存储地址,验证可信标签加密协议模块时通过网络下载数字证书;
    C.如果所述的可信标签包含数字证书库或者目录服务器的信息,则验证可信标签加密协议模块时通过网络下载或查询数字证书;
    D.如果所述的可信标签包含公开密钥信息的网络存储地址,验证可信标签加密协议模块时通过网络下载公开密钥信息;
    E.如果所述的可信标签包含数字签名的网络存储地址,则验证可信标签加密协议模块时通过网络下载数字签名;
    F.如果所述的可信标签包含可信时间戳或可信身份时间戳的网络存储地址,则验证可信标签加密协议模块时通过网络下载可信时间戳或可信身份时间戳;
    G.如果所述的可信标签原始信息中包含可信标签拥有者的身份信息,则验证可信标签时可以通过比对可信标签原始信息中的身份信息、数字证书中的身份信息、可信身份时间戳中的身份信息来进一步验证可信标签拥有者的身份是否可信;
    H.所述的可信标签信息的下载与验证可以运行在验证模块的本地,也可以运行在云端;
    I.所述的原始信息可以是明文,也可以经过加密;
    J.所述的原始信息可以是标签原始内容,或者原始内容的HASH值,或者原始内容的网络存储地址,或者用于查询包含原始内容的数据库的查询信息;
    K.如果所述的可信标签具有终止符表示原始信息结束,则可以把可信标签加密协议模块放在该终止符后面;
    L.所述的可信标签是印刷的或者电子的形式;
    M.所述的可信标签是二维码,或者自定义的图案,或者RFID标签,或者NFC标签,或者电子标签,或者芯片标签,或者传感器标签。
  13. 一种可信标签的防伪系统,包括非对称密钥或数字证书生成中心、可信标签加密协议模块存储服务器、可信标签生成与验证设备以及可信标签验证服务器,其特征在于:
    非对称密钥或数字证书生成中心,用于给可信标签拥有者生成数字证书或非对称密钥;
    可信标签加密协议模块存储服务器,用于存储可信标签拥有者的可信标签加密协议模块信息,包括公开密钥信息,或数字证书信息,或数字签名信息,或可信时间戳或可信身份时间戳信息;
    可信标签验证服务器,用于记录可信标签的验证事件以及防伪商品的详细信息,也可以用于执行可信标签的验证模块,实现云端验证;
    可信标签的生成与验证设备包括:
    可信时间戳生成模块,根据可信标签内容生成数字摘要,并向所述可信时间戳服务器申请可信时间戳,并将所述的可信时间戳输入可信标签生成模块;
    可信身份时间戳生成模块,根据可信标签原始信息生成数字摘要,并向所述可信身份时间戳服务器申请可信身份时间戳,并将所述的可信身份时间戳输入可信标签生成模块;
    可信标签的标签标识生成模块,为每个标签生成唯一的标签标识;
    可信标签的商品标识生成模块,为每件商品生成唯一的商品标识;
    非对称密钥生成模块,为标签拥有者生成自己的私有密钥和公开密钥;
    可信标签生成模块,根据可信标签原始信息、或者标签标识、或者商品标识、或者标签有效期、或者公开密钥信息、或者数字证书信息、或者数字签名信息、或者可信时间戳、或可信身份时间戳信息,生成可信标签;
    可信标签识读模块,提取被验证可信标签中的数字证书信息,并将其输出到数字证书验证模块;提取被验证可信标签中的数字签名,并将其输出到数字签名验证模块;提取被验证可信标签中的可信时间戳,并将其输出到可信时间戳验证模块;提取被验证可信标签中的可信身份时间戳,并将其输出到可信身份时间戳验证模块;提取被验证可信标签中的标签标识,并将其输出到标签标识验证模块;提取被验证可信标签中的商品标识,并将其输出到商品标识验证模块;
    数字证书验证模块,验证数字证书信息确认可信标签拥有者身份的真实性;
    数字签名验证模块,验证数字签名确认可信标签内容的完整性;
    可信时间戳验证模块,验证可信时间戳确认可信标签内容的完整性以及可信标签的生成时间;
    可信身份时间戳验证模块,验证所述的可信身份时间戳确认可信标签内容的完整性,可信标签的生成时间,以及可信标签拥有者身份的真实性;
    可信标签的标签标识验证模块,查询本地或可信标签验证服务器中该标签标识是否已经有验证记录,如果是首次验证,则在本地或验证服务器上记录本次验证事件的信息,否则返回已经存在的验证事件信息;
    可信标签的商品标识验证模块,在本地或可信标签验证服务器上记录该商品标识的本次验证事件信息,并返回已经存在的验证事件信息;
    可信标签验证结果显示模块,显示验证通过后的数字证书信息,或者可信标签生成时间,或者相应的验证事件信息和商品信息。
  14. 权利要求13所述的一种可信标签的防伪系统,其特征在于:
    可信标签加密协议模块存储服务器是X.500目录服务器,或者LDAP目录服务器,或者 Web服务器,或者FTP服务器,或者DNS服务器,或者云存储服务器;
    可信标签验证服务器是具有记录可信标签验证事件、商品购买事件、商品详细信息的数据服务器;
    可信标签验证服务器可以执行可信标签验证模块从而实现可信标签的云端验证。
PCT/CN2016/084875 2014-11-05 2016-06-04 基于非对称加密算法的可信标签的生成与验证方法及系统 WO2017016318A1 (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201410618158 2014-11-05
CN201510454896.5A CN105024824B (zh) 2014-11-05 2015-07-29 基于非对称加密算法的可信标签的生成与验证方法及系统
CN201510454896.5 2015-07-29

