WO2021004125A1 - 基于射频标签的用户交互式物联验证的方法、装置与系统 - Google Patents

基于射频标签的用户交互式物联验证的方法、装置与系统 Download PDF

Info

Publication number
WO2021004125A1
WO2021004125A1 PCT/CN2020/086330 CN2020086330W WO2021004125A1 WO 2021004125 A1 WO2021004125 A1 WO 2021004125A1 CN 2020086330 W CN2020086330 W CN 2020086330W WO 2021004125 A1 WO2021004125 A1 WO 2021004125A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
verification
chip
radio frequency
Prior art date
Application number
PCT/CN2020/086330
Other languages
English (en)
French (fr)
Inventor
张辉
Original Assignee
上海吾十吾信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201921060079.1U external-priority patent/CN210324263U/zh
Priority claimed from CN201910612556.9A external-priority patent/CN110135542B/zh
Application filed by 上海吾十吾信息技术有限公司 filed Critical 上海吾十吾信息技术有限公司
Priority to AU2020203171A priority Critical patent/AU2020203171A1/en
Publication of WO2021004125A1 publication Critical patent/WO2021004125A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Definitions

  • This application relates to the technical field of radio frequency tags, and in particular to a technology for user interactive IoT verification based on radio frequency tags and an anti-counterfeiting system for RFID/NFC radio frequency electronic tags.
  • the existing radio frequency tag anti-counterfeiting systems and technologies are implemented separately by the seller (such as manufacturers, platforms, etc.). For example, the seller writes specific data and content in the radio frequency tag chip and pastes the chip label on the product, and the user only Can read and verify.
  • the anti-counterfeiting design is mainly aimed at third-party tampering, duplication, reuse, etc.
  • the anti-counterfeiting technology in the prior art does not provide interactive verification for users, and only the seller unilaterally writes specific data and content in the radio frequency tag chip, resulting in that all data in the anti-counterfeiting verification system can be manipulated and tampered with by the seller unilaterally.
  • the anti-counterfeiting methods in the prior art also do not provide customers with a one-to-one password verification program for each chip. Even though some methods provide user access tools (such as APP) account login password permissions, they do not provide specific
  • the password comparison verification program of the tag chip causes the information written on the chip to be opened to read by a third party under the universal login authority, which increases the risk of information leakage and imitation.
  • the physical connection of the chip tag to the designated product is not strong: because about 80% of the area of the tag chip is a metal antenna, it must have a certain degree of hardness and toughness, even if it is specially made by the radio frequency tag manufacturer on the market.
  • the tear-resistant "fragile paper" chip label can also be completely peeled off and reused. This will cause the label chip to be unable to uniquely represent the designated product, resulting in the invalidation of the product anti-counterfeiting system and the use of all previous efforts.
  • the radio frequency tag can be easily peeled off from the attached article; if the hot melt adhesive with better viscosity is used, although the adhesion between the radio frequency label and the article can be improved, the hot melt adhesive
  • the operation of the equipment is complicated, and the hot-melt temperature of the hot-melt adhesive can easily damage the label chip, resulting in loss or invalidity of the written content in the chip.
  • the radio frequency tag is physically peeled off, replaced or reused, its anti-counterfeiting effect will be lost, and the anti-counterfeiting system will be abandoned.
  • these anti-counterfeiting features are easily manipulated by the seller and/or copied, stripped and replaced by a third party or reused during the commodity circulation process, so that the predetermined anti-counterfeiting effect cannot be achieved.
  • the existing RF chip anti-counterfeiting technologies are dedicated to deepening the read-write algorithm and data encryption level, and strive to solve and improve a certain technical node; the existing chip anti-counterfeiting system always lacks or several technical links. Cannot form a complete and effective anti-counterfeiting system.
  • this application provides a method, device and system for user interactive IoT verification based on radio frequency tags.
  • the application also provides an anti-counterfeiting system for radio frequency tags.
  • a method executed at a network device including the following steps: at least recording a first user password corresponding to one or more commodities, and a first user password corresponding to the one or more commodities.
  • the information is written into one or more radio frequency tags corresponding to the one or more commodities, and the information to be verified includes at least the first user password and the first chip characteristic information; after the user receives the After one or more commodities, receive from the user the second chip feature information of the one or more radio frequency tags read by the user, and the first corresponding to the one or more commodities input by the user 2.
  • the user end verification includes comparing the first user password with the second user password and/or comparing the first chip feature The information is compared with the second chip characteristic information; in the case where the result of the client verification is passed, the network device verification is performed to verify the second chip characteristic information received from the user and In the second user password, the network device side verification includes comparing the second chip characteristic information received from the user with the recorded first chip characteristic information and/or comparing the second user password Comparing with the recorded first user password; and sending the network device end verification result to the user.
  • a method executed at a user terminal device including the following steps: after a user receives one or more commodities, downloading one or more commodities corresponding to the one or more commodities To obtain the information to be verified corresponding to the one or more commodities, where the information to be verified is written by a network device, and the information to be verified includes at least information corresponding to the one or more commodities
  • the first user password and the first chip feature information of the one or more radio frequency tags obtain the second chip feature information of the one or more radio frequency tags; interact with the user to obtain the information entered by the user
  • the second user password corresponding to the one or more commodities; performing user-side verification on the information to be verified includes comparing the first user password with the second user password and/or comparing the first user password with the second user password
  • the feature information of a chip is compared with the feature information of the second chip; in the case where the verification result of the user end is passed verification: if the user terminal device is offline, the user end is notified that the user end verification is passed,
  • a method for user interactive IoT verification wherein the method includes the method of traveling at the network device and the method of traveling at the device of the user terminal as described above .
  • a network device including: configured to record at least a first user password corresponding to one or more commodities, and one or more corresponding to the one or more commodities.
  • a device in which verification information is written into one or more radio frequency tags corresponding to the one or more commodities, and the information to be verified includes at least the first user password and the first chip characteristic information; and is configured to After the user receives the one or more commodities, the second chip feature information of the one or more radio frequency tags read by the user, the information input by the user and the one or more A second user password corresponding to a commodity and a device for verifying the result of the user end of the information to be verified, the user end verification includes comparing the first user password with the second user password and/ Or comparing the first chip feature information with the second chip feature information; and is configured to perform network device side verification to verify the verification from the user side when the result
  • a user terminal device including: after a user receives one or more commodities, it is configured to obtain one or more radio frequency tags corresponding to the one or more commodities
  • the user password is compared with the second user password and/or the first chip feature information is compared with the second chip feature information; in the case that the result of the user end verification is passed verification: configured If the user terminal device is offline,
  • a system for user interactive IoT verification wherein the system includes the above-mentioned network equipment and the above-mentioned user terminal equipment.
  • a computer-readable storage medium stores computer-readable instructions, when the computer-readable instructions are executed by one or more devices, The device executes the method as described above.
  • a system for user interactive IoT verification includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor executes, the processor executes the method described above.
  • a system for user interactive IoT verification including the above-mentioned network device and the above-mentioned computer-readable storage medium.
  • a label anti-counterfeiting system includes a service device, a reading device, and a fragile outer label.
  • the fragile outer label is configured to cover and stick on the surface of an object.
  • the fragile outer label carries a unique serial number
  • the service device is configured to associate the unique serial number with the object and store it in the service device
  • the reading device Is configured to communicate with the service device when the item is obtained to obtain the unique serial number associated with the item, so as to verify that the unique serial number on the fragile outer label is different from the service device
  • the obtained unique serial number associated with the item is used to determine the authenticity of the item.
  • the user password is introduced into the anti-counterfeiting verification of the radio frequency tag.
