WO2019075650A1 - 纸张防伪方法及系统 - Google Patents
纸张防伪方法及系统 Download PDFInfo
- Publication number
- WO2019075650A1 WO2019075650A1 PCT/CN2017/106618 CN2017106618W WO2019075650A1 WO 2019075650 A1 WO2019075650 A1 WO 2019075650A1 CN 2017106618 W CN2017106618 W CN 2017106618W WO 2019075650 A1 WO2019075650 A1 WO 2019075650A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- paper
- authentication
- bit string
- electronic tag
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
Definitions
- the invention belongs to the technical field of communications, and in particular relates to a paper anti-counterfeiting method and system.
- the invention provides a paper anti-counterfeiting method and system, which enhances the security of the anti-counterfeit paper and the forgery of the anti-counterfeit paper.
- a first aspect of the embodiments of the present invention provides a paper anti-counterfeiting method for performing anti-counterfeiting authentication on a paper with an electronic tag, comprising: a card reader acquiring identification information in the electronic tag, generating authentication information, and transmitting the information to the An electronic tag, the authentication information corresponding to the identification information; the electronic tag generating response information according to the received authentication information, and returning to the card reader; the card reader using the received response information, Paper is certified for security.
- a second aspect of the embodiments of the present invention provides a system including: a card reader and an electronic tag, the electronic tag being built in a paper, the electronic tag comprising at least one chip and an antenna connected to at least one of the chips;
- the card reader is configured to acquire identification information in the electronic tag, generate authentication information, and send the information to the electronic tag, where the authentication information corresponds to the identifier information; where the chip stores the chip Identification information;
- the electronic tag is configured to generate response information according to the received authentication information, and return the card to the card reader; the card reader is further configured to perform anti-counterfeiting authentication on the paper by using the received response information.
- the paper anti-counterfeiting method and system provided by the above embodiments of the invention obtains the identification information of the electronic tag installed in the paper through the card reader, transmits the authentication information to the electronic tag, and then the electronic tag generates the response information according to the authentication information, and sends the response information to the reading.
- the card reader uses the received response information to identify the paper for security. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
- FIG. 1 is a schematic structural diagram of a paper to be authenticated in a paper anti-counterfeiting method according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of an implementation process of a paper anti-counterfeiting method according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention.
- FIG. 4 is a schematic diagram of an implementation example of a practical application example of using a paper anti-counterfeiting method according to another embodiment of the present invention.
- FIG. 5 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a paper anti-counterfeiting system according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a paper anti-counterfeiting system according to another embodiment of the present invention.
- FIG. 1 is a schematic structural diagram of a paper to be authenticated in a paper anti-counterfeiting method according to an embodiment of the present invention.
- an electronic tag is added inside the paper. Since the size of the electronic label is very small, it does not affect the normal use of the paper. In practical applications, the electronic label can be placed anywhere inside the paper without affecting the use of the paper.
- FIG. 2 is a schematic diagram of an implementation process of a paper anti-counterfeiting method provided by an embodiment of the invention.
- the method is used for anti-counterfeiting certification of the paper with the built-in electronic label shown in FIG.
- the method mainly includes the following steps:
- the card reader acquires the identification information in the electronic tag, generates the authentication information, and sends the information to the electronic tag.
- the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
- the selected electronic tag is RFID (Radio Frequency Identification, radio frequency identification tag, which can identify a specific target by radio signal and read and write related data.
- the selected card reader should be an RFID reader.
- the electronic tag can also be NFC (Near Field Communication (Near Field Communication), UHF (Ultra High Frequency) and other electronic tags with similar functions.
- the identification information in the electronic tag is unique, and is used for uniquely identifying the identity of the chip in the electronic tag, and may be a factory serial number corresponding to the electronic tag, or a label of the information carried by the paper, and is not limited to the actual application. .
- the card reader obtains the identification information in the electronic tag, the authentication information is generated.
- the authentication information corresponds to the identification information in the electronic tag.
- the authentication information is random data, which can further improve the security of the paper.
- the card reader then sends the authentication information to the electronic tag to cause the electronic tag to perform the next step.
- the electronic tag generates response information according to the received authentication information, and returns the information to the card reader.
