WO2019075650A1 - 纸张防伪方法及系统 - Google Patents

纸张防伪方法及系统 Download PDF

Info

Publication number
WO2019075650A1
WO2019075650A1 PCT/CN2017/106618 CN2017106618W WO2019075650A1 WO 2019075650 A1 WO2019075650 A1 WO 2019075650A1 CN 2017106618 W CN2017106618 W CN 2017106618W WO 2019075650 A1 WO2019075650 A1 WO 2019075650A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
paper
authentication
bit string
electronic tag
Prior art date
Application number
PCT/CN2017/106618
Other languages
English (en)
French (fr)
Inventor
杨晴
张胜利
王晖
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/106618 priority Critical patent/WO2019075650A1/zh
Publication of WO2019075650A1 publication Critical patent/WO2019075650A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns

Definitions

  • the invention belongs to the technical field of communications, and in particular relates to a paper anti-counterfeiting method and system.
  • the invention provides a paper anti-counterfeiting method and system, which enhances the security of the anti-counterfeit paper and the forgery of the anti-counterfeit paper.
  • a first aspect of the embodiments of the present invention provides a paper anti-counterfeiting method for performing anti-counterfeiting authentication on a paper with an electronic tag, comprising: a card reader acquiring identification information in the electronic tag, generating authentication information, and transmitting the information to the An electronic tag, the authentication information corresponding to the identification information; the electronic tag generating response information according to the received authentication information, and returning to the card reader; the card reader using the received response information, Paper is certified for security.
  • a second aspect of the embodiments of the present invention provides a system including: a card reader and an electronic tag, the electronic tag being built in a paper, the electronic tag comprising at least one chip and an antenna connected to at least one of the chips;
  • the card reader is configured to acquire identification information in the electronic tag, generate authentication information, and send the information to the electronic tag, where the authentication information corresponds to the identifier information; where the chip stores the chip Identification information;
  • the electronic tag is configured to generate response information according to the received authentication information, and return the card to the card reader; the card reader is further configured to perform anti-counterfeiting authentication on the paper by using the received response information.
  • the paper anti-counterfeiting method and system provided by the above embodiments of the invention obtains the identification information of the electronic tag installed in the paper through the card reader, transmits the authentication information to the electronic tag, and then the electronic tag generates the response information according to the authentication information, and sends the response information to the reading.
  • the card reader uses the received response information to identify the paper for security. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
  • FIG. 1 is a schematic structural diagram of a paper to be authenticated in a paper anti-counterfeiting method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an implementation process of a paper anti-counterfeiting method according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an implementation example of a practical application example of using a paper anti-counterfeiting method according to another embodiment of the present invention.
  • FIG. 5 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a paper anti-counterfeiting system according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a paper anti-counterfeiting system according to another embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a paper to be authenticated in a paper anti-counterfeiting method according to an embodiment of the present invention.
  • an electronic tag is added inside the paper. Since the size of the electronic label is very small, it does not affect the normal use of the paper. In practical applications, the electronic label can be placed anywhere inside the paper without affecting the use of the paper.
  • FIG. 2 is a schematic diagram of an implementation process of a paper anti-counterfeiting method provided by an embodiment of the invention.
  • the method is used for anti-counterfeiting certification of the paper with the built-in electronic label shown in FIG.
  • the method mainly includes the following steps:
  • the card reader acquires the identification information in the electronic tag, generates the authentication information, and sends the information to the electronic tag.
  • the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
  • the selected electronic tag is RFID (Radio Frequency Identification, radio frequency identification tag, which can identify a specific target by radio signal and read and write related data.
  • the selected card reader should be an RFID reader.
  • the electronic tag can also be NFC (Near Field Communication (Near Field Communication), UHF (Ultra High Frequency) and other electronic tags with similar functions.
  • the identification information in the electronic tag is unique, and is used for uniquely identifying the identity of the chip in the electronic tag, and may be a factory serial number corresponding to the electronic tag, or a label of the information carried by the paper, and is not limited to the actual application. .
  • the card reader obtains the identification information in the electronic tag, the authentication information is generated.
  • the authentication information corresponds to the identification information in the electronic tag.
  • the authentication information is random data, which can further improve the security of the paper.
  • the card reader then sends the authentication information to the electronic tag to cause the electronic tag to perform the next step.
  • the electronic tag generates response information according to the received authentication information, and returns the information to the card reader.
  • the electronic tag After receiving the authentication information, the electronic tag processes the authentication information to obtain response information. The electronic tag then sends the response message to the card reader to cause the card reader to perform the next step.
  • the card reader uses the received response information to perform anti-counterfeiting authentication on the paper.
  • the card reader receives the response information, compares the information included in the response information with the preset information, and determines whether the two are consistent to perform anti-counterfeiting authentication on the paper.
  • the subsequent operations of the authentication pass are performed, for example, the prompt information that passes the authentication is output. If the authentication fails, the subsequent operations that fail the authentication are performed, for example, the warning information that fails the authentication is output.
  • the card reader obtains the unique identification information in the electronic tag set in the paper, generates the authentication information and sends the information to the electronic tag, and the electronic tag generates the response information according to the authentication information, and sends the response message to the card reader.
  • the card reader uses the information contained in the received response message to compare with the preset information to perform anti-counterfeiting identification on the paper. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
  • FIG. 3 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention, which relates to the technical field of communications.
  • the method mainly includes the following steps:
  • the card reader acquires the identification information in the electronic tag, generates a random bit string of a preset length, and sends the information to the electronic tag as the authentication information.
