WO2018041131A1 - Procédé et système anti-contrefaçon pour dispositif de communication optique - Google Patents

Procédé et système anti-contrefaçon pour dispositif de communication optique Download PDF

Info

Publication number
WO2018041131A1
WO2018041131A1 PCT/CN2017/099635 CN2017099635W WO2018041131A1 WO 2018041131 A1 WO2018041131 A1 WO 2018041131A1 CN 2017099635 W CN2017099635 W CN 2017099635W WO 2018041131 A1 WO2018041131 A1 WO 2018041131A1
Authority
WO
WIPO (PCT)
Prior art keywords
time
communication device
optical communication
information
verification value
Prior art date
Application number
PCT/CN2017/099635
Other languages
English (en)
Chinese (zh)
Inventor
王晓东
方俊
李江亮
苏爱民
Original Assignee
陕西外号信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 陕西外号信息技术有限公司 filed Critical 陕西外号信息技术有限公司
Priority to CN201780051636.0A priority Critical patent/CN109792387B/zh
Publication of WO2018041131A1 publication Critical patent/WO2018041131A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Definitions

  • the invention belongs to the field of optical information technology, and more particularly to an anti-counterfeiting method and system for an optical communication device.
  • Optical communication devices are capable of transmitting different information by emitting different light, which may also be referred to herein as "optical tags,” which are used interchangeably throughout this application.
  • Optical tags transmit information by emitting different lights, which have the advantages of long distance, visible light conditions, strong directivity, and positionability, and the information transmitted by the optical tags can change rapidly with time, thereby providing a large information capacity. . Therefore, compared with the traditional two-dimensional code, the optical tag has stronger information interaction capability, which can provide great convenience for users and businesses. Due to the openness of the registration of optical labels, anyone can purchase personal services or information by purchasing or applying for optical labels, which creates the possibility of criminals falsifying optical labels. In order to prevent illegal forgery of optical tags, it is necessary to provide an anti-counterfeiting method for optical tags.
  • the present invention provides an optical tag anti-counterfeiting method and system, which is simple and reasonable in process, convenient in use, and good in anti-counterfeiting performance.
  • An aspect of the invention relates to an anti-counterfeiting method for an optical communication device, comprising: receiving a first verification value from an image acquisition device of a user, wherein the image acquisition device obtains an image acquisition by the optical communication device The information displayed by the optical communication device as a function of the time at a certain time, and wherein the first verification value is obtained based on the information; inputting the time to the first function to obtain a second verification value And determining the authenticity of the optical communication device according to the first verification value and the second verification value, wherein the time is one of a preset possible authentication time.
  • Another aspect of the invention relates to an anti-counterfeiting method for an optical communication device, comprising: receiving a verification value from a user's image acquisition device, wherein the image acquisition device passes the light transmission The information device performs image acquisition to obtain information obtained by encrypting the time displayed by the optical communication device at a certain time, and wherein the verification value is obtained based on the information; performing a decryption algorithm on the verification value to Obtaining a decryption result; and analyzing the decrypted result to determine authenticity of the optical communication device, wherein the time is one of a preset possible authentication time.
  • Another aspect of the invention relates to a server configured to perform the anti-counterfeiting method described above.
  • Another aspect of the invention relates to an anti-counterfeiting method for an optical communication device, comprising: performing image acquisition on the optical communication device using an image acquisition device to obtain that the optical communication device is displayed at a certain time depending on the Time information, wherein the time is one of a preset possible authentication time; obtaining a verification value based on the information; transmitting the verification value to a server for verification; and receiving a verification result from the server.
  • Another aspect of the invention relates to an image acquisition device comprising an image acquisition component, a processor and a memory, wherein the memory stores a computer program that, when executed by the processor, can be used to implement the above An anti-counterfeiting method for an optical communication device.
  • Another aspect of the invention relates to an optical communication apparatus comprising: a light source; and a controller configured to: obtain an output value based on a certain time; obtain the optical communication device based on the output value at the moment Displaying information; and controlling the light source to display the information at the time, wherein the time instant is one of a predetermined possible authentication time.
  • an anti-counterfeiting system for an optical communication device comprising: an optical communication device configured to display information as a function of the time at a certain time; a server configured to: from the user The image acquisition device receives the first verification value, wherein the image acquisition device obtains information displayed by the optical communication device as a function of the time at a certain moment by performing image acquisition on the optical communication device, and wherein The first verification value is obtained based on the information; inputting the time to a first function to obtain a second verification value; and determining the light according to the first verification value and the second verification value The authenticity of the communication device, wherein the time instant is one of a possible authentication time set in advance.
  • Another aspect of the invention relates to an anti-counterfeiting method for an optical communication device, comprising: an optical communication device displaying information as a function of the time at a certain time; and performing image acquisition on the optical communication device using an image acquisition device, Obtaining the information, and obtaining a first verification value based on the information; the server receiving the first verification value from the image collection device; the server will Inputting into the first function to obtain a second verification value; and the server determining the authenticity of the optical communication device according to the first verification value and the second verification value, wherein the time is preset One of the possible certification moments.