Publications (1)

Publication Number Publication Date
WO2017016318A1 true WO2017016318A1 (zh) 2017-02-02

Family

ID=54414560

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084875 WO2017016318A1 (zh) 2014-11-05 2016-06-04 基于非对称加密算法的可信标签的生成与验证方法及系统

Country Status (2)

Country Link
CN (1) CN105024824B (zh)
WO (1) WO2017016318A1 (zh)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038470A (zh) * 2017-06-09 2017-08-11 宝鸡甲目网络科技有限公司 一种nfc网络智能授码机
CN109617675A (zh) * 2018-11-15 2019-04-12 国网电动汽车服务有限公司 一种充放电设施与用户端间的双方标识认证方法及系统
CN110009079A (zh) * 2019-04-17 2019-07-12 尤尼泰克(嘉兴)信息技术有限公司 一种基于二维码的标签识别方法及设备
CN110147666A (zh) * 2019-03-29 2019-08-20 西安电子科技大学 物联网场景下的轻量级nfc身份认证方法、物联网通信平台
CN111260010A (zh) * 2020-01-20 2020-06-09 浙江中国轻纺城网络有限公司 自定义二维码标签的处理方法、装置和设备
CN111698093A (zh) * 2020-06-11 2020-09-22 江苏海洋大学 一种基于pki体系的数字时间戳签发和查证方法
CN112464253A (zh) * 2019-09-09 2021-03-09 云南天质弘耕科技有限公司 一种基于区块链技术的大型农产品溯源管理系统
CN112699360A (zh) * 2020-12-30 2021-04-23 北京天融信网络安全技术有限公司 硬件的防伪方法及装置、可读存储介质、电子设备
CN113556748A (zh) * 2021-06-23 2021-10-26 中国联合网络通信集团有限公司 信令溯源识别方法、装置和系统
CN115913563A (zh) * 2022-10-09 2023-04-04 鼎铉商用密码测评技术(深圳)有限公司 电子签章的生成方法、验证方法及设备
US11645424B2 (en) 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
US20230308439A1 (en) * 2022-03-22 2023-09-28 Cisco Technology, Inc. Distributed hierarchical authentication of system component identities
US11954007B2 (en) 2022-04-20 2024-04-09 International Business Machines Corporation Tracking usage of common libraries by means of digitally signed digests thereof