  • the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
  • the selected electronic tag is an RFID tag
  • the electronic tag can identify a specific target by radio signals and read and write related data, and the selected card reader should be an RFID card reader.
  • the identification information in the electronic tag is unique, and is used for uniquely identifying the identity of the chip in the electronic tag, and may be a factory serial number corresponding to the electronic tag, or a label of the information carried by the paper, and is not limited to the actual application. .
  • a random bit string of a preset length is generated as the authentication information.
  • the authentication information corresponds to the identification information in the electronic tag. In practical applications, the preset length is a fixed value, which can be defined by the user.
  • the electronic tag encrypts the random bit string by using a preset key to obtain response information.
  • the electronic tag uses a symmetric encryption algorithm to encrypt the random bit string with a preset key to obtain response information.
  • a symmetric encryption algorithm to encrypt the random bit string with a preset key to obtain response information.
  • AES Advanced Encryption Standard
  • Encryption Standard an algorithm that uses the same keys used in encryption and decryption. It can be understood that, since the authentication information is a fixed-length random bit string, the response information obtained by encrypting the fixed-length random bit string is also a fixed-length bit string.
  • the electronic tag sends the response information to the card reader.
  • the electronic tag sends the obtained response information to the card reader, so that the card reader performs the next step.
  • the card reader sends the identification information, the random bit string, and the received response information to the server.
  • the card reader sends the identification information acquired from the electronic tag, the generated random bit string, and the received response information to the server, so that the server performs the next step.
  • the server receives the identifier information, the random bit string, and the response information, acquires a key corresponding to the identifier information, and decrypts the response information by using the key.
  • the server acquires a key corresponding to the identification information.
  • a database is pre-configured in the server, and the database is used to store the correspondence between the identification information of different electronic tags and each key.
  • the server After receiving the identifier information sent by the card reader, the server searches for a key corresponding to the identifier information in the database according to the identifier information. Then, the server decrypts the received response information by using the found key to obtain the decrypted response information. It can be understood that the decrypted response information is a fixed length bit string.
  • the server compares the decrypted response information with the received random bit string.
  • the server compares the decrypted response information with the received random bit string. It can be understood that since the response information is obtained by encrypting the random bit string, the decrypted response information and the random bit string are usually bit strings of the same length. Therefore, in order to increase the comparison speed, it is first possible to compare whether the decrypted response information and the received random bit string have the same length, and if the lengths are different, it is confirmed that the two are different. If the lengths are the same, it is further compared whether the decrypted response information and the random bit string are identical.
  • step S207 the server outputs a first notification message confirming that the paper passes the authentication according to a preset manner.
  • step S208 the server outputs a second notification message that confirms that the paper has not passed the authentication according to a preset manner.
  • the server outputs a first notification message for confirming that the paper passes the authentication according to a preset manner.
  • the first notification information may be sent to the card reader, and then the word passing the authentication is displayed on the card reader; or The first notification information is sent to other terminals associated with the card reader, so that the other terminal notifies the user that the paper passes the anti-counterfeiting authentication according to the first notification information.
  • the manner in which the server outputs the second notification message for confirming that the paper passes the authentication according to the preset manner is the same as the first notification message that the server outputs the confirmation that the paper passes the authentication according to the preset manner, and details are not described herein again.
  • the paper with the built-in electronic label is currency and the identification information is 123, as shown in FIG. 4 .
  • the card reader acquires the identification information 123 in the electronic tag installed in the paper, and randomly generates the bit string 1011010 as the authentication information and transmits it to the electronic tag.
  • the electronic tag encrypts the authentication information 1011010 with a preset key, obtains response information 1101011, and returns it to the card reader.
  • the card reader transmits the received response information 1101011, the generated authentication information 1011010, and the identification information 123 to the server.
  • the server acquires a key corresponding to the identification information 123 in the database, and decrypts the response information 1101011 using the key. If the decrypted response information is 1011010, which is the same as the authentication information 1011010, the server outputs a first notification message confirming the paper passing authentication to the card reader; if the decrypted response information is not 1011010, unlike the authentication information 1011010, the server The card reader outputs a second notification message confirming that the paper has not passed the authentication.
  • the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm, and the unique identification information and the corresponding key are acquired first, and then the identifier is carried.
  • the electronic label of information and key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.
  • FIG. 5 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention, which relates to the technical field of communications.
  • the method mainly includes the following steps:
  • the card reader obtains the identifier information in the electronic tag, randomly generates a bit string of a preset length, encrypts the bit string with a preset public key, obtains the authentication information, and sends the authentication information to the electronic tag.
  • the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
  • the identification information in the electronic tag is unique and is used to uniquely identify the identity of the chip in the electronic tag.
  • a bit string of a preset length is randomly generated. In practical applications, the length is a fixed value and can be defined by the user.
  • the card reader encrypts the randomly generated bit string of a preset length by using an asymmetric algorithm.
  • the asymmetric algorithm is ECC (Elliptic) Curve cryptography
  • the key of the algorithm consists of a pair of public and private keys, that is, the keys in the encryption and decryption process are different, but the information encrypted by the private key can only use the corresponding public key. Decrypted, and public key encrypted information can only be decrypted with a private key.