  • Another aspect of the invention relates to an anti-counterfeiting system for an optical communication device, comprising:
  • An optical communication device configured to display information obtained by encrypting the time at a certain time; a server configured to: receive a verification value from an image collection device of the user, wherein the image acquisition device passes the The optical communication device performs image acquisition to obtain information obtained by encrypting the time displayed by the optical communication device at a certain time, and wherein the verification value is obtained based on the information; performing decryption on the verification value An algorithm obtains a decryption result; and analyzes the decryption result to determine authenticity of the optical communication device, wherein the time instant is one of a preset possible authentication time.
  • Another aspect of the invention relates to an anti-counterfeiting method for an optical communication device, comprising: displaying, at a certain time, an information obtained by encrypting the time at a certain time; and performing an image on the optical communication device using an image capturing device Acquiring to obtain the information, and obtaining a verification value based on the information; the server receiving the verification value from the image collection device; performing a decryption algorithm on the verification value to obtain a decryption result; and analyzing the decryption result to Determining the authenticity of the optical communication device, wherein the time is one of a preset possible authentication time.
  • the invention also provides an optical tag anti-counterfeiting method based on a one-way hash function, which comprises the following steps:
  • Step 1 In the authentication server, establish a one-way hash function for optical label anti-counterfeiting, set its initial parameters, and perform confidential processing;
  • Step 2 setting an authentication period and a starting time, and storing the same in the optical label controller together with the one-way hash function; the optical label controller externally broadcasts the authentication period and the starting time;
  • each authentication period is obtained by an authentication time, and each authentication time is obtained by a one-way hash function, and the optical tag controller controls the optical tag to output and display the output signal at the corresponding authentication time;
  • Step 3 The user performs anti-counterfeiting verification when collecting the optical label by using the mobile collecting device
  • the first authentication time after the current time of collecting the optical label is taken as the current authentication time, and the current output letter corresponding to the current authentication time is collected. number;
  • Step 4 The authentication server inputs the current authentication time to the one-way hash function to obtain the current verification signal. If the current verification signal is the same as the current output signal, the optical label collected by the user is legal, otherwise the user collects the Illegal light label;
  • Step 5 The authentication server sends the optical tag legal or illegal authentication result to the mobile collection device, and completes the optical tag anti-counterfeiting operation based on the one-way hash function.
  • the output signal is used as a frame outputted by the optical tag at the corresponding authentication time or included in the frame.
  • the starting time is recorded in a 24-hour system, including hour, minute and second information.
  • An optical label anti-counterfeiting system based on a one-way hash function comprising
  • the optical label controller is configured to perform an external broadcast authentication period and a starting moment, and is configured to obtain an authentication moment according to the authentication period and the starting moment, and obtain an output signal to control an output display of the optical label according to the authentication moment in a one-way hash function;
  • the mobile collection device is configured to check the authentication period and the start time of the public broadcast, collect the optical label signal, record the acquisition time, and transmit the recorded current authentication time and the collected current output signal to the authentication server.
  • the authentication server is used for the secret storage one-way hash function; the current verification signal is obtained according to the current authentication time by the one-way hash function, and the current output signal is compared with the current verification signal, and if the same, the optical label is sent to the mobile collection device. The result of the authentication, otherwise the optical tag is illegally transmitted to the mobile collection device.
  • FIG. 1A and 1B illustrate an optical label suitable for use in the anti-counterfeiting method of the present invention
  • FIG. 2 illustrates an optical tag anti-counterfeiting system in accordance with one embodiment of the present invention
  • FIG. 3 shows a flow chart of an anti-counterfeiting method in accordance with one embodiment of the present invention
  • FIG. 4 shows a flow chart of an anti-counterfeiting method in accordance with another embodiment of the present invention.
  • Optical tags transmit information by emitting different lights, and the information conveyed by the optical tags can change over time.
  • 1A shows an optical tag suitable for the anti-counterfeiting method of the present invention, which includes a 9 ⁇ 9 array composed of light-emitting units, which array can be divided into a signal unit as a data bit, a dynamic blinking positioning mark 2
  • the static positioning identifier 3 and the blank bit 4 wherein the dynamic blinking positioning mark 2 is a larger square in the middle of the optical label (as a 3 ⁇ 3 array composed of light emitting units), and the static positioning mark 3 is located at a corner of the light label.
  • the three larger return boxes also a 3 x 3 array of light-emitting units
  • together with the three static position markers 3 form a set of position identifiers.
  • Each of the signal units 1 and each of the blank bits 4 may correspond to one light emitting unit.
  • one signal unit may correspond to a plurality of light emitting units, for example, one signal unit itself may be comprised of an array of light emitting units.
  • a blank bit may also correspond to a plurality of light emitting units.
  • a light source may be included in the light unit, which may use various light emitting techniques, such as the use of LED lights. The number of illumination sources in each illumination unit may be one or more according to different usage requirements.
  • the optical tag may further include a controller, and a battery or a power source or the like, wherein the controller is for controlling a light wave frequency and a blinking manner of the light source in the light emitting unit, and the battery or the power source supplies energy to the controller and the light source.