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024824B (zh) * 2014-11-05 2018-12-21 浙江码博士防伪科技有限公司 基于非对称加密算法的可信标签的生成与验证方法及系统
CN105447710A (zh) * 2015-11-12 2016-03-30 东北大学 一种电子商务中基于二维码的商品真实性验证系统及方法
CN108243402B (zh) * 2015-12-09 2021-06-01 Oppo广东移动通信有限公司 一种读写智能卡的方法及装置
CN105427117A (zh) * 2015-12-18 2016-03-23 沈阳圆梦科技有限公司 一种基于电子数据保全技术的农产品通用溯源防伪系统及方法
CN105634741A (zh) * 2015-12-24 2016-06-01 上海莱柏信息科技有限公司 基于可信标签的身份认证方法及其认证系统
SG10201600192TA (en) * 2016-01-11 2017-08-30 Mastercard Asia Pacific Pte Ltd A Method For Dynamic Authentication Of An Object
CN105590227A (zh) * 2016-01-14 2016-05-18 姜智广 一种商品真伪的动态验证方法、装置及系统
CN106027479B (zh) * 2016-01-21 2019-04-05 李明 一种身份证认证信息处理请求的动态处理方法及系统
GB2547025A (en) * 2016-02-05 2017-08-09 Thales Holdings Uk Plc A method of data transfer, a method of controlling use of data and a cryptographic device
JP6760740B2 (ja) * 2016-02-26 2020-09-23 東芝テック株式会社 レシートサーバー及びプログラム
CN107169769A (zh) * 2016-03-08 2017-09-15 广州市动景计算机科技有限公司 应用程序的刷量识别方法、装置
CN106022738A (zh) * 2016-06-02 2016-10-12 中国联合网络通信集团有限公司 一种二维码安全支付方法、终端及系统
CN106452756B (zh) * 2016-11-08 2018-03-30 王栋 可离线验证安全二维码构造验证方法与装置
CN106452734A (zh) * 2016-12-17 2017-02-22 上海莱柏信息科技有限公司 一种基于安全元件的可信标签的生成方法及系统
CN107067056A (zh) * 2017-02-14 2017-08-18 阿里巴巴集团控股有限公司 二维码生成方法及其设备和二维码识别方法及其设备
CN106897761A (zh) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 一种二维码生成方法及装置
CN107154848A (zh) * 2017-03-10 2017-09-12 深圳市盾盘科技有限公司 一种基于cpk认证的数据加密与存储方法及装置
CN107103255A (zh) * 2017-04-27 2017-08-29 百望电子发票数据服务有限公司 一种电子发票版式文件验证方法及系统
CN107392612A (zh) * 2017-06-05 2017-11-24 广东工业大学 一种基于交通二维码交易验证的方法
CN107316182A (zh) * 2017-06-30 2017-11-03 福建亿榕信息技术有限公司 一种电子合同证据链的生成方法和生成系统
WO2019012310A1 (en) * 2017-07-11 2019-01-17 Yuen Hon Man Honmy SYSTEMS FOR PROTECTING ACCESS TO THE SUPPORTS OF AN INSTALLATION
CN109495268B (zh) * 2017-09-12 2020-12-29 中国移动通信集团公司 一种二维码认证方法、装置及计算机可读存储介质
CN107944526B (zh) * 2017-10-19 2021-02-23 浙江码博士防伪科技有限公司 一种防篡改防复制的二维码防伪方法
CN108366370B (zh) * 2018-02-02 2019-08-02 东南大学 一种基于无线信道特征量化私有不对称密钥的信息传输方法
JP2019148930A (ja) * 2018-02-26 2019-09-05 株式会社オプトエレクトロニクス 二次元コード、二次元コード出力システム、二次元コード出力方法、二次元コード読取システム、二次元コード読取方法及びプログラム
CN108764930A (zh) * 2018-03-23 2018-11-06 成都众宜天成科技有限公司 基于区块链结构的商品防伪验证平台的实现方法
CN108681904A (zh) * 2018-04-01 2018-10-19 蒋欣言 一种瓶装式商品的防伪验证实现方法
CN109034805B (zh) * 2018-08-09 2022-09-02 江苏先安科技有限公司 一种适用于区块链和嵌入式领域的时间戳签名验证方法
CN109409472B (zh) 2018-08-24 2022-11-22 创新先进技术有限公司 二维码生成方法、数据处理方法、装置及服务器
CN110955868A (zh) * 2018-09-27 2020-04-03 千寻位置网络有限公司 证书过期的校验方法及装置、终端设备
CN109615030A (zh) * 2018-10-12 2019-04-12 阿里巴巴集团控股有限公司 基于安全应用的二维码防伪方法、设备及系统
US11568424B2 (en) 2018-10-18 2023-01-31 CPI Card Group—Colorado, Inc. Method and system for product authentication
CN109543791B (zh) * 2018-11-20 2022-01-25 白绍江 产品防伪验证方法和系统
CN109544182B (zh) * 2018-11-20 2021-05-14 孟凡富 产品防伪验证方法及系统
CN109583555B (zh) * 2018-11-20 2022-02-22 王建新 产品防伪电子标签认证方法和系统
CN109905360B (zh) * 2019-01-07 2021-12-03 平安科技(深圳)有限公司 数据验证方法及终端设备
CN109886006A (zh) * 2019-02-28 2019-06-14 尤尼泰克(嘉兴)信息技术有限公司 一种基于二维码的信息源核验方法和装置
CN110472715A (zh) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 一种动态二维码的生成方法、二维码生成器及防伪系统
CN110472716A (zh) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 一种二维码的生成方法、二维码生成器及防伪系统
CN110969445B (zh) * 2019-10-31 2024-05-28 广州市人民印刷厂股份有限公司 基于nfc的防伪方法
CN110912693B (zh) * 2019-11-22 2022-06-03 福建金密网络安全测评技术有限公司 一种数字证书格式合规性检测系统
CN110830237B (zh) * 2019-11-29 2023-05-12 晋商博创(北京)科技有限公司 基于时刻的cpk密钥生成方法、装置、实体及密钥中心
CN111178913A (zh) * 2019-12-31 2020-05-19 天津津滨信钥信息技术有限公司 产品质量保证生成、验证方法、装置、服务器及存储介质
CN111260528B (zh) * 2020-02-07 2021-09-28 赵�智 一种基于非对称算法的不动产信息核验方法
CN111091398B (zh) * 2020-03-19 2020-08-25 北京达邦食安科技有限公司 一种农产品溯源系统
CN113641301A (zh) * 2021-02-19 2021-11-12 中国建设银行股份有限公司 一种数据管理方法及装置
CN112865972B (zh) * 2021-03-31 2023-03-14 深圳市巽震科技孵化器有限公司 基于数字证书平台的初始化方法及设备、系统和存储设备
CN114492491B (zh) * 2022-01-24 2022-09-13 芯电智联(北京)科技有限公司 一种nfc标签应用的数据管理系统
CN114491671B (zh) * 2022-01-27 2022-10-14 宋舒涵 一种基于区块链的市场监管商品标签溯源方法及系统
CN115277093B (zh) * 2022-06-24 2024-03-26 北京奕斯伟计算技术股份有限公司 篡改验证方法及其系统、装置和电子设备