  • a public key corresponding to the identification information in the electronic tag is pre-configured in the card reader. According to the obtained identification information, the corresponding public key is searched, and then the randomly generated bit string is encrypted by using the found public key to obtain authentication information. The authentication information corresponds to the acquired identification information.
  • the electronic tag decrypts the received authentication information by using a preset private key, and uses the decrypted authentication information as the response information.
  • the electronic tag receives the authentication information, decrypts the authentication information by using a preset private key, and obtains the decrypted authentication information, and uses the information as the response information.
  • This private key corresponds to the public key used by the reader during the encryption process. In practical applications, the private key can be stored in an electronic tag.
  • the electronic tag returns the response information to the card reader.
  • the electronic tag returns the obtained response information to the card reader so that the card reader performs the next step.
  • the card reader compares the received response information with the randomly generated bit string.
  • the response information is obtained by encrypting the bit string randomly generated by the card reader and then decrypting, so the length of the response information is the same as the randomly generated bit string.
  • the response information received and the length of the randomly generated preset length bit string may be firstly compared. If the lengths are not the same, it is determined that the received response information is different from the randomly generated bit string, and the paper does not pass the anti-counterfeiting authentication. If the lengths are the same, whether the received response information and the randomly generated preset length bit string are completely identical.
  • step S305 is performed: outputting a third notification message confirming that the paper passes the authentication according to a preset manner. If the received response information is not exactly the same as the randomly generated bit string of the preset length, step S306 is executed to output a fourth notification message that confirms that the paper has not passed the authentication according to a preset manner.
  • the preset output mode may be: displaying the authentication pass or the authentication failure on the card reader, or sending the third notification information and the fourth notification information to other terminals associated with the card reader, so as to be other terminals.
  • the corresponding authentication result is output to the user according to the third notification information or the fourth notification information.
  • the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm.
  • the unique identification information and the corresponding key are acquired first, and then the The electronic label identifying the information and the key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.
  • FIG. 6 is a schematic structural diagram of a paper anti-counterfeiting system according to an embodiment of the present invention. For the convenience of description, only parts related to the embodiment of the present invention are shown.
  • the paper anti-counterfeiting system illustrated in Figure 6 mainly includes:
  • the card reader 2 and an electronic tag are built in the paper 1.
  • the electronic tag (not shown) includes at least one chip 3 and an antenna 4 connected to at least one chip 3.
  • the number of the chips 3 and the antennas 4 can be increased without affecting the use of the paper 1 to increase the security of the security paper 1.
  • the card reader 2 is configured to acquire the identification information in the electronic tag, generate the authentication information, and send the information to the electronic tag, where the authentication information corresponds to the identification information.
  • the identification information is sent to the reader/writer 2 through the antenna 4.
  • the electronic tag is configured to generate response information according to the received authentication information, and return to the card reader 2.
  • the card reader 2 is also used to perform anti-counterfeiting authentication on the paper 1 by using the received response information.
  • the card reader 2 is further configured to randomly generate a bit string of a preset length, encrypt the bit string with a preset public key, and obtain authentication information, where the public key corresponds to the identification information;
  • the electronic tag is further configured to decrypt the authentication information by using a preset private key, and use the decrypted authentication information as the response information, where the private key corresponds to the public key;
  • the card reader 2 is further configured to compare whether the response information and the bit string are the same;
  • the card reader 2 is further configured to: if the response information is the same as the bit string, output a third notification message that confirms that the paper 1 passes the authentication according to a preset manner;
  • the card reader 2 is further configured to output, according to a preset manner, a fourth notification message that confirms that the paper 1 has not passed the authentication, if the response information is different from the bit string.
  • the card reader obtains the unique identification information in the chip installed in the paper, generates the authentication information and sends the authentication information to the chip, and the chip generates the response information according to the authentication information, and sends the response information to the card reader, and then sends the response information to the card reader.
  • the card reader uses the information contained in the received response information to compare with the preset information to perform anti-counterfeiting identification on the paper. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
  • FIG. 7 is a schematic structural diagram of a paper anti-counterfeiting system according to another embodiment of the present invention. For convenience of description, only parts related to the embodiment of the present invention are shown.
  • the paper security system illustrated in Fig. 7 differs from the system in the embodiment shown in Fig. 6 mainly in that:
  • system further includes: a server 5;
  • the card reader 2 is further configured to generate a random bit string of a preset length, and send the information to the electronic tag as the authentication information;
  • the electronic tag is further configured to encrypt the random bit string by using a preset key to obtain response information.
  • the electronic tag is further configured to send the response information to the card reader 2.
  • the card reader 2 is further configured to send the identification information, the random bit string, and the received response information to the server 5;
  • the server 5 is further configured to receive the identification information, the random bit string, and the response information, acquire a key corresponding to the identification information, and decrypt the response information by using the key.
  • the server 5 is further configured to compare whether the decrypted response information is the same as the random bit string.
  • the server 5 is further configured to output, according to a preset manner, a first notification message that confirms that the paper 1 passes the authentication, if the decrypted response information is the same as the random bit string.
  • the server 5 is further configured to output, according to a preset manner, a second notification message that confirms that the paper 1 has not passed the authentication, if the decrypted response information is different from the random bit string.
  • the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm, and the unique identification information and the corresponding key are acquired first, and then the identifier is carried.
  • the electronic label of information and key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.