  • the user only needs to have a reading device that can read the radio frequency tag, which can actively participate in the anti-counterfeiting of the product, preventing the platform party from unilaterally manipulating the anti-counterfeiting system. Increase user confidence;
  • Chip anti-counterfeiting technology based on chip feature information can guarantee unique authentication better than clear code verification technologies such as QR codes;
  • the use of the Internet of Things method and server verification technology ensures that the chip can uniquely refer to a specific product, avoiding being replaced and/or reused; further, the radio frequency tag in this application also contains a unique serial number
  • the fragile outer label solves the problem of physically connecting the chip label to the commodity technology node, further realizing the prevention of replacement and avoiding repeated use;
  • Fig. 1 shows a schematic diagram of a user interactive IoT verification system based on a radio frequency tag according to an embodiment of the present application
  • Figure 2 (a) shows a schematic diagram of a radio frequency tag with a fragile outer tag combined with a fragile outer tag according to an embodiment of the present application
  • Figure 2(b) shows a radio frequency tag anti-counterfeiting system according to an embodiment of the present application
  • Fig. 3 shows a flow chart of a method for user interactive IoT verification based on radio frequency tags according to an embodiment of the present application
  • 4(a) and 4(b) respectively show a schematic diagram of a system for obtaining chip feature information of one or more radio frequency tags by a network device according to an embodiment of the present application;
  • Fig. 5 shows a schematic structural diagram of a network device for user-interactive IoT authentication based on radio frequency tags according to an embodiment of the present application
  • FIG. 6 shows a schematic structural diagram of a reading device for user interactive IoT verification based on radio frequency tags according to an embodiment of the present application
  • Figure 7 shows an exemplary system that can be used to implement the various embodiments described in this application.
  • the terminal, the device of the service network, and the trusted party all include one or more processors (CPU), input/output interfaces, network interfaces, and memory.
  • processors CPU
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory or other memory technology
  • CD-ROM compact disc
  • the network device includes an electronic device that can automatically perform numerical calculation and information processing in accordance with pre-set or stored instructions.
  • Its hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (ASIC), and a programmable logic device ( PLD), field programmable gate array (FPGA), digital signal processor (DSP), embedded equipment, etc.
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a set of multiple network servers, or a cloud composed of multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a type of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and a wireless ad hoc network (Ad Hoc network).
  • the reading device includes, but is not limited to, any card reading device capable of reading radio frequency tags, such as radio frequency tag readers, mobile devices that can read radio frequency tags, mobile devices with radio frequency identification functions, and the like.
  • the radio frequency tag can be any type of radio frequency tag.
  • the radio frequency tag is an RFID (Radio Frequency Identification) radio frequency tag
  • the RFID chip used is any type of RFID chip, including but not limited to low frequency RFID chip, high frequency RFID chip, ultra High frequency RFID chip, microwave RFID chip, etc.
  • the radio frequency tag is an NFC (Near Field Communication, Near Field Communication) radio frequency tag, and the NFC chip used is any kind of NFC chip.
  • the user equipment referred to in this application includes, but is not limited to, any electronic product that can interact with the user, such as a smart phone, a tablet computer, a PC, etc.
  • the user equipment can use any operating system, such as android operating system, iOS operating system, etc.
  • Fig. 1 shows a schematic diagram of a user interactive IoT verification system based on a radio frequency tag according to an embodiment of the present application.
  • the user interactive Internet of Things verification system involves network equipment 11, user terminal equipment 12, radio frequency tags 13, products 14 ordered by users, and users 15.
  • the user 15 orders one or more commodities through a network platform
  • the network device 11 is a network device corresponding to the network platform
  • the user 15 inputs a user password set by itself through any user terminal
  • the The user terminal sends the user password to the network device 11.
  • the user can set the user password of the product synchronously along with the order information, or can set the user password of the product separately after the order submission is completed.
  • the user terminal includes, but is not limited to, non-mobile devices such as PCs and mobile devices such as PADs or mobile phones.
  • a product 14 represents the product ordered by the user 15.
  • the network device 11 obtains the one or more user passwords entered by the user 15 and corresponds it to one or more commodities ordered by the user 15; then, the network device 11 obtains one or more Chip feature information of a plurality of radio frequency tags 13, wherein the one or more radio frequency tags 13 respectively correspond to the one or more commodities, and the chip feature information includes, for example, a chip UID.
  • the chip UID (Unique Identifier) is a fixed code of the product identification code of the chip of the radio frequency tag, and the UID is a semiconductor firmware code. Each chip UID is unique in the world and is not changed or deleted with the user's data reading and writing.
  • the network device 11 determines one or more user passwords for the ordered one or more commodities, and each commodity corresponds to a user password.
  • the network device 11 sends the user password to the user 15 corresponding to the radio frequency tag based on at least any one of short messages, emails, and information push channels.
  • the network device 11 obtains chip feature information of one or more radio frequency tags 13, wherein the one or more radio frequency tags 13 respectively correspond to the one or more commodities, and the chip feature information includes, for example, a chip UID.
  • the sending of the user password by the network device 11 can be sent directly when the user purchases the product (for example, through an APP for the user to order the product), or can be combined after the user receives the product.
  • the radio frequency tag is scanned, it is sent again.
  • the network device 11 can determine the user password after the user 15 determines the purchased product, that is, after the user determines the purchased product, the network device starts to determine the corresponding user Password; it can also be executed before the user confirms to purchase the product, that is, the network device pre-determines the corresponding user password, and when the user purchases the product, the radio frequency tag corresponding to the user password is assigned to the Commodity association.
  • the network device 11 stores and records the user password corresponding to the product, the chip feature information corresponding to the product, and/or the product information of the product, wherein the radio frequency tag 13 is attached to The commodity.
  • the radio frequency tag 13 is attached to the commodity 14 based on a pasting method; in another embodiment, the attachment method may also be built into the commodity.
  • each radio frequency tag is attached to a designated commodity to ensure that it will not be peeled off or replaced, so as to uniquely refer to the designated commodity.
  • the commodity 14 is delivered to the user 15 via a method such as logistics.
  • the user 15 scans and reads the radio frequency tag 13 attached to the commodity 14 through a reading device.
  • the reading device may only include a device for reading radio frequency tags, or a device with a function of reading radio frequency tags such as mobile phones; in one embodiment, the reading device may be equivalent to the The user terminal device 12 used by the user 15 to input the user password.
  • the function of the user terminal device 12 including the reading device is taken as an example for description. Of course, those skilled in the art can understand that the user can use a separate reading device for reading, and combine the user terminal device to input the read information.
  • the user terminal device 12 After the user terminal device 12 reads the radio frequency tag, the user terminal device 12 obtains the chip feature information in the radio frequency tag firmware, and through interaction with the user 15, obtains the user input user password.
  • the user terminal device 12 sends the acquired chip feature information and the user password entered by the user to the network device 11; the network device 11 is based on the user password and the user password corresponding to the commodity stored by itself.
  • the chip feature information corresponding to the commodity verifies the above-mentioned information sent by the user terminal device 12. According to different verification results, the network device 11 sends the commodity-related information of the commodity corresponding to the verification result to the user terminal device 12. For example, if the user password does not match any of the chip feature information, the network device 11 provides feedback information such as "failed verification" to the user terminal device 12; if the user password and the chip feature information The chip feature information is consistent.
  • the network device 11 provides the user terminal device 12 with “genuine product” and other similar information that has passed the verification, and provides the user terminal device 12 with commodity information of the commodity.
  • the user 15 actively sets the verified information by submitting a user password, or uses a user password set by a network device to verify the chip feature information And the user password is double-verified to achieve cross-checking, ensuring that the verified information cannot be simply copied or counterfeited, and the uniqueness of verification is guaranteed.
  • Fig. 2(a) shows a schematic diagram of a radio frequency tag with a fragile outer tag combined with a fragile outer tag according to an embodiment of the present application.
  • the fragile outer label 131 includes a unique serial number 133, and the fragile outer label 131 is covered and pasted on the radio frequency label 132.
  • the fragile outer label 131 is a rectangular label made of fragile materials, and the unique serial number 133 is printed on the fragile outer label 31.
  • the fragile outer label 131 may have any shape.
  • the size of the fragile outer tag 131 is larger than the size of the radio frequency tag 132, and can completely cover the radio frequency tag 132.
  • the radio frequency tag 132 includes a radio frequency chip and an antenna corresponding to the radio frequency chip.
  • the packaging of the radio frequency tag 132 and the production of the fragile outer tag 131 can be completed by different processing parties, that is, the production of the fragile outer tag 131 can be the same as the production of the radio frequency tag 132. Phase separation.
  • the size of the fragile outer tag is associated with the size of the radio frequency tag.
  • the size of the fragile outer label may be the same as that of the radio frequency label, so that the fragile outer label can be pasted on the radio frequency label in a covering manner.