  • the controller can independently control each of the light emitting units, and can also perform unified control on some of the light emitting units. For example, the controller can uniformly control the light emitting unit of the dynamic blinking positioning mark 2, and the light emitting unit of the static positioning mark 3 or The part is uniformly controlled, and the lighting unit of the blank position 4 is uniformly controlled.
  • the dynamic flickering location indicator 2 can flash at a certain frequency, which can be a change in the properties of the light.
  • This attribute refers to any property that the optical imaging device can recognize in the present application, for example, it may be an attribute perceived by the human eye such as intensity, color, wavelength of light, Other attributes that are not perceptible to the human eye, such as intensity, color or wavelength change of electromagnetic wavelengths outside the visible range of the human eye, or any combination of the above attributes.
  • a change in the properties of light can be a single property change, or a combination of two or more properties can change. When the intensity of the light is selected as an attribute, the light source can be simply turned on or off.
  • FIG. 1B shows the optical label when the attribute of the light emitted by the dynamic blinking position indicator 2 changes.
  • the definition of the above attributes applies equally to the static positioning identifier 3, the blank bit 4, and the attribute of the light emitted by the signal unit 1.
  • the dynamic blinking positioning mark 2, the static positioning mark 3, the blank bit 4, and the signal unit 1 can work with different attributes.
  • the dynamic blinking positioning mark 2 can realize the flickering effect by using different color conversions.
  • Signal unit 1 can use different light intensities to represent different information.
  • the multi-frame image can be continuously acquired by the optical imaging device, and the dynamic flickering positioning mark 2 can be quickly and accurately recognized and the position determined by performing image difference on the acquired multi-frame image. .
  • the exact location of the static location indicator 3 can be further identified in its vicinity.
  • the static positioning indicator 3 presents a fixed optical mode during operation.
  • the static positioning marker 3 in one embodiment is presented as a return box, and pixels of different attributes in the horizontal and vertical directions at its horizontal centerline and vertical centerline (black and white black pixels in this embodiment) The ratio can be set to 1:1:1.
  • four blank bits composed of white pixels may be provided in the optical tag as shown in FIG. 1A, which ensure whether the horizontal or vertical direction is used. Scanning, static positioning marker 3 black and white black pixel ratio obeys 1:1:1.
  • the positions of the respective signal units 1 in the optical label can be determined by means of the positions of the dynamic blinking positioning indicator 2 and the static positioning indicator 3 for data identification or Read.
  • the signal unit 1 is a small square light-emitting unit other than the dynamic blinking positioning mark 2, the static positioning mark 3, and the blank bit 4 in the optical tag, or may be a part of these light-emitting units.
  • the imaging of the optical tag may be distorted or deformed to some extent. Can be based on optical imaging The perspective principle is used to consider these distortions or distortions during the identification of optical tags.
  • each signal unit 1 may have a specific property, which, as described above, may be any property that the optical imaging device can perceive, including attributes that are not perceptible to the human eye.
  • "0" or "1" of binary digital information can be represented by controlling the turning on and off of the lighting unit corresponding to each signal unit 1, so that all signal units 1 in one frame of the optical label Can be used to represent a sequence of binary digital information.
  • each signal unit 1 can be used not only to represent a binary number, but also to represent data in ternary or larger hexadecimal.
  • the intensity of light emitted by the light emitting unit can be set to be selectable from three or more levels, or by setting the color of light emitted by the light emitting unit to be selectable from three or more colors
  • the selection is made such that each signal unit 1 represents ternary or larger data by using a combination of intensity and color, and other means deemed feasible by those skilled in the art.
  • the signal unit 1 in the optical tag can change the attribute of the light emitted by the signal unit 1 in the optical tag at a certain frequency (which may be the same as the blinking frequency of the dynamic flickering positioning mark 2), therefore, the light Tags can represent different data information at different times, for example, different sequences of binary digital information.
  • each frame of image can be used to represent a sequence of information.
  • the optical label is schematically set as a 9 ⁇ 9 array composed of light emitting units
  • the dynamic blinking positioning mark 2 therein is set as a larger square in the middle of the light label (3 ⁇ 3 composed of the light emitting unit) Array)
  • the static positioning identifier 3 therein to three larger singular boxes of the corners of the optical label (again, a 3 ⁇ 3 array of light-emitting units)
  • the shape, size, and the like of the optical tag, the size, shape, position, number, and the like of the dynamic flickering positioning mark 2 and the static positioning mark 3 are not limited to the above embodiments, but may be changed according to actual needs.
  • the optical label may not be a 9 ⁇ 9 array, and may not even be a square; the dynamic blinking positioning identifier 2 may not only have one, may not be located in the middle of the optical label, may not be a 3 ⁇ 3 array, or may not be a square; static The location identifiers 3 may not be three, may not be located at the corners of the optical tags, may not be 3 ⁇ 3 arrays, or may not be squares. In one embodiment, blank bits can be omitted in the optical tag.
  • Optical labels can be made using optical imaging equipment or image acquisition equipment that are common in the art.
  • Imaging The optical imaging device or image acquisition device may include an image acquisition component, a processor, a memory, and the like.
  • the optical imaging device or image acquisition device may be, for example, a smart mobile terminal having a photographing function, including a mobile phone, a tablet, smart glasses, etc., which may include an image capture device and an image processing module.
  • the user visually finds the optical tag within a range of distance from the optical tag, and scans the optical tag by performing the information capture and interpretation process by causing the imaging sensor of the mobile terminal to face the optical tag.