Landscapes

  • Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Paper (AREA)

Abstract

本发明实施例公开了一种纸张防伪方法,应用于通信技术领域,包括:读卡器获取电子标签中的标识信息,生成认证信息并发送给电子标签;电子标签根据接收的认证信息生成响应信息,并返回给读卡器;读卡器利用接收的响应信息,对纸张进行防伪认证。本发明实施例还公开了一种纸张防伪系统。该方法及系统可增加防伪纸张的安全性以及防伪纸张的伪造难度。

Description

纸张防伪方法及系统
本发明属于通信技术领域,尤其涉及一种纸张防伪方法及系统。
随着科技发展,电子商务和无纸化办公迅速普及。但是在通讯、合同和艺术等信息领域,使用纸质文件的比重仍然很大。为了保障纸质文件的安全性,防止被伪造,人们通常会对纸质文件进行加密处理。常用的加密方法有物理、化学、光学、物理化学和生物等方法,常见的防伪纸张有水印纸、防复写纸、含安全线的防伪纸、热敏防伪纸以及表面印刷磁条的防伪纸等纸张。
但是,目前的防伪纸张依然存在安全性不够、易于伪造的问题。
发明内容
本发明提供一种纸张防伪方法及系统,增强了防伪纸张的安全性以及防伪纸张的伪造难度。
本发明实施例第一方面提供了一种纸张防伪方法,用于对内置电子标签的纸张进行防伪认证,包括:读卡器获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;所述电子标签根据接收的认证信息生成响应信息,并返回给所述读卡器;所述读卡器利用接收的响应信息,对所述纸张进行防伪认证。
本发明实施例第二方面提供了一种系统,包括:读卡器和电子标签,所述电子标签内置在纸张中,所述电子标签包括至少一个芯片和与至少一个所述芯片连接的天线;所述读卡器,用于获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;所述芯片中存储有所述芯片的标识信息;所述电子标签,用于根据接收的认证信息生成响应信息,并返回给所述读卡器;所述读卡器,还用于利用接收的响应信息,对所述纸张进行防伪认证。
上述发明实施例提供的纸张防伪方法及系统,通过读卡器获取安装在纸张内的电子标签的标识信息,向电子标签发送认证信息,接着电子标签根据该认证信息生成响应信息,并发送给读卡器,然后读卡器利用接收的响应信息对纸张进行防伪辨认。由于电子标签中的标识信息具有唯一性,伪造时需要先获取唯一的标识信息,再制造出携带有该标识信息的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例。
图1为本发明实施例提供的纸张防伪方法中待认证的纸张的结构示意图图;
图2为本发明一实施例提供的纸张防伪方法的实现流程示意图;
图3为本发明另一实施例提供的纸张防伪方法的实现流程示意图;
图4为本发明另一实施例提供的利用纸张防伪方法一实际应用例的实现示意图;
图5为本发明另一实施例的提供的纸张防伪方法的实现流程示意图;
图6为本发明一实施例提供的纸张防伪系统的结构示意图;
图7为本发明另一实施例提供的纸张防伪系统的结构示意图。
具体实施方式
为使得本发明的发明目的、特征、优点能够更加的明显和易懂,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而非全部实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1为本发明实施例提供的纸张防伪方法中待认证的纸张的结构示意图。如图1所示,在传统的纸张制作的过程中,在纸张内部加入电子标签。由于电子标签的体积非常小,因此不会影响纸张的正常使用。在实际应用中,在不影响纸张使用的条件下,电子标签可设置在纸张内部的任意位置。
请参阅图2,为发明一实施例提供的纸张防伪方法的实现流程示意图。该方法用于对图1所示内置电子标签的纸张进行防伪认证。如图2所示,该方法主要包括以下步骤:
S101、读卡器获取电子标签中的标识信息,生成认证信息并发送给电子标签。
具体的,运用可读取电子标签信息的读卡器获取电子标签中的标识信息。可选的,若选用的电子标签为RFID(Radio Frequency Identification,射频识别)标签,该电子标签可通过无线电讯号识别特定目标并读写相关数据,则选用的读卡器应为RFID读卡器。在实际应用中,电子标签还可以是NFC(Near Field Communication,近场通信)、UHF(Ultra High Frequency,特高频)等其他具有类似功能的电子标签。
电子标签中的标识信息具有唯一性,用于唯一识别电子标签中芯片的身份,可为与该电子标签对应的出厂序列号,也可为纸张所载信息的标号,在实际应用中不限于此。读卡器获取电子标签中的标识信息后,生成认证信息。认证信息与电子标签中的标识信息对应。较佳的,该认证信息为随机数据,可进一步提高纸张的安全性。然后读卡器将该认证信息发送给电子标签,以使电子标签执行下一步骤。
S102、电子标签根据接收的认证信息生成响应信息,并返回给读卡器。
具体的,电子标签接收到认证信息后,处理该认证信息得到响应信息。电子标签再将响应信息发送给读卡器,以使读卡器执行下一步骤。
S103、读卡器利用接收的响应信息,对纸张进行防伪认证。
具体的,读卡器接收到响应信息,将响应信息中包含的信息与预设信息进行比较,判断二者是否一致,以对纸张进行防伪认证。
进一步的,若认证通过,则执行认证通过的后续操作,例如:输出通过认证的提示信息。若认证未通过,则执行认证未通过的后续操作,例如:输出未通过认证的预警信息。
在本发明实施例中,读卡器获取设置在纸张内的电子标签中的具有唯一性标识信息,生成认证信息并发送给电子标签,电子标签根据该认证信息生成响应信息,并发送给读卡器,然后读卡器利用接收的响应信息中包含的信息与预设信息进行比较,对纸张进行防伪辨认。由于电子标签中的标识信息具有唯一性,伪造时需要先获取唯一的标识信息,再制造出携带有该标识信息的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