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779263A (zh) * 2012-06-19 2012-11-14 袁开国 基于pki和数字签名的可信二维码方案
JP5115424B2 (ja) * 2008-09-24 2013-01-09 富士ゼロックス株式会社 時刻証明装置、時刻証明方法、及びプログラム
CN103514410A (zh) * 2013-09-30 2014-01-15 上海市数字证书认证中心有限公司 电子合同的可信保全与证据提取系统及方法
CN103795546A (zh) * 2014-02-18 2014-05-14 广东数字证书认证中心有限公司 数据标签生成方法、数据标签的认证方法及其系统
CN103839097A (zh) * 2014-03-20 2014-06-04 武汉信安珞珈科技有限公司 一种基于数字签名的二维码生成方法和装置
CN104008322A (zh) * 2014-06-14 2014-08-27 河南融信数据有限公司 基于可靠数字签名的二维码发布者身份认证方法
CN104348870A (zh) * 2013-08-02 2015-02-11 航天信息股份有限公司 基于可信时间戳的云存储系统的数据管理方法和系统
CN105024824A (zh) * 2014-11-05 2015-11-04 祝国龙 基于非对称加密算法的可信标签的生成与验证方法及系统
CN105635070A (zh) * 2014-11-05 2016-06-01 许田 一种数字文件的防伪方法及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030063772A1 (en) * 2001-09-06 2003-04-03 Smith Joshua R. System and method for authentication and tracking of a workpiece that includes an optically active medium
CN101520865A (zh) * 2009-03-31 2009-09-02 薛忠华 一种利用无线射频电子标签结合公钥基础设施进行药品防伪的方法