- the electronic tag After receiving the authentication information, the electronic tag processes the authentication information to obtain response information. The electronic tag then sends the response message to the card reader to cause the card reader to perform the next step.
- the card reader uses the received response information to perform anti-counterfeiting authentication on the paper.
- the card reader receives the response information, compares the information included in the response information with the preset information, and determines whether the two are consistent to perform anti-counterfeiting authentication on the paper.
- the subsequent operations of the authentication pass are performed, for example, the prompt information that passes the authentication is output. If the authentication fails, the subsequent operations that fail the authentication are performed, for example, the warning information that fails the authentication is output.
- the card reader obtains the unique identification information in the electronic tag set in the paper, generates the authentication information and sends the information to the electronic tag, and the electronic tag generates the response information according to the authentication information, and sends the response message to the card reader.
- the card reader uses the information contained in the received response message to compare with the preset information to perform anti-counterfeiting identification on the paper. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
- FIG. 3 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention, which relates to the technical field of communications.
- the method mainly includes the following steps:
- the card reader acquires the identification information in the electronic tag, generates a random bit string of a preset length, and sends the information to the electronic tag as the authentication information.
- the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
- the selected electronic tag is an RFID tag
- the electronic tag can identify a specific target by radio signals and read and write related data, and the selected card reader should be an RFID card reader.
- the identification information in the electronic tag is unique, and is used for uniquely identifying the identity of the chip in the electronic tag, and may be a factory serial number corresponding to the electronic tag, or a label of the information carried by the paper, and is not limited to the actual application. .
- a random bit string of a preset length is generated as the authentication information.
- the authentication information corresponds to the identification information in the electronic tag. In practical applications, the preset length is a fixed value, which can be defined by the user.
- the electronic tag encrypts the random bit string by using a preset key to obtain response information.
- the electronic tag uses a symmetric encryption algorithm to encrypt the random bit string with a preset key to obtain response information.
- a symmetric encryption algorithm to encrypt the random bit string with a preset key to obtain response information.
- AES Advanced Encryption Standard
- Encryption Standard an algorithm that uses the same keys used in encryption and decryption. It can be understood that, since the authentication information is a fixed-length random bit string, the response information obtained by encrypting the fixed-length random bit string is also a fixed-length bit string.
- the electronic tag sends the response information to the card reader.
- the electronic tag sends the obtained response information to the card reader, so that the card reader performs the next step.
- the card reader sends the identification information, the random bit string, and the received response information to the server.
- the card reader sends the identification information acquired from the electronic tag, the generated random bit string, and the received response information to the server, so that the server performs the next step.
- the server receives the identifier information, the random bit string, and the response information, acquires a key corresponding to the identifier information, and decrypts the response information by using the key.
- the server acquires a key corresponding to the identification information.
- a database is pre-configured in the server, and the database is used to store the correspondence between the identification information of different electronic tags and each key.
- the server After receiving the identifier information sent by the card reader, the server searches for a key corresponding to the identifier information in the database according to the identifier information. Then, the server decrypts the received response information by using the found key to obtain the decrypted response information. It can be understood that the decrypted response information is a fixed length bit string.
- the server compares the decrypted response information with the received random bit string.
- the server compares the decrypted response information with the received random bit string. It can be understood that since the response information is obtained by encrypting the random bit string, the decrypted response information and the random bit string are usually bit strings of the same length. Therefore, in order to increase the comparison speed, it is first possible to compare whether the decrypted response information and the received random bit string have the same length, and if the lengths are different, it is confirmed that the two are different. If the lengths are the same, it is further compared whether the decrypted response information and the random bit string are identical.
- step S207 the server outputs a first notification message confirming that the paper passes the authentication according to a preset manner.
- step S208 the server outputs a second notification message that confirms that the paper has not passed the authentication according to a preset manner.
- the server outputs a first notification message for confirming that the paper passes the authentication according to a preset manner.
- the first notification information may be sent to the card reader, and then the word passing the authentication is displayed on the card reader; or The first notification information is sent to other terminals associated with the card reader, so that the other terminal notifies the user that the paper passes the anti-counterfeiting authentication according to the first notification information.
- the manner in which the server outputs the second notification message for confirming that the paper passes the authentication according to the preset manner is the same as the first notification message that the server outputs the confirmation that the paper passes the authentication according to the preset manner, and details are not described herein again.