请参阅图3,为本发明另一实施例提供的纸张防伪方法的实现流程示意图,该方法涉及通信技术领域。如图3所示,该方法主要包括以下步骤:
S201、读卡器获取电子标签中的标识信息,生成预设长度的随机比特串,并作为认证信息发送给电子标签。
具体的,运用可读取电子标签信息的读卡器获取电子标签中的标识信息。可选的,若选用的电子标签为RFID标签,该电子标签可通过无线电讯号识别特定目标并读写相关数据,则选用的读卡器应为RFID读卡器。
电子标签中的标识信息具有唯一性,用于唯一识别电子标签中芯片的身份,可为与该电子标签对应的出厂序列号,也可为纸张所载信息的标号,在实际应用中不限于此。读卡器获取电子标签中的标识信息后,生成预设长度的随机比特串,作为认证信息。认证信息与电子标签中的标识信息对应。在实际应用中,该预设长度为固定值,可由用户自行定义。
S202、电子标签利用预置的密钥加密该随机比特串,得到响应信息。
具体的,电子标签接收到作为认证信息的随机比特串后,采用对称加密算法,利用预置的密钥加密该随机比特串得到响应信息。较佳的,可采用AES(Advanced Encryption Standard,高级加密标准)算法,该算法在加密和解密过程中使用的密钥相同。可以理解的是,由于该认证信息为固定长度的随机比特串,则通过对该固定长度的随机比特串进行加密后得到的响应信息,也是固定长度的比特串。
S203、电子标签将响应信息发送给读卡器。
具体的,电子标签将得到的响应信息发送给读卡器,以使读卡器执行下一步骤。
S204、读卡器将标识信息、随机比特串和接收的响应信息发送给服务器。
具体的,读卡器将从电子标签中获取的标识信息、生成的随机比特串和接收的响应信息一同发送给服务器,以使服务器执行下一步骤。
S205、服务器接收标识信息、随机比特串和响应信息,获取与标识信息对应的密钥,利用密钥解密响应信息。
具体的,服务器获取与标识信息对应的密钥。在实际应用中,服务器中预设有数据库,该数据库用于存储不同电子标签的标识信息与各密钥的对应关系。服务器在接收到读卡器发送的标识信息后,根据该标识信息在数据库中查找与标识信息对应的密钥。然后,服务器利用查找到的密钥对接收到的响应信息进行解密,得到解密后的响应信息。可以理解的,解密后的响应信息为固定长度的比特串。
S206、服务器比对解密后的响应信息与接收的随机比特串是否相同。
具体的,服务器比对解密后的响应信息和接收的随机比特串是否相同。可以理解的,由于响应信息是通过对随机比特串加密后得到,所以解密后的响应信息和该随机比特串通常为相同长度的比特串。因此,为提高比对速度,可首先比对解密后的响应信息和接收的随机比特串的长度是否相同,若长度不同,则确认二者不相同。若长度相同,则进一步比对解密后的响应信息和随机比特串是否完全相同。
若解密后的响应信息与随机比特串完全相同,则执行步骤S207:服务器根据预设的方式输出确认纸张通过认证的第一通知消息。
若解密后的响应信息与随机比特串不完全相同不同,则执行步骤S208:服务器根据预设的方式输出确认纸张未通过认证的第二通知消息。
其中,服务器根据预设的方式输出确认纸张通过认证的第一通知消息,例如:可将该第一通知信息发送给读卡器,然后通过读卡器上显示认证通过的字样;或者,也可将第一通知信息发送给与该读卡器关联的其他终端,以便其他终端根据该第一通知信息,通知用户纸张通过防伪认证。
服务器根据预设的方式输出确认纸张通过认证的第二通知消息的方式与服务器根据预设的方式输出确认纸张通过认证的第一通知消息相同,此处不再赘述。
为进一步说明本实施例提供的纸张防伪方法的具体实现过程,假设内置电子标签的纸张为货币,标识信息为123,如图4所示。读卡器获取安装在纸张内的电子标签中的标识信息123,随机生成比特串1011010作为认证信息发送给电子标签。电子标签利用预置的密钥加密该认证信息1011010,得到响应信息1101011并返回给读卡器。读卡器将接收的响应信息1101011、生成的认证信息1011010和标识信息123发送给服务器。服务器在数据库中获取与标识信息123对应的密钥,利用该密钥解密响应信息1101011。若解密后的响应信息为1011010,与认证信息1011010相同,则服务器向读卡器输出确认纸张通过认证的第一通知消息;若解密后的响应信息不是1011010,与认证信息1011010不同,则服务器向读卡器输出确认纸张未通过认证的第二通知消息。
本发明实施例中,由于电子标签中的标识信息具有唯一性,将标识信息与加密算法相结合,伪造时需要先获取唯一的标识信息以及相应的密钥,然后还要制造出携带有该标识信息和密钥的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
请参阅图5,为本发明另一实施例提供的纸张防伪方法的实现流程示意图,该方法涉及通信技术领域。如图5所示,该方法主要包括以下步骤:
S301、读卡器获取电子标签中的标识信息,随机生成预设长度的比特串,利用预设的公钥加密比特串,得到认证信息,并将该认证信息发送给电子标签。
具体的,运用可读取电子标签信息的读卡器获取电子标签中的标识信息。电子标签中的标识信息具有唯一性,用于唯一识别电子标签中芯片的身份。读卡器获取电子标签中的标识信息后,随机生成预设长度的比特串。在实际应用中,该长度为固定值,可由用户自行定义。
于本实施例中,读卡器采用非对称算法对随机生成的预设长度的比特串进行加密。较佳的,该非对称算法为ECC(Elliptic curve cryptography,椭圆曲线加密)算法,该算法的密钥由一对公钥和私钥组成,即在加密和解密过程中的密钥不相同,但是私钥加密的信息只能用对应的公钥解密,而公钥加密的信息只能用私钥解密。