  • the video acquisition frequency of the mobile terminal can be set to be greater than or equal to twice the blinking frequency of the optical tag.
  • the process of identifying and decoding is finally completed.
  • the serial number, the check digit, the time stamp, and the like may be included in the information transmitted by the optical tag.
  • a start frame or an end frame may be given in a plurality of image frames as needed, or both, for indicating a start or end position of a complete period of the plurality of image frames, the start frame or the end frame may be It is set to display a particular combination of data, for example: all 0s or all 1s, or any special combination that will not be the same as the information that may actually be displayed.
  • the optical tag 30 typically includes a controller and a light source for controlling the light source to emit different light to convey different information.
  • the user 10 can perform image acquisition on the optical tag 30 using the image capture device 20 (eg, a cell phone) and authenticate the validity of the optical tag 30 by the authentication server 40.
  • the image capture device 20 typically has a communication function.
  • Figure 3 illustrates a flow chart of an anti-counterfeiting method in accordance with one embodiment of the present invention.
  • a one-way hash function is used for illustration, but those skilled in the art can understand that other functions or the like are also feasible, and are not limited to the one-way hash function.
  • the anti-counterfeiting method includes the following steps.
  • the controller of the optical tag 30 starts with t 0 and inputs the current authentication time (step 301) into the function Hash() every time an integer number of time periods T to obtain an output value (step 302).
  • the Hash() can be a pre-selected one-way hash function with initial parameters set.
  • the Hash() and initial parameter settings can be set to be kept secret to the public.
  • a time period T is set in advance as the authentication period and the starting point t 0 is set in advance, T>0, t 0 can be any time of the day, and the recording format of t 0 can be hh:mm:ss, instant: minute :second.
  • t 0 + nT (n is a natural number) can be referred to as an authentication time. Therefore, the possible authentication moments can be preset.
  • the triplet ⁇ Hash(), T, t 0 ⁇ can be obtained.
  • the triplet can be sent to the controller of the optical tag 30, which can be sent to the authentication server 40. In one embodiment, the triplet can also be sent to the authentication server 40. Any one of the triplets ⁇ Hash(), T, t 0 ⁇ can be artificially set and notified to the controller of the optical tag 30 and the authentication server 40. In one embodiment, T and t 0 may be published for public discovery so that they are known by the user through a public information query. One way of pre-setting possible authentication moments is described above, but those skilled in the art will appreciate that any other feasible manner may be employed. In one embodiment, the controller of the optical tag 30 can calculate the output value to be displayed at the current authentication time in advance of the current authentication time.
  • the output value obtained in step 302 can be displayed as information transmitted by the optical tag 30 or as part of the information, and displayed at the current authentication time (step 303).
  • the information displayed by the optical tag 30 at each authentication time (t 0 + nT) may be referred to as verification information, and may include a corresponding identification bit to indicate that it is verification information, and may also include a corresponding authentication time.
  • the controller of the optical tag 30 can input the respective authentication time (t 0 +nT) into the Hash() in advance to calculate the output value to be displayed at each authentication time in advance, and in the corresponding authentication.
  • the output value is displayed as part of the information transmitted by the optical tag 30 or a part of the information.
  • the output value may not be calculated by the optical tag 30 or its controller, but may be from other devices capable of communicating with the optical tag 30 (eg, for providing the optical tag 30 with information to be displayed).
  • the server receives the output value or receives the verification information to be displayed.
  • the user 10 can collect the information conveyed by the optical tag 30 at the current time t i by the image acquisition device 20. If the user 10 has doubts about the authenticity of the optical tag 30, the user 10 can use the public information T and t 0 to use any one of the authentication times after the current time t i as the current authentication time t, and then the image collecting device 20 collects The verification information displayed by the optical tag 30 at the current authentication time t, and the first verification value X is generated based on the verification information (step 304). In one embodiment, the first authentication instant after the current time t i may be taken as the current authentication instant t. The image capture device 20 can record the current authentication instant t (step 305). In one embodiment, the user may not need to know T and t 0 , but continuously perform image acquisition on the optical tag 30 until the verification information is collected.
  • the image collection device 20 transmits the current authentication time t and the first verification value X to the authentication server 40 (step 306).
  • the image collection device 20 may not record the current authentication time t, or may not send the current authentication time t itself to the authentication server 40, but may transmit other information that can be used for identification.
  • the information of the current authentication time t may be transmitted.
  • the image collection device 20 may transmit the generation time or the transmission time of the first verification value X together when transmitting the first verification value X to the authentication server 40, so that the authentication server 40 may be based on the generation time of the first verification value X or The transmission time is used to identify the previous authentication time before it as the current authentication time t.
  • the image capture device 20 may also not send any information that can be used to identify the current authentication time t to the authentication server 40, but rather is inferred by the authentication server 40 based on the time at which the first verification value X was received. Current authentication time t.
  • the authentication server 40 may select a number of authentication moments near the time when the first verification value X is received. For example, the authentication server 40 may select two or more authentication moments before the time when the first verification value X is received and one or several authentication moments thereafter.