  • the size of the fragile outer tag is larger than the size of the radio frequency tag, so that the fragile outer tag can completely cover the radio frequency tag.
  • the fragile label is made of fragile materials, and is covered and pasted on the radio frequency label (for example, using hot melt adhesive), which can achieve the effect of "tear and destroy" and ensure that a third party cannot easily replace the fragile label. Outside label.
  • the fragile outer label is made of fragile paper material.
  • the shape of the fragile outer label may be any shape, such as square, circle, ellipse, irregular polygon, triangle, etc.
  • the unique serial number on the fragile outer tag can be determined by the user of the radio frequency tag, and the unique serial number can be determined based on any method of generating the unique serial number, and only the fragile outer tag needs to be guaranteed.
  • the label should be unique within a predetermined range. For example, each fragile outer label produced has a unique unique serial number, or, in the circulation area of the radio frequency tag, the fragile outer label used has a unique unique serial number.
  • the unique serial number is printed on the fragile outer label.
  • the unique serial number may be any one or a combination of numbers, letters, Chinese characters, graphics, and the like.
  • Fig. 3 shows a flow chart of a method for user interactive IoT verification based on radio frequency tags according to an embodiment of the present application.
  • step S1 the network device obtains one or more user passwords, wherein the one or more user passwords correspond to one or more commodities ordered by the user.
  • step S2 the network device obtains chip feature information of one or more radio frequency tags, where the chip feature information includes, for example, a chip UID, and the one or more radio frequency tags respectively correspond to the one or more radio frequency tags. commodity.
  • step S3 the network device records the user password corresponding to the commodity, the chip feature information corresponding to the commodity, and the commodity information of the commodity in the network device, wherein the radio frequency tag Attached to the commodity.
  • step S4 when the user receives the commodity, the user terminal device corresponding to the user reads the radio frequency tag and obtains the chip feature information in the firmware of the radio frequency tag, and based on the Reading the radio frequency tag, interacting with the user to obtain the user password input by the user.
  • step S5 the user terminal device sends the user password input by the user and the chip characteristic information of the radio frequency tag to the network device.
  • step S6 the network device verifies the chip feature information and the user password.
  • step S7 according to the verification result of the user password and the chip characteristic information, the network device sends information related to the verification result to the user. For example, to notify the user that the verification passed or failed.
  • the network device further sends related information of the commodity corresponding to the verification result to the user terminal device.
  • step S1 the network device obtains one or more user passwords, wherein the one or more user passwords correspond to one or more commodities ordered by the user.
  • the network device obtains one or more user passwords set by the user, wherein the one or more user passwords correspond to one or more commodities ordered by the user.
  • step S1 the user inputs the user password set by himself through any user terminal, and the user terminal sends the user password to the network device.
  • the user submits the set user password to the network device through a PC port, a H5 or APP mobile phone port, or a customized handheld terminal to connect to the network remotely.
  • the user terminal includes, but is not limited to, non-mobile devices such as PCs and mobile devices such as PADs or mobile phones.
  • the user password can be submitted directly with the product order when ordering the product, or can be submitted separately after the order is submitted.
  • the user can input one or more passwords to set corresponding passwords for some or all of the ordered commodities.
  • one user password can correspond to one or more ordered products (for example, one order corresponds to one user password), or a different user password can be set for each ordered product.
  • the product will correspond to a user password, that is, a password is assigned to a radio frequency chip corresponding to each product.
  • the network device determines one or more user passwords, wherein the one or more user passwords correspond to one or more commodities ordered by the user; wherein, the method further includes the step (Not shown): The network device sends the one or more user passwords to the user corresponding to the commodity.
  • the network device 11 determines the user password corresponding to the radio frequency tag through automatic generation or manual means; in addition, the network device 11 transfers the password based on at least any one of short message, email, and information push channels. The user password is sent to the user corresponding to the radio frequency tag.
  • the network device 11 can send the user password directly when the user purchases the product, or it can be sent after the user receives the product and scans the radio frequency tag. Line to send.
  • the network device 11 determines the user password after the user determines the purchased product, that is, after the user determines the purchased product, the network device starts to determine the corresponding user password ; It can also be executed before the user confirms to purchase the product, that is, the network device pre-determines the corresponding user password, and when the user purchases the product, the radio frequency tag corresponding to the user password is associated with the product Associated.
  • step S2 the network device obtains chip feature information in the firmware of one or more radio frequency tags, where the chip feature information includes, for example, a chip UID, and the one or more radio frequency tags respectively correspond to the one Or multiple products.
  • the network device directly reads chip characteristic information of one or more radio frequency tags.
  • the reading includes reading a blank radio frequency chip or reading a radio frequency chip that has been pre-attached to the commodity, that is, directly reading the chip to obtain chip characteristic information.
  • the chip feature information further includes firmware parameter information of the chip.
  • the firmware parameter information includes, but is not limited to, tag type, version, format, used technology, communication protocol related parameters (such as ATQA: used to determine the level of UID, SAK: used for anti-collision and card selection Response), memory information, manufacturer code, etc. one or more, different types of radio frequency chips have different firmware parameter information. In this application, at least any one of them can be used as the firmware parameter information to be read/recorded.
  • the firmware parameter information is also used as one of the verified information.
  • the processing method of the firmware parameter information in this application is the same or similar to the processing method of the chip UID, and will not be repeated here.
  • Fig. 4(a) shows a schematic diagram of a system for obtaining chip feature information of one or more radio frequency tags by a network device according to an embodiment of the present application.
  • the network device 11 selects a blank radio frequency tag 13 and uses it as the radio frequency tag corresponding to the product; then, the network device 11 reads directly or interacts with other card reader devices To obtain the chip feature information of the blank radio frequency tag.
  • the radio frequency tag 13 is a radio frequency tag that has been attached to the commodity in advance, and the network device 11 can also directly read the chip characteristic information of the radio frequency tag.
  • the chip characteristic information includes, for example, a chip UID.
  • the network device 11 or other card reader/writer device can also read the firmware parameter information of the radio frequency tag.
  • the card reader/writer device may be a mobile device with card reader/writer function, such as a mobile phone; in another embodiment, the card reader/writer device may be a device without card reader/writer function (such as PC client) and a combination of peripherals with card reading and writing functions (such as PC card readers), devices that do not have card reading and writing functions and peripherals with card reading and writing functions, for example, ActiveX web controls can be used Connect with other forms.
  • a mobile device with card reader/writer function such as a mobile phone
  • the card reader/writer device may be a device without card reader/writer function (such as PC client) and a combination of peripherals with card reading and writing functions (such as PC card readers), devices that do not have card reading and writing functions and peripherals with card reading and writing functions, for example, ActiveX web controls can be used Connect with other forms.
  • the network device obtains chip feature information of the radio frequency tag from the chip feature providing device, wherein the chip feature information includes, for example, a chip UID, and the radio frequency tag corresponds to the commodity.
  • the chip feature providing device includes, but is not limited to, a database storing chip feature information of a radio frequency tag, which has already corresponded to the commodity.
  • the network platform for ordering goods may include a database storing chip feature information of a certain product and its corresponding radio frequency tag.
  • the radio frequency tag has been allocated to the product. If the user orders the product, the The network equipment obtains the chip feature information of the radio frequency tag from the chip feature providing device; or, other third-party equipment, such as commodity suppliers, can also directly allocate radio frequency tags to the commodities they provide, and store the commodity and its For the corresponding chip feature information of the radio frequency tag, the network device can directly interact with the third-party device to obtain the chip feature information of the radio frequency tag.
  • Fig. 4(b) shows a schematic diagram of a system for obtaining chip feature information of one or more radio frequency tags by a network device according to an embodiment of the present application.
  • the network device 11 needs to obtain the chip feature information of the radio frequency tag 13 corresponding to the product ordered by the user, then the network device 11 and the chip feature information of the radio frequency tag 13 corresponding to the product
  • the chip feature providing device namely DB-UID, interacts to obtain the chip feature information corresponding to the commodity.
  • the network device 11 sends the name, batch, number and other information of the product to the DB-UID, and the DB-UID sends the chip feature information of the radio frequency tag 13 corresponding to the product to the network device 11.