读卡器中预设有与电子标签中的标识信息对应的公钥。根据获取的标识信息,查找对应的公钥,然后利用查找到的公钥加密随机生成的比特串,得到认证信息。该认证信息与获取的标识信息对应。
S302、电子标签通过预置的私钥解密接收的认证信息,将解密后的认证信息作为响应信息。
具体的,电子标签接收到认证信息,利用预置的私钥解密该认证信息,得到解密后的认证信息,将其作为响应信息。该私钥与读卡器在加密过程中使用的公钥相对应。在实际应用中,该私钥可存储在电子标签中。
S303、电子标签将响应信息返回给读卡器。
具体的,电子标签将得到的响应信息返回到读卡器,以使读卡器执行下一步骤。
S304、读卡器比对接收的响应信息与随机生成的比特串是否相同。
可以理解的,响应信息是对读卡器随机生成的比特串进行加密后再解密得到的,所以该响应于信息的长度与随机生成的比特串相同。为提高比对的速度,可首先比对接收的响应信息和随机生成的预设长度的比特串的长度是否相同。若长度不相同,则确定接收的响应信息和随机生成的比特串不相同,纸张未通过防伪认证。若长度相同,则进一步比对接收的响应信息和随机生成的预设长度的比特串是否完全相同。
若接收的响应信息和随机生成的预设长度的比特串完全相同,则执行步骤S305:根据预设的方式输出确认纸张通过认证的第三通知消息。若接收的响应信息和随机生成的预设长度的比特串不完全相同,则执行步骤S306:根据预设的方式输出确认纸张未通过认证的第四通知消息。
其中,预设的输出方式可为在读卡器上显示认证通过或者认证失败的字样,也可为将第三通知信息和第四通知信息发送给与该读卡器关联的其他终端,以便其他终端根据第三通知信息或第四通知信息,将对应的认证结果输出给用户。
在本发明实施例中,由于电子标签中的标识信息具有唯一性,将标识信息与加密算法相结合,伪造时需要先获取唯一的标识信息以及相应的密钥,然后还要制造出携带有该标识信息和密钥的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
请参阅图6,为本发明一实施例提供的纸张防伪系统的结构示意图。为了便于说明,仅示出了与本发明实施例相关的部分。图6示例的纸张防伪系统,主要包括:
读卡器2和电子标签,电子标签内置在纸张1中,电子标签(图中未标出)包括至少一个芯片3和与至少一个芯片3连接的天线4。在实际应用中,在不影响纸张1使用的情况下,可增加芯片3及天线4的数量,以增加防伪纸张1的安全性。
读卡器2,用于获取电子标签中的标识信息,生成认证信息并发送给电子标签,认证信息与标识信息对应。在实际应用中,芯片3进入读写器2的射频范围后,将标识信息通过天线4发送给读写器2。
电子标签,用于根据接收的认证信息生成响应信息,并返回给读卡器2。
读卡器2,还用于利用接收的响应信息,对纸张1进行防伪认证。
进一步地,读卡器2,还用于随机生成预设长度的比特串,利用预设的公钥加密比特串,得到认证信息,公钥与标识信息对应;
进一步地,电子标签,还用于通过预置的私钥解密认证信息,将解密后的认证信息作为响应信息,其中,私钥与公钥对应;
进一步地,读卡器2,还用于比对响应信息与比特串是否相同;
进一步地,读卡器2,还用于若响应信息与比特串相同,则根据预设的方式输出确认纸张1通过认证的第三通知消息;
进一步地,读卡器2,还用于若响应信息与比特串不同,则根据预设的方式输出确认纸张1未通过认证的第四通知消息。
本实施例未尽之细节,请参阅前述图2和图5所示实施例的描述,此处不再赘述。
在本发明实施例中,读卡器获取安装在纸张内的芯片中的具有唯一性标识信息,生成认证信息并发送给芯片,芯片根据该认证信息生成响应信息,并发送给读卡器,然后读卡器利用接收的响应信息中包含的信息与预设信息进行比较,对纸张进行防伪辨认。由于电子标签中的标识信息具有唯一性,伪造时需要先获取唯一的标识信息,再制造出携带有该标识信息的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
请参阅图7,为本发明另一实施例提供的纸张防伪系统的结构示意图,为了便于说明,仅示出了与本发明实施例相关的部分。图7示例的纸张防伪系统,与图6所示实施例中的系统的不同之处主要在于:
进一步地,该系统还包括:服务器5;
进一步地,读卡器2,还用于生成预设长度的随机比特串,并作为认证信息发送给电子标签;
进一步地,电子标签,还用于利用预置的密钥加密随机比特串,得到响应信息。
进一步地,电子标签,还用于将响应信息发送给读卡器2。
进一步地,读卡器2,还用于将标识信息、随机比特串和接收的响应信息发送给服务器5;
进一步地,服务器5,还用于接收标识信息、随机比特串和响应信息,获取与标识信息对应的密钥,利用密钥解密响应信息。
进一步地,服务器5,还用于比对解密后的响应信息与随机比特串是否相同。
进一步地,服务器5,还用于若解密后的响应信息与随机比特串相同,则根据预设的方式输出确认纸张1通过认证的第一通知消息。
进一步地,服务器5,还用于若解密后的响应信息与随机比特串不同,则根据预设的方式输出确认纸张1未通过认证的第二通知消息。
本实施例未尽之细节,请参阅前述图2至图4所示实施例的描述,此处不再赘述。
本发明实施例中,由于电子标签中的标识信息具有唯一性,将标识信息与加密算法相结合,伪造时需要先获取唯一的标识信息以及相应的密钥,然后还要制造出携带有该标识信息和密钥的电子标签,难度较大,成本较高,因此可提高防伪纸张的安全性,增加防伪纸张的伪造难度。
需要说明的是,对于前述的各方法实施例,为了简便描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定都是本发明所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。
以上为对本发明所提供的纸张防伪方法及系统的描述,对于本领域的一般技术人员,依据本发明实施例的思想,在具体实施方式及应用范围上均会有改变之处,综上,本说明书内容不应理解为对本发明的限制。