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5115424B2 (ja) * 2008-09-24 2013-01-09 富士ゼロックス株式会社 時刻証明装置、時刻証明方法、及びプログラム
CN102779263A (zh) * 2012-06-19 2012-11-14 袁开国 基于pki和数字签名的可信二维码方案
CN104348870A (zh) * 2013-08-02 2015-02-11 航天信息股份有限公司 基于可信时间戳的云存储系统的数据管理方法和系统
CN103514410A (zh) * 2013-09-30 2014-01-15 上海市数字证书认证中心有限公司 电子合同的可信保全与证据提取系统及方法
CN103795546A (zh) * 2014-02-18 2014-05-14 广东数字证书认证中心有限公司 数据标签生成方法、数据标签的认证方法及其系统
CN103839097A (zh) * 2014-03-20 2014-06-04 武汉信安珞珈科技有限公司 一种基于数字签名的二维码生成方法和装置
CN104008322A (zh) * 2014-06-14 2014-08-27 河南融信数据有限公司 基于可靠数字签名的二维码发布者身份认证方法
CN105024824A (zh) * 2014-11-05 2015-11-04 祝国龙 基于非对称加密算法的可信标签的生成与验证方法及系统
CN105635070A (zh) * 2014-11-05 2016-06-01 许田 一种数字文件的防伪方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YANG, XIYA ET AL.: "Trusted Timestamp Helps Keeping Electronic Archives Safe", ARCHIVES & CONSTRUCTION, 31 July 2013 (2013-07-31) *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038470A (zh) * 2017-06-09 2017-08-11 宝鸡甲目网络科技有限公司 一种nfc网络智能授码机
CN107038470B (zh) * 2017-06-09 2024-03-22 李娟� 一种nfc网络智能授码机
CN109617675A (zh) * 2018-11-15 2019-04-12 国网电动汽车服务有限公司 一种充放电设施与用户端间的双方标识认证方法及系统
CN109617675B (zh) * 2018-11-15 2024-02-06 国网电动汽车服务有限公司 一种充放电设施与用户端间的双方标识认证方法及系统
CN110147666A (zh) * 2019-03-29 2019-08-20 西安电子科技大学 物联网场景下的轻量级nfc身份认证方法、物联网通信平台
CN110009079A (zh) * 2019-04-17 2019-07-12 尤尼泰克(嘉兴)信息技术有限公司 一种基于二维码的标签识别方法及设备
CN112464253A (zh) * 2019-09-09 2021-03-09 云南天质弘耕科技有限公司 一种基于区块链技术的大型农产品溯源管理系统
CN111260010A (zh) * 2020-01-20 2020-06-09 浙江中国轻纺城网络有限公司 自定义二维码标签的处理方法、装置和设备
US11645424B2 (en) 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
CN111698093B (zh) * 2020-06-11 2022-07-15 江苏海洋大学 一种基于pki体系的数字时间戳签发和查证方法
CN111698093A (zh) * 2020-06-11 2020-09-22 江苏海洋大学 一种基于pki体系的数字时间戳签发和查证方法
CN112699360A (zh) * 2020-12-30 2021-04-23 北京天融信网络安全技术有限公司 硬件的防伪方法及装置、可读存储介质、电子设备
CN112699360B (zh) * 2020-12-30 2023-07-04 北京天融信网络安全技术有限公司 硬件的防伪方法及装置、可读存储介质、电子设备
CN113556748A (zh) * 2021-06-23 2021-10-26 中国联合网络通信集团有限公司 信令溯源识别方法、装置和系统
CN113556748B (zh) * 2021-06-23 2023-06-16 中国联合网络通信集团有限公司 信令溯源识别方法、装置和系统
US20230308439A1 (en) * 2022-03-22 2023-09-28 Cisco Technology, Inc. Distributed hierarchical authentication of system component identities
US11954007B2 (en) 2022-04-20 2024-04-09 International Business Machines Corporation Tracking usage of common libraries by means of digitally signed digests thereof
CN115913563B (zh) * 2022-10-09 2023-09-29 鼎铉商用密码测评技术(深圳)有限公司 电子签章的生成方法、验证方法及设备
CN115913563A (zh) * 2022-10-09 2023-04-04 鼎铉商用密码测评技术(深圳)有限公司 电子签章的生成方法、验证方法及设备