- the paper with the built-in electronic label is currency and the identification information is 123, as shown in FIG. 4 .
- the card reader acquires the identification information 123 in the electronic tag installed in the paper, and randomly generates the bit string 1011010 as the authentication information and transmits it to the electronic tag.
- the electronic tag encrypts the authentication information 1011010 with a preset key, obtains response information 1101011, and returns it to the card reader.
- the card reader transmits the received response information 1101011, the generated authentication information 1011010, and the identification information 123 to the server.
- the server acquires a key corresponding to the identification information 123 in the database, and decrypts the response information 1101011 using the key. If the decrypted response information is 1011010, which is the same as the authentication information 1011010, the server outputs a first notification message confirming the paper passing authentication to the card reader; if the decrypted response information is not 1011010, unlike the authentication information 1011010, the server The card reader outputs a second notification message confirming that the paper has not passed the authentication.
- the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm, and the unique identification information and the corresponding key are acquired first, and then the identifier is carried.
- the electronic label of information and key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.
- FIG. 5 is a schematic diagram of an implementation process of a paper anti-counterfeiting method according to another embodiment of the present invention, which relates to the technical field of communications.
- the method mainly includes the following steps:
- the card reader obtains the identifier information in the electronic tag, randomly generates a bit string of a preset length, encrypts the bit string with a preset public key, obtains the authentication information, and sends the authentication information to the electronic tag.
- the identifier information in the electronic tag is obtained by using a card reader that can read the electronic tag information.
- the identification information in the electronic tag is unique and is used to uniquely identify the identity of the chip in the electronic tag.
- a bit string of a preset length is randomly generated. In practical applications, the length is a fixed value and can be defined by the user.
- the card reader encrypts the randomly generated bit string of a preset length by using an asymmetric algorithm.
- the asymmetric algorithm is ECC (Elliptic) Curve cryptography
- the key of the algorithm consists of a pair of public and private keys, that is, the keys in the encryption and decryption process are different, but the information encrypted by the private key can only use the corresponding public key. Decrypted, and public key encrypted information can only be decrypted with a private key.
- a public key corresponding to the identification information in the electronic tag is pre-configured in the card reader. According to the obtained identification information, the corresponding public key is searched, and then the randomly generated bit string is encrypted by using the found public key to obtain authentication information. The authentication information corresponds to the acquired identification information.
- the electronic tag decrypts the received authentication information by using a preset private key, and uses the decrypted authentication information as the response information.
- the electronic tag receives the authentication information, decrypts the authentication information by using a preset private key, and obtains the decrypted authentication information, and uses the information as the response information.
- This private key corresponds to the public key used by the reader during the encryption process. In practical applications, the private key can be stored in an electronic tag.
- the electronic tag returns the response information to the card reader.
- the electronic tag returns the obtained response information to the card reader so that the card reader performs the next step.
- the card reader compares the received response information with the randomly generated bit string.
- the response information is obtained by encrypting the bit string randomly generated by the card reader and then decrypting, so the length of the response information is the same as the randomly generated bit string.
- the response information received and the length of the randomly generated preset length bit string may be firstly compared. If the lengths are not the same, it is determined that the received response information is different from the randomly generated bit string, and the paper does not pass the anti-counterfeiting authentication. If the lengths are the same, whether the received response information and the randomly generated preset length bit string are completely identical.
- step S305 is performed: outputting a third notification message confirming that the paper passes the authentication according to a preset manner. If the received response information is not exactly the same as the randomly generated bit string of the preset length, step S306 is executed to output a fourth notification message that confirms that the paper has not passed the authentication according to a preset manner.
- the preset output mode may be: displaying the authentication pass or the authentication failure on the card reader, or sending the third notification information and the fourth notification information to other terminals associated with the card reader, so as to be other terminals.
- the corresponding authentication result is output to the user according to the third notification information or the fourth notification information.
- the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm.
- the unique identification information and the corresponding key are acquired first, and then the The electronic label identifying the information and the key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.
- FIG. 6 is a schematic structural diagram of a paper anti-counterfeiting system according to an embodiment of the present invention. For the convenience of description, only parts related to the embodiment of the present invention are shown.