Claims (9)

  1. 一种纸张防伪方法,其特征在于,用于对内置电子标签的纸张进行防伪认证,所述方法包括:
    读卡器获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;
    所述电子标签根据接收的认证信息生成响应信息,并返回给所述读卡器;
    所述读卡器利用接收的响应信息,对所述纸张进行防伪认证。
  2. 如权利要求1所述的纸张防伪方法,其特征在于,
    所述生成认证信息并发送给所述电子标签包括:
    生成预设长度的随机比特串,并作为所述认证信息发送给所述电子标签;
    则,所述电子标签根据接收的认证信息生成响应信息包括:
    所述电子标签利用预置的密钥加密所述随机比特串,得到所述响应信息。
  3. 如权利要求2所述的纸张防伪方法,其特征在于,所述读卡器利用接收的响应信息,对所述纸张进行防伪认证包括:
    所述读卡器将所述标识信息、所述随机比特串和接收的响应信息发送给服务器;
    所述服务器接收所述标识信息、所述随机比特串和所述响应信息,获取与所述标识信息对应的所述密钥,利用所述密钥解密所述响应信息;
    所述服务器比对解密后的响应信息与所述随机比特串是否相同;
    若所述解密后的响应信息与所述随机比特串相同,则所述服务器根据预设的方式输出确认所述纸张通过认证的第一通知消息;
    若所述解密后的响应信息与所述随机比特串不同,则所述服务器根据所述预设的方式输出确认所述纸张未通过认证的第二通知消息。
  4. 如权利要求1所述的纸张防伪方法,其特征在于,所述生成认证信息包括:
    随机生成预设长度的比特串,利用预设的公钥加密所述比特串,得到所述认证信息,所述公钥与所述标识信息对应。
  5. 如权利要求4所述的纸张防伪方法,其特征在于,所述电子标签根据接收的认证信息生成响应信息包括:
    所述电子标签通过预置的私钥解密所述认证信息,将解密后的认证信息作为所述响应信息,其中,所述私钥与所述公钥对应。
  6. 如权利要求5所述的纸张防伪方法,其特征在于,所述读卡器利用接收的响应信息,对所述纸张进行防伪认证包括:
    所述读卡器比对所述响应信息与所述比特串是否相同;
    若所述响应信息与所述比特串相同,则根据预设的方式输出确认所述纸张通过认证的第三通知消息;
    若所述响应信息与所述比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第四通知消息。
  7. 一种纸张防伪系统,其特征在于,所述系统包括:读卡器和电子标签,所述电子标签内置在纸张中,所述电子标签包括至少一个芯片和与至少一个所述芯片连接的天线;
    所述读卡器,用于获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;
    所述芯片中存储有所述芯片的标识信息;
    所述电子标签,用于根据接收的认证信息生成响应信息,并返回给所述读卡器;
    所述读卡器,还用于利用接收的响应信息,对所述纸张进行防伪认证。
  8. 如权利要求7所述的纸张防伪系统,其特征在于,所述系统还包括:服务器;
    所述读卡器,还用于生成预设长度的随机比特串,并作为所述认证信息发送给所述电子标签;
    所述电子标签,还用于利用预置的密钥加密所述随机比特串,得到所述响应信息;
    所述读卡器,还用于将所述标识信息、所述随机比特串和接收的响应信息发送给服务器;
    所述服务器,还用于接收所述标识信息、所述随机比特串和所述响应信息,获取与所述标识信息对应的所述密钥,利用所述密钥解密所述响应信息;
    所述服务器,还用于比对解密后的响应信息与所述随机比特串是否相同;
    所述服务器,还用于若所述解密后的响应信息与所述随机比特串相同,则根据预设的方式输出确认所述纸张通过认证的第一通知消息;
    所述服务器,还用于若所述解密后的响应信息与所述随机比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第二通知消息。
  9. 如权利要求7所述的纸张防伪系统,其特征在于,
    所述读卡器,还用于随机生成预设长度的比特串,利用预设的公钥加密所述比特串,得到所述认证信息,所述公钥与所述标识信息对应;
    所述电子标签,还用于通过预置的私钥解密所述认证信息,将解密后的认证信息作为所述响应信息,其中,所述私钥与所述公钥对应;
    所述读卡器,还用于比对所述响应信息与所述比特串是否相同;
    所述读卡器,还用于若所述响应信息与所述比特串相同,则根据预设的方式输出确认所述纸张通过认证的第三通知消息;
    所述读卡器,还用于若所述响应信息与所述比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第四通知消息。
PCT/CN2017/106618 2017-10-18 2017-10-18 纸张防伪方法及系统 WO2019075650A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/106618 WO2019075650A1 (zh) 2017-10-18 2017-10-18 纸张防伪方法及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/106618 WO2019075650A1 (zh) 2017-10-18 2017-10-18 纸张防伪方法及系统