  • the network device obtains the chip feature information of the radio frequency tag corresponding to the commodity from the chip feature providing device corresponding to the commodity according to the commodity ordered by the user, wherein
  • the chip feature information includes, for example, the chip UID.
  • the network device obtains the chip feature information of the radio frequency tag corresponding to the commodity from the chip feature providing device according to the ordered commodity; After the user orders the commodity, the network device sends a request to the chip feature providing device to obtain corresponding chip feature information.
  • the method further includes the step of: the network device obtains chip feature information of one or more radio frequency tags from one or more chip feature providing devices, wherein the chip feature information includes, for example, chip UID Each radio frequency tag corresponds to one or more commodities; wherein, the step S2 includes: the network device selects from the acquired chip characteristic information of one or more radio frequency tags according to the commodities ordered by the user Chip feature information corresponding to the commodity.
  • the network device may obtain chip feature information of one or more radio frequency tags from the chip feature providing device in advance for storage. Since each radio frequency tag corresponds to one or more commodities, when a user orders a commodity , The network device selects the chip feature information corresponding to the commodity from the acquired chip feature information according to the ordered commodity.
  • the above two embodiments can realize the separation of the network equipment and the chip feature providing device.
  • the separate arrangement can prevent the manufacturer from one-time The UID database is leaked, and the storage security of UID data is realized.
  • the honey manufacturer assigns a radio frequency tag to each bottle of honey, and records each bottle of honey and its corresponding chip UID of the radio frequency tag in the DB-UID; when the user is online
  • the delivery platform purchases a bottle of honey
  • the online delivery platform submits the user's purchase information to the honey manufacturer, and the honey manufacturer obtains the honey purchased by the user and the chip UID of the corresponding radio frequency tag from the DB-UID, and Send the chip UID information to the network shipping platform;
  • the online delivery platform may also obtain multiple bottles of honey and the chip UIDs of the radio frequency tags corresponding to the multiple bottles of honey in advance from the honey manufacturer.
  • the online delivery platform Call the chip UID information corresponding to the honey.
  • step S3 the network device records the user password corresponding to the commodity, the chip feature information corresponding to the commodity, and the commodity information of the commodity in the network device, wherein the radio frequency tag Attached to the commodity.
  • the network device stores the user password corresponding to the product, the chip feature information corresponding to the product, and the product information of the product in the network device, where the product information includes However, it is not limited to information such as product name, batch number, shelf life, place of origin, order-related information, and the order-related information includes order time, order number, name of the user who placed the order, etc.
  • the radio frequency tag is attached to the commodity by pasting or embedding.
  • step S3 the network device encrypts and records the user password corresponding to the commodity, the chip feature information corresponding to the commodity, and the commodity information of the commodity in the network device ,
  • the radio frequency tag has been attached to the commodity.
  • the record may be an encrypted record.
  • the user password, the chip feature information, and the product information can be encrypted separately, and the same or different encryption algorithms can be used when encrypting separately; the user password and the chip feature information can also be encrypted. And at least any two items in the commodity information are encrypted together, that is, after the two are combined into a string, the same encryption algorithm is used for encryption.
  • the encryption algorithm can be any symmetric or asymmetric encryption algorithm used for information encryption. In the encryption process, you can directly use a specific algorithm to encrypt the above information, or you can add other encryption feature information in the encryption process to enhance confidentiality.
  • step S4 when the user receives the commodity, the user terminal device corresponding to the user reads the radio frequency tag and obtains the chip characteristic information of the radio frequency tag, and based on the information on the radio frequency tag Reading and interacting with the user to obtain the user password input by the user.
  • the user when the user receives the commodity, the user can use the corresponding user terminal device to scan the radio frequency tag; after scanning the radio frequency tag, the user terminal device can scan the radio frequency tag according to the scan
  • the information requests the user to enter the user password.
  • the request may be an input request sent by the user terminal device itself; or after the user terminal device interacts with the network device, the request sent by the network device is obtained and based on the request On the user terminal device, the user is requested to enter a user password.
  • the user terminal device may pop up an input box to request the user to input a user password.
  • the user terminal device when the user terminal device reads the radio frequency tag, the user terminal device can obtain the chip characteristic information of the radio frequency tag.
  • step S5 the user terminal device sends the user password input by the user and the chip characteristic information of the radio frequency tag to the network device through an encrypted or non-encrypted communication method.
  • step S6 the network device verifies the chip feature information and the user password.
  • the network device interacts with the user terminal device to obtain the user password input by the user and the chip feature information of the radio frequency tag sent by the user terminal device; then, the network device will The information obtained from the user terminal device is matched with the information stored by the network device itself, that is, the user password obtained by the user terminal device is matched with the user password stored by the network device, and the user The chip feature information read by the terminal device and the chip feature information stored by the network device are respectively matched and verified, and a verification result is obtained.
  • the matching verification process can be performed based on a predetermined matching sequence, for example, the user password is matched first, then the chip feature information, or vice versa; or the matching verification process can be performed simultaneously, that is, the user passwords are respectively matched at the same time And chip feature information.
  • the above-mentioned one or more types of information are stored through encryption, and when read, the network device decrypts it based on a predetermined decryption method.
  • the matching result includes but not limited to:
  • the chip feature information read by the user terminal device is not recorded in the network device;
  • the chip feature information matches the user password.
  • step S7 according to the verification result of the user password and the chip characteristic information, the network device sends information related to the verification result to the user. For example, to notify the user that the verification passed or failed.
  • the network device further sends related information of the commodity corresponding to the verification result to the user terminal device.
  • the network device sends related information about the product to the user terminal device according to different verification results, and the related information about the product includes, but is not limited to, all information, partial information, and related information of the product. Or it is empty information related to the product (such as refusing to provide information about the product).
  • the network device For example, if the chip feature information cannot be matched, that is, the chip feature information read by the user terminal device is not recorded in the network device, the network device provides "non-system card” or "unable to pass Verification” and other information; preferably, the network device terminates further verification and feedback.
  • the network device If the chip characteristic information matches but the user password cannot be matched or if the chip characteristic information does not match the user password, the network device provides information such as "unable to pass verification"; preferably, the network The device terminates further verification and feedback.
  • the network device If the chip feature information matches the user password, the network device provides information such as "genuine product” or "pass anti-counterfeiting verification", and pushes the product information of the product to the user terminal device.
  • the network device can also push the unique serial number stored in the network device to the user terminal device.
  • the network device before step S4, the network device also writes information to be verified corresponding to the commodity into the radio frequency tag, wherein the information to be verified includes the user password.
  • the information to be verified may further include the chip characteristic information of the radio frequency tag corresponding to the commodity obtained by the network device, such as UID.
  • the network device writes the to-be-verified information corresponding to the commodity into the chip of the radio frequency tag directly or through a card reader/writer device.
  • the network device or card reader device may first read the radio frequency tag to obtain the chip format, communication protocol, chip UID and other parameters of the radio frequency tag; then, based on the above parameters, write the required parameters
  • the information such as the user password set by the user and the acquired chip feature information, are written into the radio frequency tag.
  • the information to be verified may also include product information of the product.
  • the information to be verified further includes additional feature information, that is, the network device or the card reader/writer device can also write other additional feature information into the radio frequency tag.
  • the network device may also store the additional feature information in the network device.
  • the additional feature information includes but is not limited to feature code, feature information, and the like.
  • the additional feature information can be written based on any algorithm.
  • the card reader/writer device may be a mobile device with a card reader/writer function, such as using a mobile phone to implement reading and writing through an APP on the mobile phone; in another embodiment, the card reader/writer device It can be a combination of devices without card reading and writing functions (such as PC clients) and peripherals with card reading and writing functions (such as PC card readers), devices without card reading and writing functions, and with card reading and writing functions
  • the peripherals can be connected through ActiveX webpage controls, for example, from a specific webpage on the PC client, through ActiveX webpage controls, the PC card reader is controlled to read and write.
  • step S4 when the user terminal device corresponding to the user is reading the radio frequency tag, in addition to acquiring the chip feature information in the firmware of the radio frequency tag and reading based on the radio frequency tag, and The user interacts to obtain the user password input by the user, and also reads the information to be verified written by the network device in the radio frequency tag.