- the paper anti-counterfeiting system illustrated in Figure 6 mainly includes:
- the card reader 2 and an electronic tag are built in the paper 1.
- the electronic tag (not shown) includes at least one chip 3 and an antenna 4 connected to at least one chip 3.
- the number of the chips 3 and the antennas 4 can be increased without affecting the use of the paper 1 to increase the security of the security paper 1.
- the card reader 2 is configured to acquire the identification information in the electronic tag, generate the authentication information, and send the information to the electronic tag, where the authentication information corresponds to the identification information.
- the identification information is sent to the reader/writer 2 through the antenna 4.
- the electronic tag is configured to generate response information according to the received authentication information, and return to the card reader 2.
- the card reader 2 is also used to perform anti-counterfeiting authentication on the paper 1 by using the received response information.
- the card reader 2 is further configured to randomly generate a bit string of a preset length, encrypt the bit string with a preset public key, and obtain authentication information, where the public key corresponds to the identification information;
- the electronic tag is further configured to decrypt the authentication information by using a preset private key, and use the decrypted authentication information as the response information, where the private key corresponds to the public key;
- the card reader 2 is further configured to compare whether the response information and the bit string are the same;
- the card reader 2 is further configured to: if the response information is the same as the bit string, output a third notification message that confirms that the paper 1 passes the authentication according to a preset manner;
- the card reader 2 is further configured to output, according to a preset manner, a fourth notification message that confirms that the paper 1 has not passed the authentication, if the response information is different from the bit string.
- the card reader obtains the unique identification information in the chip installed in the paper, generates the authentication information and sends the authentication information to the chip, and the chip generates the response information according to the authentication information, and sends the response information to the card reader, and then sends the response information to the card reader.
- the card reader uses the information contained in the received response information to compare with the preset information to perform anti-counterfeiting identification on the paper. Since the identification information in the electronic tag is unique, it is necessary to obtain the unique identification information before the counterfeiting, and then the electronic tag carrying the identification information is difficult, and the cost is high, so the security of the security paper can be improved. Increase the forgery difficulty of anti-counterfeiting paper.
- FIG. 7 is a schematic structural diagram of a paper anti-counterfeiting system according to another embodiment of the present invention. For convenience of description, only parts related to the embodiment of the present invention are shown.
- the paper security system illustrated in Fig. 7 differs from the system in the embodiment shown in Fig. 6 mainly in that:
- system further includes: a server 5;
- the card reader 2 is further configured to generate a random bit string of a preset length, and send the information to the electronic tag as the authentication information;
- the electronic tag is further configured to encrypt the random bit string by using a preset key to obtain response information.
- the electronic tag is further configured to send the response information to the card reader 2.
- the card reader 2 is further configured to send the identification information, the random bit string, and the received response information to the server 5;
- the server 5 is further configured to receive the identification information, the random bit string, and the response information, acquire a key corresponding to the identification information, and decrypt the response information by using the key.
- the server 5 is further configured to compare whether the decrypted response information is the same as the random bit string.
- the server 5 is further configured to output, according to a preset manner, a first notification message that confirms that the paper 1 passes the authentication, if the decrypted response information is the same as the random bit string.
- the server 5 is further configured to output, according to a preset manner, a second notification message that confirms that the paper 1 has not passed the authentication, if the decrypted response information is different from the random bit string.
- the identification information in the electronic tag is unique, the identification information is combined with the encryption algorithm, and the unique identification information and the corresponding key are acquired first, and then the identifier is carried.
- the electronic label of information and key is difficult and costly, so the security of the anti-counterfeit paper can be improved, and the forgery of the anti-counterfeit paper is increased.