  • the authentication server 40 may select only two or more authentication moments before the time when the first verification value X is received. These selected authentication instants can be sequentially used as the current authentication instant t to perform the steps described below.
  • the optical tag 30 is considered to be a legal optical tag as long as the verification result of the current candidate authentication time t indicates that the optical tag 30 is a legal optical tag.
  • the authentication server 40 inputs the current authentication time t to the same one-way hash function Hash() as the image capturing device 20 (step 307), obtains an output value, and uses the output value as the second verification value Y (step 308). In one embodiment, in the case where the triplet is transmitted to the authentication server 40, the authentication server 40 may also calculate an output value corresponding to each authentication time in advance.
  • the optical label 30 By comparing the first verification value X with the second verification value Y, it can be determined whether the two match (step 309), and if the two match, the optical label 30 can be determined to be a legal optical label (real optical label) (step 310). Otherwise, it is judged that the optical tag 30 is an illegal optical tag (a fake optical tag) (step 311).
  • the first verification value X and the second verification value Y are mutually matched to mean that they are the same. In other embodiments, the first verification value X and the second verification value Y do not match each other (eg, the controller of the optical tag 30 passes the output value of the function Hash() as the optical tag 30. In the case of a part of the information, there is a certain predetermined relationship or association between the two.
  • the functions employed by the authentication server 40 and the optical tag 30 may not be the same function, but two different functions that are associated with each other.
  • the authentication server 40 and the optical tag 30 can change their functions after a period of time (for example, on a regular basis). the way).
  • the authentication server 40 can transmit the determination result to the image collection device 20.
  • the anti-counterfeiting method may include the following steps.
  • the controller of the optical tag 30 obtains the current authentication instant (step 401) and inputs it into the encryption algorithm to obtain an output value (step 402).
  • the current authentication time is selected from a predetermined series of possible authentication moments, and the optical tag 30 knows the possible authentication time.
  • the possible authentication moments may be set in the manner described above, or any other feasible manner may be employed.
  • step 402 in addition to using the current authentication instant as an input to the encryption algorithm, other inputs may be further added, such as an identification number for uniquely identifying the optical tag 30.
  • the output value obtained at step 302 can be displayed as information transmitted by the optical tag 30 or as part of the information, and displayed at the current authentication time (step 403).
  • the information displayed by the optical tag 30 at each authentication time may be referred to as verification information, and may include a corresponding identification bit to indicate that it is verification information.
  • the controller of the optical tag 30 may input each authentication time into the encryption algorithm in advance to calculate an output value to be displayed at each authentication time in advance, and use the output value as the light at the corresponding authentication time.
  • the information conveyed by the tag 30 or a portion of the information is displayed.
  • the output value may not be calculated by the optical tag 30 or its controller, but may be from other devices capable of communicating with the optical tag 30 (eg, for providing the optical tag 30 with information to be displayed).
  • the server receives the output value or receives the verification information to be displayed.
  • the user 10 can collect the information conveyed by the optical tag 30 at the current time t i by the image acquisition device 20. If the user 10 has doubts about the authenticity of the optical tag 30, the user 10 can use the image capture device 20 to collect the photo tag 30 displayed at the current authentication time t at any of the authentication instants (the authentication instant as the current authentication instant t). The information is verified and a first verification value X is generated based on the verification information (step 404).
  • the user may be aware of the possible authentication moments and may use the first authentication moment or any of the authentication moments after the current time t i as the current authentication instant t. In one embodiment, the user may not have to know the possible authentication moments, but continuously perform image acquisition on the optical tag 30 until the verification information is collected.
  • the image collection device 20 transmits the first verification value X to the authentication server 40 (step 405).
  • the authentication server 40 performs a decryption algorithm on the first verification value X to obtain a decryption result (step 406).
  • the authentication server 40 analyzes the decryption result to judge the authenticity of the optical tag 30 (step 407). For example, if the time information obtained by the authentication server 40 from the decrypted result satisfies a predetermined criterion, it can be judged that the optical tag 30 is authentic.
  • the predetermined criterion may be differently set according to an actual situation, a security level, etc., for example, the predetermined criterion may be that a difference between a time obtained from the decryption result and a current time of the authentication server 40 should be less than a predetermined threshold; or, from decryption The difference between the time instant obtained in the result and the current time of the authentication server 40 should be less than a predetermined threshold, and the time should belong to a possible authentication time (in the case where the authentication server 40 is also aware of the possible authentication time); or, the decryption result The difference between the time instant obtained and the current time of the authentication server 40 should be less than a predetermined threshold, and before the current time (in the case where there is no significant time out of synchronization between the authentication server 40 and the optical tag 30); If the authentication server 40 can obtain the time information from the decrypted result, but the time does not satisfy the predetermined criterion, the authentication server 40 can assume that, for example, a replay attack has occurred,