  • the user terminal device uses the user password input by the user and/or the acquired chip feature information in the firmware of the radio frequency tag to associate the user password and/or chip feature information with the
  • the corresponding information in the to-be-verified information written by the network device matches, so that the user terminal device verifies the user password and/or chip feature information on the user side.
  • the matching verification process may be performed based on a predetermined matching sequence, for example, the user password is verified first, and then the chip characteristic information, or vice versa; or the matching verification process may be performed simultaneously; or the matching verification process may only Match one of user password and chip feature information.
  • the user terminal device may first match the obtained chip feature information in the firmware of the radio frequency tag with the chip feature information obtained from the information to be verified. If the matching is successful, interact with the user to obtain the user password entered by the user for password verification; if the matching is unsuccessful, directly provide the user with a prompt such as "non-system card".
  • the user terminal device may interact with the user to obtain the chip feature information in the firmware of the radio frequency tag and the chip feature information from the information to be verified. The user password input by the user may be verified first, and if the password verification is passed, then the chip characteristic information verification may be performed, or both may be performed simultaneously.
  • a prompt such as "verification failed” can be directly provided to the user to terminate the verification process without performing step S5.
  • the user terminal device may selectively send information that the user terminal has failed authentication and the information obtained by the user terminal to the network device.
  • the user terminal device may also selectively execute step S5.
  • step S5 may also be performed before the user side authentication.
  • the user terminal device may perform step S5 to combine the user password entered by the user and the obtained user password through an encrypted or non-encrypted communication method.
  • the chip feature information in the firmware of the radio frequency tag is sent to the network device.
  • the user terminal device may also selectively send the verification result of the information to be verified to the network device.
  • the user terminal device can selectively send various information about the user terminal verification to the network device.
  • step S6 the network device performs verification on the chip feature information and the user password.
  • the network device sends the related information of the commodity corresponding to the verification result to the user terminal device.
  • the network device For example, if the result of the network device is "verification failed", the network device provides the user terminal device with “verification failed” information. If the network device passes the verification, the network device provides information such as "genuine product” or “passing anti-counterfeiting verification” to the user terminal device, and pushes the product information of the product to the user terminal device.
  • a prompt such as "user terminal verification passed” may be provided to the user. Users do not need to wait for further verification by network equipment.
  • the user may be further provided with a prompt such as "waiting for further verification of the network device" or may be asked whether the user needs further verification of the network device.
  • the user terminal device may perform step S5 (if it has not been performed before) when it is back online.
  • the user terminal device may also selectively send the verification result of the user terminal device to the network device, The network device executes the steps to verify the network side, and will not repeat them.
  • Fig. 5 shows a schematic structural diagram of a network device for user interactive IoT verification based on radio frequency tags according to an embodiment of the present application.
  • the network device 50 includes a device 501, a device 502, a device 503, a device 504, a device 505, and a device 506.
  • the device 501 is configured to perform step S1.
  • the device 502 is configured to perform step S2.
  • the device 503 is configured to perform step S3.
  • the device 504 is used to obtain the chip feature information of the radio frequency tag from the user terminal device and the user password input by the user in the user terminal device.
  • the device 505 is configured to perform step S6.
  • the device 506 is configured to perform step S7.
  • the device 501 is configured to obtain one or more user passwords set by the user.
  • the device 501 is configured to determine one or more user passwords, wherein the one or more user passwords correspond to one or more commodities ordered by the user; wherein, the network The device further includes a device (not shown) for sending the one or more user passwords to the user corresponding to the commodity.
  • the device 502 is configured to directly read the chip characteristic information of one or more radio frequency tags. In another embodiment, the device 502 is configured to obtain chip feature information of a radio frequency tag from a chip feature providing device, wherein the chip feature information includes, for example, a chip UID, and the radio frequency tag corresponds to the commodity.
  • the network device further includes a device configured to obtain chip feature information of one or more radio frequency tags from one or more chip feature providing devices, wherein the chip feature information includes, for example, chip feature information.
  • the chip feature information includes, for example, chip feature information.
  • UID each radio frequency tag corresponds to one or more commodities; wherein, the device 502 is configured to select and select from the acquired chip characteristic information of one or more radio frequency tags according to the commodities ordered by the user Describe the chip feature information corresponding to the commodity.
  • the device 503 is configured to encrypt and record the user password corresponding to the commodity, the chip characteristic information corresponding to the commodity, and the commodity information of the commodity in the network device.
  • the device 504 is configured to obtain the chip feature information of the radio frequency tag read by the user terminal device and the user password entered by the user in the user terminal device .
  • the user when the user receives the commodity, the user can use the corresponding user terminal device to scan the radio frequency tag; after scanning the radio frequency tag, the user terminal device can scan the radio frequency tag according to the scan
  • the information requests the user to enter the user password.
  • the request may be an input request sent by the user terminal device itself; or after the user terminal device interacts with the network device, the request sent by the network device is obtained and based on the request On the user terminal device, the user is requested to enter a user password.
  • the user terminal device sends the user password input by the user and the chip characteristic information of the radio frequency tag to the network device through an encrypted or non-encrypted communication method. Accordingly, the device 504 is configured to Communicating with the user terminal device to obtain the above-mentioned information.
  • the apparatus 505 is configured to match the information obtained from the user terminal device with the information stored in the network device itself, that is, to match the user password obtained by the user terminal device Perform matching verification with the user password stored by the network device, the chip feature information read by the user terminal device and the chip feature information stored by the network device, respectively, and obtain a verification result.
  • the matching verification process can be performed based on a predetermined matching sequence, for example, the user password is matched first, then the chip feature information, or vice versa; or the matching verification process can be performed simultaneously, that is, the user passwords are respectively matched at the same time And chip feature information.
  • the above-mentioned one or more types of information are stored through encryption, and when read, the network device decrypts it based on a predetermined decryption method.
  • the matching result includes but not limited to:
  • the chip feature information read by the user terminal device is not recorded in the network device;
  • the chip feature information matches the user password.
  • the device 506 is configured to send information related to the verification result to the user according to different verification results. For example, to notify the user that the verification passed or failed.
  • the device 506 is further configured to send related information of the commodity to the user terminal device.
  • the related information of the commodity includes, but is not limited to, all information, partial information, and associated information of the commodity. Information or empty information related to the product (such as refusing to provide information about the product).
  • the network device further includes a device configured to write information to be verified corresponding to the commodity into the radio frequency tag, wherein the information to be verified includes a user password set by the user .
  • the information to be verified may further include the chip characteristic information of the radio frequency tag corresponding to the commodity obtained by the network device, such as UID.
  • the information to be verified further includes additional feature information.
  • the network device may also store the additional feature information in the network device.
  • the additional feature information includes but is not limited to feature code, feature information, and the like.
  • the additional feature information can be written based on any algorithm.
  • the network device optionally further includes a device configured to obtain a verification result of the user terminal device on the information to be verified.
  • the verification result includes that the information to be verified passes the verification or the information to be verified fails the verification.
  • the user terminal device when the verification result of the user terminal device on the information to be verified is that the verification fails, the user terminal device no longer sends subsequent information to the network device, thereby avoiding a large amount of invalid The transmission of information avoids resource consumption of network equipment.
  • the verification result of the user terminal device on the information to be verified is a pass
  • the user terminal device sends the user password input by the user and the obtained firmware of the radio frequency tag to the network device.
  • the device 506 is configured to perform verification on the user password input by the user and the chip characteristic information received from the user terminal device.
  • the device 507 is configured to send related information of the commodity corresponding to the verification result to the user terminal device.
  • the user terminal device is provided with the information "verification failed”. If the verification is passed, information such as "genuine product” or “passing anti-counterfeiting verification” is provided to the user terminal device, and the product information of the product is pushed to the user terminal device.
  • Fig. 6 shows a schematic structural diagram of a user terminal device for user interactive IoT verification based on a radio frequency tag according to an embodiment of the present application.
  • the user terminal equipment 60 includes a device 601, a device 602, and a device 603.
  • the device 601 is configured to obtain chip feature information in the firmware of the radio frequency tag, and interact with the user to obtain a user password input by the user, wherein the user password is the user Set when ordering goods or set by a network device for the goods ordered by the user and sent by the network device to the user, the chip characteristic information includes, for example, the chip UID, and the radio frequency tag is attached to the Said on the commodity.