Landscapes
- Engineering & Computer Science (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Paper (AREA)
Abstract
Description
Claims (9)
- 一种纸张防伪方法,其特征在于,用于对内置电子标签的纸张进行防伪认证,所述方法包括:
读卡器获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;
所述电子标签根据接收的认证信息生成响应信息,并返回给所述读卡器;
所述读卡器利用接收的响应信息,对所述纸张进行防伪认证。 - 如权利要求1所述的纸张防伪方法,其特征在于,
所述生成认证信息并发送给所述电子标签包括:
生成预设长度的随机比特串,并作为所述认证信息发送给所述电子标签;
则,所述电子标签根据接收的认证信息生成响应信息包括:
所述电子标签利用预置的密钥加密所述随机比特串,得到所述响应信息。 - 如权利要求2所述的纸张防伪方法,其特征在于,所述读卡器利用接收的响应信息,对所述纸张进行防伪认证包括:
所述读卡器将所述标识信息、所述随机比特串和接收的响应信息发送给服务器;
所述服务器接收所述标识信息、所述随机比特串和所述响应信息,获取与所述标识信息对应的所述密钥,利用所述密钥解密所述响应信息;
所述服务器比对解密后的响应信息与所述随机比特串是否相同;
若所述解密后的响应信息与所述随机比特串相同,则所述服务器根据预设的方式输出确认所述纸张通过认证的第一通知消息;
若所述解密后的响应信息与所述随机比特串不同,则所述服务器根据所述预设的方式输出确认所述纸张未通过认证的第二通知消息。 - 如权利要求1所述的纸张防伪方法,其特征在于,所述生成认证信息包括:
随机生成预设长度的比特串,利用预设的公钥加密所述比特串,得到所述认证信息,所述公钥与所述标识信息对应。 - 如权利要求4所述的纸张防伪方法,其特征在于,所述电子标签根据接收的认证信息生成响应信息包括:
所述电子标签通过预置的私钥解密所述认证信息,将解密后的认证信息作为所述响应信息,其中,所述私钥与所述公钥对应。 - 如权利要求5所述的纸张防伪方法,其特征在于,所述读卡器利用接收的响应信息,对所述纸张进行防伪认证包括:
所述读卡器比对所述响应信息与所述比特串是否相同;
若所述响应信息与所述比特串相同,则根据预设的方式输出确认所述纸张通过认证的第三通知消息;
若所述响应信息与所述比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第四通知消息。 - 一种纸张防伪系统,其特征在于,所述系统包括:读卡器和电子标签,所述电子标签内置在纸张中,所述电子标签包括至少一个芯片和与至少一个所述芯片连接的天线;
所述读卡器,用于获取所述电子标签中的标识信息,生成认证信息并发送给所述电子标签,所述认证信息与所述标识信息对应;
所述芯片中存储有所述芯片的标识信息;
所述电子标签,用于根据接收的认证信息生成响应信息,并返回给所述读卡器;
所述读卡器,还用于利用接收的响应信息,对所述纸张进行防伪认证。 - 如权利要求7所述的纸张防伪系统,其特征在于,所述系统还包括:服务器;
所述读卡器,还用于生成预设长度的随机比特串,并作为所述认证信息发送给所述电子标签;
所述电子标签,还用于利用预置的密钥加密所述随机比特串,得到所述响应信息;
所述读卡器,还用于将所述标识信息、所述随机比特串和接收的响应信息发送给服务器;
所述服务器,还用于接收所述标识信息、所述随机比特串和所述响应信息,获取与所述标识信息对应的所述密钥,利用所述密钥解密所述响应信息;
所述服务器,还用于比对解密后的响应信息与所述随机比特串是否相同;
所述服务器,还用于若所述解密后的响应信息与所述随机比特串相同,则根据预设的方式输出确认所述纸张通过认证的第一通知消息;
所述服务器,还用于若所述解密后的响应信息与所述随机比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第二通知消息。 - 如权利要求7所述的纸张防伪系统,其特征在于,
所述读卡器,还用于随机生成预设长度的比特串,利用预设的公钥加密所述比特串,得到所述认证信息,所述公钥与所述标识信息对应;
所述电子标签,还用于通过预置的私钥解密所述认证信息,将解密后的认证信息作为所述响应信息,其中,所述私钥与所述公钥对应;
所述读卡器,还用于比对所述响应信息与所述比特串是否相同;
所述读卡器,还用于若所述响应信息与所述比特串相同,则根据预设的方式输出确认所述纸张通过认证的第三通知消息;
所述读卡器,还用于若所述响应信息与所述比特串不同,则根据所述预设的方式输出确认所述纸张未通过认证的第四通知消息。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/106618 WO2019075650A1 (zh) | 2017-10-18 | 2017-10-18 | 纸张防伪方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/106618 WO2019075650A1 (zh) | 2017-10-18 | 2017-10-18 | 纸张防伪方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019075650A1 true WO2019075650A1 (zh) | 2019-04-25 |
Family
ID=66173190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/106618 WO2019075650A1 (zh) | 2017-10-18 | 2017-10-18 | 纸张防伪方法及系统 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019075650A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060103383A (ko) * | 2005-03-26 | 2006-09-29 | 에스케이 텔레콤주식회사 | Rfid를 이용한 제품 위조 방지 방법 및 그 시스템 |
CN1932835A (zh) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | 一种射频识别系统中的安全认证方法 |