  • the authentication server 40 can know which optical tag 30 is being spoofed. If the authentication server 40 cannot obtain any time information from the decrypted result, it can directly judge that the optical tag 30 is spoofed. To increase the overall security of the system, the authentication server 40 and the optical tag 30 can change their decryption and encryption functions (e.g., in a periodic manner) after a period of time.
  • the authentication server 40 can transmit the determination result to the image collection device 20.
  • the clock of the optical tag 30 in the anti-counterfeiting system of the present invention can be calibrated using various possible means, for example, manually calibrating the clock of the optical tag 30 over a period of time, or the light
  • the tag 30 can receive standard time so that automatic calibration can be performed.
  • time information may be included in some information transmitted by the optical tag 30, and the image collection device of the user may send the time information together with the identification information of the optical tag 30 to the authentication server 40, thereby authenticating the server.
  • 40 may be aware of the error between the clock of the optical tag 30 and the clock or standard clock of the authentication server 40, and record the error value to correct the out-of-synchronization between the clock of the authentication server 40 and the clock of the optical tag 30, thereby achieving the purpose of synchronizing the clock.
  • the authentication server 40 receives the authentication request of the user (including the identification information of the optical tag 30)
  • the authentication server 40 combines the error attribute of the clock of the optical tag 30 according to the time difference between the last authentication server 40 and the optical tag 30 correction time.
  • the clock error of the optical tag 30 is 1 second every 24 hours
  • the clock error of the optical tag 30 and the authentication server 40 at this time can be calculated.
  • the authentication server 40 knows the error of the clock of the optical tag 30 at any time, for the anti-counterfeiting scheme shown in FIG. 3, based on the error, and optionally considering the communication delay, the time period T, etc.
  • the authentication server 40 can be adapted. Select one or more possible authentication moments. For example, in the case where the authentication server 40 described above selects several authentication moments near the time when the first verification value X is received, the authentication server 40 can adjust the time at which the first verification value X is received based on the error.
  • the authentication server 40 can appropriately set the predetermined standard that it should satisfy for the time obtained from the decrypted result. .
  • the predetermined criterion is that the difference between the time obtained from the decrypted result and the current time of the authentication server 40 should be less than a predetermined threshold (that is, the time obtained from the decrypted result should fall within a certain time interval)
  • authentication The server 40 can translate the time interval based on the error to achieve a more accurate determination.
  • the anti-counterfeiting method of the present invention can be automated when the user performs continuous image acquisition of the optical tag 30 using the image capture device 20, and the user does not even realize that it is verifying the optical tag 30. When the verification is successful, no prompt may be given to the user, and when the verification fails, the user may be prompted that the optical tag 30 is spoofed.
  • the anti-counterfeiting method of the present invention can be applied not only to the optical tag shown in FIG. 1A, but also to other optical tags (or light sources) that can be used to transmit information, as long as the information transmitted by the optical tag can be changed over time.
  • the anti-counterfeiting method of the present invention can be applied to a light source that transmits information through different stripes based on a rolling shutter effect of CMOS (for example, the device described in Chinese Patent Publication No. CN104168060A).
  • the anti-counterfeiting method of the present invention can also be applied to an array of optical tags (or light sources) as long as the information transmitted by the array can be changed over time.
  • the verification information displayed by the optical tag 30 at any authentication time (t 0 +nT) in the above anti-counterfeiting method may be completely presented in one display of the optical tag 30 (that is, may be included in the image acquisition device 20.
  • the image of one frame of the optical tag 30 can also be presented in multiple displays of the optical tag 30.
  • the amount of information that is passed in each display may not be sufficient to cover the entire output value of the function Hash(), in which case multiple times can be initiated at the time of authentication.
  • the output value is successively presented in the display (ie, the verification information is passed through successive multiple displays of the optical tag).
  • the user can continuously collect the multi-frame image of the optical tag starting from the authentication time by the image capturing device 20, and obtain corresponding verification information based on the multi-frame image.
  • corresponding identification bits may also be included in the multi-frame image, or some frames may be selected as the identification frame. Therefore, the "information displayed at a certain time" mentioned throughout the present application does not only refer to information that is displayed at that moment, but may also be a series of information displayed from that moment.
  • a specific application example of the anti-counterfeiting method of the present invention is as follows:
  • the mall M publishes the information of the merchandise through the optical label L.
  • Mall M selects MD5 algorithm as a one-way function, the selected time period is 5 seconds, the starting time is 00:00:00, and the triplet ⁇ MD5; 5,00:00:00 ⁇ is obtained, and the triplet is sent to
  • the optical label L transmits the MD5 algorithm to the authentication server at the same time; at the same time, (5,00:00:00) is published to the public; the optical label L takes the current time as input every 5 seconds starting from 00:00:00, and input In the MD5 algorithm, an output value is obtained; the optical label L displays the MD5 output value as a light label for one frame at a corresponding time; at 12:30:33, the customer G wants to purchase the product through the optical label L, but the light is The authenticity of the label L is doubtful; the customer G collects the closest distance to the 12:30:33 from his personal mobile phone H according to the public information (5,00:00:00), and satisfies the starting time 00:00
  • the attacker does not know the one-way function used by M and its initial parameters, so it is impossible to forge the authentication frame; and the authentication frame changes with time, so it can resist the attacker's replay attack.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