Publications (1)

Publication Number Publication Date
WO2019075650A1 true WO2019075650A1 (zh) 2019-04-25

Family

ID=66173190

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/106618 WO2019075650A1 (zh) 2017-10-18 2017-10-18 纸张防伪方法及系统

Country Status (1)

Country Link
WO (1) WO2019075650A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060103383A (ko) * 2005-03-26 2006-09-29 에스케이 텔레콤주식회사 Rfid를 이용한 제품 위조 방지 방법 및 그 시스템
CN1932835A (zh) * 2006-09-30 2007-03-21 华中科技大学 一种射频识别系统中的安全认证方法
CN104809618A (zh) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 基于电子标签的产品防伪方法
CN105893898A (zh) * 2016-03-31 2016-08-24 深圳市裕盛星文化传播有限公司 钱币集防伪系统、方法及钱币集
CN106096678A (zh) * 2016-06-02 2016-11-09 王晓峰 基于rfid射频技术的书画信息识别系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060103383A (ko) * 2005-03-26 2006-09-29 에스케이 텔레콤주식회사 Rfid를 이용한 제품 위조 방지 방법 및 그 시스템
CN1932835A (zh) * 2006-09-30 2007-03-21 华中科技大学 一种射频识别系统中的安全认证方法
CN104809618A (zh) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 基于电子标签的产品防伪方法
CN105893898A (zh) * 2016-03-31 2016-08-24 深圳市裕盛星文化传播有限公司 钱币集防伪系统、方法及钱币集
CN106096678A (zh) * 2016-06-02 2016-11-09 王晓峰 基于rfid射频技术的书画信息识别系统

Similar Documents

Publication Publication Date Title
US10084597B1 (en) RFID tags with dynamic key replacement
US9773133B2 (en) RFID tag and reader characteristic determination using group keys
CN106529969B (zh) 一种利用nfc查伪溯源的方法及系统
JP6620168B2 (ja) 動的な暗号化方法、端末、およびサーバ
US10713453B1 (en) Proxy-based reader authentication by trusted authority
EP2533488B1 (en) Nfc communications device for setting up encrypted e-mail communication
US8766778B2 (en) System and method for authenticating RFID tags
US10121033B1 (en) Enhanced RFID tag authentication
US9928390B1 (en) Network-enabled RFID tag endorsement
US20140023195A1 (en) Radio frequency identification (rfid) tag, interrogator, and method for authentication between the rfid tag and the interrogator
US11361174B1 (en) Enhanced RFID tag authentication
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
CN110598433B (zh) 基于区块链的防伪信息处理方法、装置
WO2018227685A1 (zh) 一种终端设备安全接入物联网的方法及系统
CN110969445B (zh) 基于nfc的防伪方法
KR100723868B1 (ko) Epc c1g2 rfid 시스템에서 태그와 판독장치간의 상호 인증 방법
EP2922236B1 (en) Authentication by use of symmetric and asymmetric cryptography
CN102970676A (zh) 一种对原始数据进行处理的方法、物联网系统及终端
CN103971245B (zh) 一种用于商品电子防伪的组合加密系统
KR20100031354A (ko) Otp를 이용한 태그 보안 처리 방법
CN106712952B (zh) 一种射频标签安全识别方法和系统
JP4105583B2 (ja) 無線タグセキュリティ拡張方法,id管理コンピュータ装置,代理サーバ装置,それらのプログラムおよびそれらのプログラムの記録媒体
JP2021175184A (ja) 複数の回転セキュリティ鍵を備えた非接触カード
US20180176716A1 (en) Dynamic secure messaging
Rahnama et al. Securing RFID-based authentication systems using ParseKey+

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17929404

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17929404

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/10/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17929404

Country of ref document: EP

Kind code of ref document: A1