  • the device 601 may be configured to read the radio frequency tag.
  • the device 601 may be configured to obtain the chip characteristic information of the radio frequency tag from a reading device separate from the user terminal equipment, wherein the user can obtain the chip feature information through the reading device.
  • the chip feature information and input it into the device 601; or the user terminal device can obtain the chip feature information from the reading device in various ways well known in the art.
  • the reading device can After reading the radio frequency tag, a two-dimensional code or barcode of the chip characteristic information is generated, and the user terminal device obtains the chip characteristic information by scanning the two-dimensional code or the barcode for identification.
  • the user terminal device or the device 601 may be configured to include a device that scans and recognizes a two-dimensional code or a barcode.
  • the device 602 may be configured to send the user password input by the user and the obtained chip characteristic information of the radio frequency tag to the network device.
  • the device 603 may be configured to obtain the related information of the commodity corresponding to the verification result of the user password and the chip characteristic information sent by the network device.
  • the device 603 acquires information such as "non-system card” or "unable to pass verification”; if the chip feature information matches but the user The password cannot be matched or if the chip feature information does not match the user password, the device 603 obtains information such as "verification failed”; if the chip feature information matches the user password, Then, the information acquired by the device 603 is “genuine product” or “passing anti-counterfeiting verification”.
  • the product information of the product can also be acquired.
  • the device 603 can also obtain the unique serial number of the network device sent by the network device.
  • the device 601 after obtaining the chip characteristic information of the radio frequency tag, the device 601 requests the user to input a user password.
  • the request may be an input request sent by the user terminal device itself; or after the user terminal device interacts with the network device, the request sent by the network device is obtained and based on the request On the user terminal device, the user is requested to enter a user password.
  • the user terminal device may pop up an input box to request the user to input a user password.
  • the user terminal device may include a device configured to display the input box.
  • the device 601 may be further configured to display the input box.
  • the device 601 is further configured to obtain further information to be verified written in the radio frequency tag by the network device, and the information to be verified includes the user password.
  • the information to be verified may further include the chip characteristic information of the radio frequency tag corresponding to the commodity obtained by the network device, such as UID.
  • the user terminal device further includes a user-side verification device (not shown), which is configured to be based on the user password input by the user and/or the obtained radio frequency tag Match the user password and/or chip feature information with the corresponding information in the to-be-verified information written by the network device to perform verification on the user password and/or chip feature information.
  • the matching verification process may be performed based on a predetermined matching sequence, for example, the user password is verified first, and then the chip characteristic information, or vice versa; or the matching verification process may be performed simultaneously; or the matching verification process may only Match one of user password and chip feature information.
  • the obtained chip feature information in the firmware of the radio frequency tag may be matched with the chip feature information obtained from the information to be verified. If the matching is successful, the password verification is performed; if the matching is unsuccessful, the user is directly provided with a prompt such as "non-system card".
  • the user password input by the user may be obtained after or at the same time after obtaining the chip characteristic information in the firmware of the radio frequency tag and obtaining the chip characteristic information from the information to be verified. Perform password verification. If the password verification is passed, then the chip feature information verification can be performed simultaneously. In an embodiment, if any of the user password and/or chip feature information fails the verification, a prompt such as "verification failed" may be directly provided to the user to terminate the verification process.
  • the user terminal device no longer sends subsequent information to the network device, thereby avoiding the transmission of a large amount of invalid information and avoiding resource consumption of the network device.
  • the user terminal device may include a device for sending a verification result of the information to be verified to the network device.
  • the apparatus 602 may be configured to selectively send the verification result of the information to be verified to the network device. In an embodiment, it is possible to selectively send the information that the user end authentication failed to the network device.
  • a prompt such as "user side verification passed” may be provided to the user.
  • a prompt such as "waiting for network device verification” can be further provided to the user.
  • the user terminal device can send the verification result of the user end to the network device when it is back online, and the network device performs further verification, which will not be repeated.
  • the user terminal device may further include a device configured to display the user side verification result and/or the network side verification result received from the network device.
  • the device 605 may be further configured to display the verification result of the client and/or the verification result of the network received from the network device.
  • Figure 2(b) shows a radio frequency tag anti-counterfeiting system according to an embodiment of the present application.
  • the radio frequency tag anti-counterfeiting system includes a service device 61, a reading device 62, a radio frequency tag, and a fragile external tag.
  • the fragile outer label carries a unique serial number, and the fragile outer label is covered and pasted on the radio frequency label to form a radio frequency label 63 with a fragile outer label.
  • the radio frequency tag 63 with a fragile outer label is affixed to the commodity 64.
  • the reading device 62 is used to read the radio frequency tag 63 on the commodity 64; the service device 61 is used to store the unique serial number corresponding to the radio frequency tag 63, and store it in the reading device 62 When reading the radio frequency tag 63, the unique serial number corresponding to the radio frequency tag 63 is sent to the reading device 62.
  • the reading device may be any electronic device capable of reading radio frequency tags, such as a card reader that professionally reads radio frequency tags, and a mobile phone that includes a function of reading radio frequency tags.
  • the service device 61 includes but is not limited to a single server or a server group composed of multiple servers.
  • the multiple servers may correspond to different service providers. For example, sending the unique serial number to the service device of the reading device is not equivalent to the service device that verifies the chip's unique identification code and one or more unique authentication information.
  • the reading device 62 may communicate with the service device 61 to request the service device 61 to send the unique serial number corresponding to the radio frequency tag to The reading device 62.
  • the reading device 62 compares the unique serial number with the unique serial number on the fragile outer tag according to the acquired unique serial number, and if they are consistent, it is determined that the radio frequency tag has not been replaced.
  • the reading device 62 may be a user terminal device with the function of reading radio frequency tags as described above or a reading device separate from the user terminal device, and the service device 61 may It is the network device as described above or a service device separate from the network device.
  • the user side can further or additionally verify whether the radio frequency label itself has been replaced through the radio frequency tag with the fragile outer tag.
  • the network device may include a device (such as device 502 or other devices) configured to obtain the unique serial number of the fragile outer label covered on the radio frequency tag of the commodity, and configured to record the unique serial number A device (for example, device 503 or other devices) configured to write the unique serial number into the radio frequency tag as part of the information to be verified.
  • the network device may send the unique serial number to the user based on at least any one of short messages, emails, and information push channels.
  • the user terminal equipment may include a device configured to obtain the unique serial number on the fragile outer label covered on the radio frequency tag of the commodity (for example, the device 601 or other devices, for example, may be similar to the way the user enters a password.
  • a device for example, device 601 or other devices
  • a device that is configured to obtain a unique serial number written by a network device from the information to be verified based on a received commodity manually input by the user, or receives a push from the network device to obtain the unique sequence No. device is configured to verify the unique serial number.
  • the verification of the unique serial number may also be added.
  • the user-side verification can adopt any order or combination for the verification of the above three types of information, which will not be repeated here.
  • the fragile outer label can be easily applied to any article, so as to verify the unique serial number. Verify that the item has not been replaced.
  • Those skilled in the art can easily conceive other applications of fragile outer labels.
  • Figure 7 shows an exemplary system that can be used to implement the various embodiments described in this application.
  • the system 700 can be used as the embodiments shown in Figure 1, Figure 2(a), Figure 2(b), Figure 3, Figure 4(a), Figure 4(b), Figure 5, and Figure 6 Or any computing device in the other described embodiments.
  • the system 700 may include one or more computer-readable media having instructions (for example, system memory or NVM/storage device 720) and be coupled with the one or more computer-readable media and configured to execute The instructions are one or more processors (eg, the processor(s) 705) that implement the modules to perform the actions described in this application.
  • system control module 710 may include any suitable interface controller to provide at least one of the processor(s) 705 and/or any suitable device or component in communication with the system control module 710 Any appropriate interface.
  • the system control module 710 may include a memory controller module 730 to provide an interface to the system memory 715.
  • the memory controller module 730 may be a hardware module, a software module, and/or a firmware module.
  • the system memory 715 may be used to load and store data and/or instructions for the system 700, for example.
  • the system memory 715 may include any suitable volatile memory, such as a suitable DRAM.