L'invention concerne un procédé et un système anti-contrefaçon pour un dispositif de communication optique. Le procédé anti-contrefaçon pour le dispositif de communication optique consiste à : recevoir une première valeur de vérification à partir d'un appareil de capture d'image d'un utilisateur, l'appareil de capture d'image obtenant des informations du dispositif de communication optique affichées à un certain moment en fonction du temps par capture d'une image du dispositif de communication optique, et la première valeur de vérification est obtenue sur la base des informations ; entrer le temps à une première fonction pour obtenir une seconde valeur de vérification ; et vérifier l'authenticité du dispositif de communication optique en fonction de la première valeur de vérification et de la seconde valeur de vérification, le temps étant l'un parmi des temps d'authentification possibles prédéterminés.
PCT/CN2017/099635 2016-08-30 2017-08-30 Procédé et système anti-contrefaçon pour dispositif de communication optique WO2018041131A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780051636.0A CN109792387B (zh) 2016-08-30 2017-08-30 光通信装置防伪方法及系统

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610785929.9 2016-08-30
CN201610785929.9A CN106330461B (zh) 2016-08-30 2016-08-30 一种基于单向散列函数的光标签防伪方法及系统

Publications (1)

Publication Number Publication Date
WO2018041131A1 true WO2018041131A1 (fr) 2018-03-08