Also Published As

Publication number Publication date
CN105024824B (zh) 2018-12-21
CN105024824A (zh) 2015-11-04

Similar Documents

Publication Publication Date Title
WO2017016318A1 (zh) 基于非对称加密算法的可信标签的生成与验证方法及系统
US11361109B2 (en) Distributed blockchain-based method for the collective signing of a file by several parties
US11186111B1 (en) Digitally encoded seal for document verification
JP7385663B2 (ja) 物体認証を準備及び実行するための方法及びシステム
US7421079B2 (en) Method and apparatus for secure key replacement
CN111092737B (zh) 数字证书管理方法、装置及区块链节点
CN102792633B (zh) 访问控制
WO2018114586A1 (en) Distributed blockchain-based method for the collective signing of a file by several parties
KR20110140122A (ko) 인증서 및 키를 가지는 제품을 생산하기 위한 방법
CN111630544A (zh) 用于在计算机网络中控制产品分销的方法与系统
JP2015162694A (ja) 商品認証システム、認証サーバ及び商品認証方法
JPH10135943A (ja) 携帯可能情報記憶媒体及びそれを用いた認証方法、認証システム
CN116167017A (zh) 一种基于区块链技术的鞋类原创设计ai数字版权管理系统
JP4846464B2 (ja) 複数公開鍵の証明書を発行及び検証するシステム、並びに、複数公開鍵の証明書を発行及び検証する方法
JP4843960B2 (ja) タグ認証システム、認証装置、及び、タグ認証方法
CN101369296A (zh) 实现离线打印限制的方法和系统
JP4105583B2 (ja) 無線タグセキュリティ拡張方法,id管理コンピュータ装置,代理サーバ装置,それらのプログラムおよびそれらのプログラムの記録媒体
JP4923388B2 (ja) 内容証明システム
CN116527282A (zh) 用于算法过渡的多公钥数字证书的密钥使用方法
JP4541740B2 (ja) 認証用鍵の更新システム、および認証用鍵の更新方法
JP2008236248A (ja) 電子情報認証方法、電子情報認証装置及び電子情報認証システム
CN110798321B (zh) 一种基于区块链的物品信息服务方法
CN109547210B (zh) 一种电子印章验证方法和装置
TW201926116A (zh) 具有保護數位簽章機制的方法及系統與伺服器
Geldenhuys et al. A digital signature issuing and verification system for auto identification tokens

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16829685

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16829685

Country of ref document: EP

Kind code of ref document: A1