  • the system memory 715 may include a double data rate type quad synchronous dynamic random access memory (DDR4 SDRAM).
  • DDR4 SDRAM double data rate type quad synchronous dynamic random access memory
  • system control module 710 may include one or more input/output (I/O) controllers to provide an interface to the NVM/storage device 720 and the communication interface(s) 725.
  • I/O input/output
  • NVM/storage device 720 can be used to store data and/or instructions.
  • NVM/storage device 720 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard drives (HDD), one or more compact disc (CD) drives and/or one or more digital versatile disc (DVD) drives).
  • HDD hard drives
  • CD compact disc
  • DVD digital versatile disc
  • the NVM/storage device 720 may include storage resources that are physically part of the device on which the system 700 is installed, or it may be accessed by the device without necessarily being part of the device. For example, the NVM/storage device 720 may be accessed via the communication interface(s) 725 through the network.
  • the communication interface(s) 725 may provide an interface for the system 700 to communicate through one or more networks and/or with any other suitable devices.
  • the system 700 can wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
  • At least one of the processor(s) 705 may be packaged with the logic of one or more controllers of the system control module 710 (eg, the memory controller module 730). For one embodiment, at least one of the processor(s) 705 may be packaged with the logic of one or more controllers of the system control module 710 to form a system in package (SiP). For one embodiment, at least one of the processor(s) 705 may be integrated with the logic of one or more controllers of the system control module 710 on the same mold. For one embodiment, at least one of the processor(s) 705 may be integrated with the logic of one or more controllers of the system control module 710 on the same mold to form a system on chip (SoC).
  • SoC system on chip
  • the system 700 may be, but is not limited to, a server, a workstation, a desktop computing device, or a mobile computing device (for example, a laptop computing device, a handheld computing device, a tablet computer, a netbook, etc.).
  • the system 700 may have more or fewer components and/or different architectures.
  • the system 700 includes one or more cameras, keyboards, liquid crystal display (LCD) screens (including touchscreen displays), non-volatile memory ports, multiple antennas, graphics chips, application specific integrated circuits ( ASIC) and speakers.
  • LCD liquid crystal display
  • ASIC application specific integrated circuits
  • this application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by an application specific integrated circuit (ASIC), a general purpose computer or any other similar hardware device.
  • the software program of the present application may be executed by a processor to realize the steps or functions described above.
  • the software program (including related data structures) of the present application can be stored in a computer-readable recording medium, such as RAM memory, magnetic or optical drive or floppy disk and similar devices.
  • some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
  • the computer program instructions in the computer-readable medium include but are not limited to source files, executable files, installation package files, etc.
  • the manner in which computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction before executing the corresponding post-installation program.
  • the computer-readable medium may be any available computer-readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media by which communication signals containing, for example, computer-readable instructions, data structures, program modules, or other data are transmitted from one system to another system.
  • Communication media can include conductive transmission media (such as cables and wires (for example, optical fiber, coaxial, etc.)) and wireless (unguided transmission) media that can propagate energy waves, such as sound, electromagnetic, RF, microwave, and infrared .
  • Computer readable instructions, data structures, program modules or other data may be embodied as, for example, a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology.
  • modulated data signal refers to a signal whose one or more characteristics have been altered or set in such a way as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • a computer-readable storage medium may include volatile, non-volatile, nonvolatile, and nonvolatile, and may be implemented in any method or technology for storing information such as computer-readable instructions, data structures, program modules, or other data. Removable and non-removable media.
  • computer-readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or future developments that can be stored for computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM
  • non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or future developments that can be stored for computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM,
  • an embodiment according to the present application includes a device including a memory for storing computer program instructions and a processor for executing the program instructions, wherein, when the computer program instructions are executed by the processor, trigger