Family

ID=57789826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/099635 WO2018041131A1 (fr) 2016-08-30 2017-08-30 Procédé et système anti-contrefaçon pour dispositif de communication optique

Country Status (2)

Country Link
CN (2) CN106330461B (fr)
WO (1) WO2018041131A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330461B (zh) * 2016-08-30 2019-06-18 西安小光子网络科技有限公司 一种基于单向散列函数的光标签防伪方法及系统
CN109934319B (zh) * 2017-12-19 2021-06-15 陕西外号信息技术有限公司 光通信装置以及相应的防伪方法和系统
CN109934032B (zh) * 2017-12-19 2020-07-24 陕西外号信息技术有限公司 光通信装置以及相应的防伪方法和系统
CN115204338B (zh) * 2022-07-25 2024-08-06 蚂蚁区块链科技(上海)有限公司 图形码生成方法和装置、图形码验证方法和装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2768091Y (zh) * 2004-12-29 2006-03-29 王庆旺 可用于各种商品中的防伪装置
CN104751341A (zh) * 2015-04-14 2015-07-01 贵州天酒酒业销售有限公司 基于二维码动态口令的商品防伪方法
WO2016065861A1 (fr) * 2014-10-31 2016-05-06 杭州沃朴物联科技有限公司 Procédé et système de vérification en temps réel de validité d'étiquette anti-contrefaçon de mot de passe dynamique basé sur la synchronisation d'horloge
CN106330461A (zh) * 2016-08-30 2017-01-11 西安小光子网络科技有限公司 一种基于单向散列函数的光标签防伪方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7497379B2 (en) * 2004-02-27 2009-03-03 Microsoft Corporation Counterfeit and tamper resistant labels with randomly occurring features
JP2007214691A (ja) * 2006-02-07 2007-08-23 Murata Mach Ltd 画像形成装置
WO2009054384A1 (fr) * 2007-10-22 2009-04-30 Sharp Kabushiki Kaisha Appareil de reproduction, appareil de communication mobile, serveur de gestion et système de distribution de contenu
CN102236773A (zh) * 2010-04-30 2011-11-09 航天信息股份有限公司 射频识别加密验证系统和方法
CN105184590A (zh) * 2015-09-25 2015-12-23 三明学院 应用于钢材的激光在线高效蚀刻及产品防伪溯源系统
CN105701673B (zh) * 2016-02-29 2017-06-13 依波精品(深圳)有限公司 一种基于二维码的手表防伪溯源方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2768091Y (zh) * 2004-12-29 2006-03-29 王庆旺 可用于各种商品中的防伪装置
WO2016065861A1 (fr) * 2014-10-31 2016-05-06 杭州沃朴物联科技有限公司 Procédé et système de vérification en temps réel de validité d'étiquette anti-contrefaçon de mot de passe dynamique basé sur la synchronisation d'horloge
CN104751341A (zh) * 2015-04-14 2015-07-01 贵州天酒酒业销售有限公司 基于二维码动态口令的商品防伪方法
CN106330461A (zh) * 2016-08-30 2017-01-11 西安小光子网络科技有限公司 一种基于单向散列函数的光标签防伪方法及系统

Also Published As

Publication number Publication date
CN106330461B (zh) 2019-06-18
CN106330461A (zh) 2017-01-11
CN109792387A (zh) 2019-05-21
CN109792387B (zh) 2022-09-16

Similar Documents

Publication Publication Date Title
WO2018041131A1 (fr) Procédé et système anti-contrefaçon pour dispositif de communication optique
JP6545192B2 (ja) 変調光源からの照光から復号されたタイムスタンプを使用する、捕捉された画像の検証
CN108764052B (zh) 图像处理方法、装置、计算机可读存储介质和电子设备
CN108805024B (zh) 图像处理方法、装置、计算机可读存储介质和电子设备
CN106529512B (zh) 活体人脸验证方法及装置
WO2015192669A1 (fr) Procédé et système d'invite de positionnement de balayage de code à deux dimensions
US20110096246A1 (en) Visual Identifier for Images on an Electronic Display
WO2018041139A1 (fr) Procédé et système anti-contrefaçon basés sur une réponse active pour dispositif de communication optique
JP2013223047A (ja) 伝送システム、送信装置および受信装置
CN108769665B (zh) 数据传输方法、装置、电子设备和计算机可读存储介质
US11409890B2 (en) Video recording apparatus and video recording verification system, and video recording method and video verification method
JP2019148930A (ja) 二次元コード、二次元コード出力システム、二次元コード出力方法、二次元コード読取システム、二次元コード読取方法及びプログラム
CN108712400B (zh) 数据传输方法、装置、计算机可读存储介质和电子设备
US20240235847A1 (en) Systems and methods employing scene embedded markers for verifying media
WO2016001339A1 (fr) Communication de données de code à barres
CN112565922A (zh) 一种广告监播方法、广告监播装置及计算机可读存储介质
US10523365B2 (en) Discrimination method and communication system
CN107944326B (zh) 一种数据获取方法、数据处理方法与系统
US10567699B2 (en) Information processing apparatus to improve image quality by removing flicker component from captured image
Li et al. Screenid: Enhancing qrcode security by fingerprinting screens
WO2019120050A1 (fr) Appareil de communication optique et procédé et système anti-contrefaçon correspondants
FR3083627A1 (fr) Procede de transmission securisee de donnees cryptographiques
US20210273795A1 (en) Trusted imaging
WO2019120049A1 (fr) Appareil de communication optique et procédé et système anti-contrefaçon correspondants

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17845433

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17845433

Country of ref document: EP

Kind code of ref document: A1