CN104809618A (zh) * | 2014-01-27 | 2015-07-29 | 上海高研明鉴信息技术有限公司 | 基于电子标签的产品防伪方法 |
CN105893898A (zh) * | 2016-03-31 | 2016-08-24 | 深圳市裕盛星文化传播有限公司 | 钱币集防伪系统、方法及钱币集 |
CN106096678A (zh) * | 2016-06-02 | 2016-11-09 | 王晓峰 | 基于rfid射频技术的书画信息识别系统 |
-
2017
- 2017-10-18 WO PCT/CN2017/106618 patent/WO2019075650A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060103383A (ko) * | 2005-03-26 | 2006-09-29 | 에스케이 텔레콤주식회사 | Rfid를 이용한 제품 위조 방지 방법 및 그 시스템 |
CN1932835A (zh) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | 一种射频识别系统中的安全认证方法 |
CN104809618A (zh) * | 2014-01-27 | 2015-07-29 | 上海高研明鉴信息技术有限公司 | 基于电子标签的产品防伪方法 |
CN105893898A (zh) * | 2016-03-31 | 2016-08-24 | 深圳市裕盛星文化传播有限公司 | 钱币集防伪系统、方法及钱币集 |
CN106096678A (zh) * | 2016-06-02 | 2016-11-09 | 王晓峰 | 基于rfid射频技术的书画信息识别系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10084597B1 (en) | RFID tags with dynamic key replacement | |
US9773133B2 (en) | RFID tag and reader characteristic determination using group keys | |
CN106529969B (zh) | 一种利用nfc查伪溯源的方法及系统 | |
JP6620168B2 (ja) | 動的な暗号化方法、端末、およびサーバ | |
US10713453B1 (en) | Proxy-based reader authentication by trusted authority | |
EP2533488B1 (en) | Nfc communications device for setting up encrypted e-mail communication | |
US8766778B2 (en) | System and method for authenticating RFID tags | |
US10121033B1 (en) | Enhanced RFID tag authentication | |
US9928390B1 (en) | Network-enabled RFID tag endorsement | |
US20140023195A1 (en) | Radio frequency identification (rfid) tag, interrogator, and method for authentication between the rfid tag and the interrogator | |
US11361174B1 (en) | Enhanced RFID tag authentication | |
US10158493B2 (en) | Solution for generating and issuing security codes with guaranteed issuer authenticity and origin | |
CN110598433B (zh) | 基于区块链的防伪信息处理方法、装置 | |
WO2018227685A1 (zh) | 一种终端设备安全接入物联网的方法及系统 | |
CN110969445B (zh) | 基于nfc的防伪方法 | |
KR100723868B1 (ko) | Epc c1g2 rfid 시스템에서 태그와 판독장치간의 상호 인증 방법 | |
EP2922236B1 (en) | Authentication by use of symmetric and asymmetric cryptography | |
CN102970676A (zh) | 一种对原始数据进行处理的方法、物联网系统及终端 | |
CN103971245B (zh) | 一种用于商品电子防伪的组合加密系统 | |
KR20100031354A (ko) | Otp를 이용한 태그 보안 처리 방법 | |
CN106712952B (zh) | 一种射频标签安全识别方法和系统 | |
JP4105583B2 (ja) | 無線タグセキュリティ拡張方法,id管理コンピュータ装置,代理サーバ装置,それらのプログラムおよびそれらのプログラムの記録媒体 | |
JP2021175184A (ja) | 複数の回転セキュリティ鍵を備えた非接触カード | |
US20180176716A1 (en) | Dynamic secure messaging | |
Rahnama et al. | Securing RFID-based authentication systems using ParseKey+ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17929404 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17929404 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/10/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17929404 Country of ref document: EP Kind code of ref document: A1 |