  • the operation of the device is based on the aforementioned methods and/or technical solutions according to multiple embodiments of the present application.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种基于射频标签的用户交互式物联验证的方法、装置与系统。与现有技术相比,该方法通过与订购商品(14)的用户(15)交互,以获取用户(15)所设置或网络设备(11)所确定并发送给用户(15)的用户密码,并将该用户密码以及射频标签(13)的芯片特征信息共同进行验证,从而通过与用户(15)交互实现了将用户密码引入到射频标签(13)的防伪验证中,由于用户(15)可以主动参与商品(14)防伪,防止平台方单方操纵防伪体系,并利用物联方法和服务器校验技术保证了芯片可以唯一性指代特定商品,避免被替换和/或重复使用,即使用户密码泄露、第三方用同格式芯片复写相同内容、或者芯片标签被替换、重复使用,该方案均可直接检出,形成可以商用的完整、有效的商品防伪系统。

Description

基于射频标签的用户交互式物联验证的方法、装置与系统 技术领域
本申请涉及射频标签技术领域,尤其涉及一种基于射频标签的用户交互式物联验证的技术以及一种RFID/NFC射频电子标签防伪系统。
背景技术
随着电子商务的不断发展,需要保证商品在流通过程中不被拦截、调换,以使得用户收到的商品能够保真,杜绝、制止假冒伪造商品的流通。
现有射频标签防伪系统和技术都是售方(如厂家、平台等)单独实施,如售方在射频标签芯片中写入特定的数据和内容,并将该芯片标签粘贴在商品上,用户仅能读取验证。防伪设计主要针对第三方篡改、复制、重复使用等。
但是,现有技术中的防伪技术没有为用户提供交互验证,仅由售方单方在射频标签芯片中写入特定的数据和内容,导致防伪验证系统所有数据都可以被售方单方操纵和篡改。现有技术中的防伪方法也没有给客户提供每只芯片一对一的密码校验程序,即使有些方法提供了用户读取工具(例如APP)账户登陆密码权限,但也没有提供针对每一只标签芯片的密码比对校验程序,导致芯片写入信息可以在通用登录权限下被第三方开放读取,增加了信息被泄露、仿写的风险。现有技术中的射频电子标签防伪系统中,芯片标签物理性连结指定商品不牢:由于标签芯片80%左右面积为金属天线,必然具有一定硬度和韧性,即使是目前市面上射频标签厂商特制的防撕毁“易碎纸”芯片标签,也是可以被完整剥离而重复使用,这将导致标签芯片无法唯一性代表指定商品,从而导致商品防伪系统无效而前功尽弃。目前的改进 方式,若是采用3M背胶,也可以轻易将射频标签从所粘贴的物品上剥离;若是采用粘性较好的热熔胶,尽管可以提高射频标签与物品的粘连程度,但热熔胶设备操作复杂,且热熔胶的热熔温度容易损毁标签芯片,导致芯片内的写入内容损失或无效。而一旦射频标签被物理性剥离、替换或重复使用,则会丧失其防伪效果,进而导致防伪系统前功尽弃。而且,这些防伪特征在商品流通过程中容易被售方操纵和/或被第三方复制、剥离替换或是被重复使用,从而无法实现预定的防伪效果。
另一方面,现有的射频芯片防伪技术均致力于深化读写算法、数据加密层面,着力解决和提升某一技术节点;现有的芯片防伪体系也总是缺失一点或数点技术环节而导致无法形成完整、有效的防伪系统。
发明内容
针对现有技术中存在上述技术问题中的至少一项,本申请提供一种基于射频标签的用户交互式物联验证的方法、装置与系统。
本申请还提供了一种射频标签防伪系统。
根据本发明的第一方面,提供了一种在网络设备处执行的方法,包括以下步骤:至少记录与一个或多个商品所对应的第一用户密码、以及与所述一个或多个商品所对应的一个或多个射频标签的第一芯片特征信息,其中,所述一个或多个射频标签被附着于对应的一个或多个商品上;将所述一个或多个商品所对应的待验证信息写入与所述一个或多个商品所对应的一个或多个射频标签中,所述待验证信息至少包括所述第一用户密码和所述第一芯片特征信息;在用户收到所述一个或多个商品后,从所述用户接收所述用户读取的所述一个或多个射频标签的第二芯片特征信息、所述用户输入的与所述一个或多个商品所对应的第二用户密码、以及对所述待验证信息的用户端验证的结果,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第 一芯片特征信息与所述第二芯片特征信息进行比较;在收到所述用户端验证的结果为通过验证的情况下,执行网络设备端验证以验证从所述用户接收的所述第二芯片特征信息以及所述第二用户密码,其中所述网络设备端验证包括将从所述用户接收的所述第二芯片特征信息与所记录的第一芯片特征信息进行比较和/或将所述第二用户密码与所记录的第一用户密码进行比较;以及将所述网络设备端验证的结果发送至所述用户。
根据本发明的第二方面,提供了一种在用户终端设备处执行的方法,包括以下步骤:在用户收到一个或多个商品之后,从所述一个或多个商品所对应的一个或多个射频标签获取所述一个或多个商品所对应的待验证信息,其中所述待验证信息是由网络设备写入的,所述待验证信息至少包括与所述一个或多个商品所对应的第一用户密码和所述一个或多个射频标签的第一芯片特征信息;获取所述一个或多个射频标签的第二芯片特征信息;与所述用户进行交互以获取所述用户输入的与所述一个或多个商品所对应的第二用户密码;对所述待验证信息进行用户端验证,包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;在所述用户端验证的结果为通过验证的情况下:如果所述用户终端设备离线,则通知所述用户用户端验证通过,以及如果所述用户终端设备在线,则执行以下至少之一:通知所述用户用户端验证通过,和/或至少将所述第二用户密码和所述第二芯片特征信息发送至所述网络设备以进行网络设备端验证并从所述网络设备接收所述网络设备端验证的结果。
根据本发明的第三方面,提供了一种用户交互式物联验证的方法,其中,所述方法包括如上所述的在网络设备处之行的方法和在用户终端那设备处之行的方法。
根据本发明的第四方面,提供了一种网络设备,包括:被配置成至少记录与一个或多个商品所对应的第一用户密码、以及与所述一个或多个商品所对应的一个或多个射频标签的第一芯片特征信息的装置,其 中,所述一个或多个射频标签被附着于对应的一个或多个商品上;被配置成将所述一个或多个商品所对应的待验证信息写入与所述一个或多个商品所对应的一个或多个射频标签中的装置,所述待验证信息至少包括所述第一用户密码和所述第一芯片特征信息;被配置成在用户收到所述一个或多个商品后,从所述用户接收所述用户读取的所述一个或多个射频标签的第二芯片特征信息、所述用户输入的与所述一个或多个商品所对应的第二用户密码、以及对所述待验证信息的用户端验证的结果的装置,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;被配置成在收到所述用户端验证的结果为通过验证的情况下,执行网络设备端验证以验证从所述用户接收的所述第二芯片特征信息以及所述第二用户密码的装置,其中所述网络设备端验证包括将从所述用户接收的所述第二芯片特征信息与所记录的第一芯片特征信息进行比较和/或将所述第二用户密码与所记录的第一用户密码进行比较;以及被配置成将所述网络设备端验证的结果发送至所述用户的装置。
根据本发明的第五方面,提供了一种用户终端设备,包括:被配置成在用户收到一个或多个商品之后,从所述一个或多个商品所对应的一个或多个射频标签获取所述一个或多个商品所对应的待验证信息的装置,其中所述待验证信息是由网络设备写入的,所述待验证信息至少包括与所述一个或多个商品所对应的第一用户密码和所述一个或多个射频标签的第一芯片特征信息;被配置成获取所述一个或多个射频标签的第二芯片特征信息的装置;被配置成与所述用户进行交互以获取所述用户输入的与所述一个或多个商品所对应的第二用户密码的装置;被配置成对所述待验证信息进行用户端验证的装置,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;在所述用户端验证的结果为通过验证的情况下:被配置成如果所述用户终端设备离线,则通知所述用户用户端验证通过的装置,以及被配置成如果所述用户终端设备在 线,则执行以下至少之一的装置:通知所述用户用户端验证通过,和/或至少将所述第二用户密码和所述第二芯片特征信息发送至所述网络设备以进行网络设备端验证并从所述网络设备接收所述网络设备端验证的结果。
根据本发明的第六方面,提供了一种用户交互式物联验证的系统,其中,所述系统包括如上所述的网络设备,以及如上所述的用户终端设备。
根据本发明的第七方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,当所述计算机可读指令被一个或多个设备执行时,使得所述设备执行如上所述的方法。
根据本发明的第八方面,提供了一种用户交互式物联验证的系统,所述系统包括存储器和处理器,所述存储器中存储有计算机可读指令,当所述计算机可读指令被所述处理器执行时,所述处理器执行如上所述的方法。
根据本发明的第九方面,提供了一种用户交互式物联验证的系统,所述系统包括如上所述的网络设备,以及如上所述的计算机可读存储介质。
根据本发明的第十方面,提供了一种标签防伪系统,所述标签防伪系统包括服务设备、读取设备、以及易碎外标签,所述易碎外标签被配置成覆盖粘贴于物体表面上,且所述易碎外标签上带有唯一序列号,所述服务设备被配置成将所述唯一序列号与所述物体相关联,并存储在所述服务设备中,以及所述读取设备被配置成在获得所述物品时与所述服务设备通信以获得与所述物品相关联的所述唯一序列号,从而通过验证所述易碎外标签上的唯一序列号与从所述服务设备获得的与所述物品相关联的唯一序列号来确定物品的真实性。
与现有技术相比,本申请通过与订购商品的用户交互,以获取用户所设置或网络设备所确定并发送给用户的用户密码,并将该用户密 码以及射频标签的芯片特征信息共同进行验证,从而本申请各技术方案具有以下优点中的至少一项:
1.通过与用户交互实现了将用户密码引入到射频标签的防伪验证中,用户只需要具有能够读取射频标签的读取设备,即可以主动参与商品防伪,防止平台方单方操纵防伪体系,也增加用户使用信心;
2.基于芯片特征信息的芯片防伪技术相比于二维码等明码验证技术,更能保证唯一性认证;
3.利用物联方法和服务器校验技术更保证了芯片可以唯一性指代特定商品,避免被替换和/或重复使用;进一步地,本申请的射频标签上还包含有带有唯一序列号的易碎外标签,解决芯片标签物理性连接商品技术节点,进一步实现了防替换和避免重复使用;
4.即使用户密码泄露、第三方用同格式芯片复写相同内容、或者芯片标签被替换、重复使用,本方案均可直接检出,形成可以商用的完整、有效的商品防伪系统。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证系统示意图;
图2(a)示出根据本申请一个实施例的一种将射频标签与易碎外标签相结合,以带有易碎外标签的射频标签的示意图;
图2(b)示出根据本申请一个实施例的一种射频标签防伪系统;
图3示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证的方法流程图;
图4(a)与图4(b)分别示出根据本申请一个实施例的一种网络设备获取一个或多个射频标签的芯片特征信息的系统示意图;
图5示出根据本申请一个实施例的一种基于射频标签的用户交互 式物联验证的网络设备的结构示意图;
图6示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证的读取设备的结构示意图;
图7示出了可被用于实施本申请中所述的各个实施例的示例性系统。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各项操作描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,各项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储 设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。
所述读取设备包括但不限于任意能够读取射频标签的读卡装置,如射频标签读卡器、可读取射频标签的移动设备、带有射频识别功能的移动设备等。
其中,所述射频标签可以为任意类型的射频标签。在一个实施例中,所述射频标签为RFID(Radio Frequency Identification,无线射频识别)射频标签,所采用的RFID芯片为任意类型的RFID芯片,包括但不限于低频RFID芯片、高频RFID芯片、超高频RFID芯片、微波RFID芯片等。在另一个实施例中,所述射频标签为NFC(Near Field Communication,近场通信)射频标签,所采用的NFC芯片为任意一种NFC芯片。
本申请所指用户设备包括但不限于任何一种可与用户进行人机交互的电子产品,例如智能手机、平板电脑、PC机等,所述用户设备可以采用任意操作系统,如android操作系统、iOS操作系统等。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
下面结合附图对本申请作进一步详细描述。
图1示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证系统示意图。
如图所示,该用户交互式物联验证系统涉及网络设备11、用户终端设备12、射频标签13、用户所订购的商品14、用户15。
所述用户15通过网络平台订购一个或多个商品,所述网络设备11为所述网络平台所对应的网络设备,所述用户15通过任意一种用户终端输入自身所设置的用户密码,所述用户终端将所述用户密码发送至所述网络设备11。在此,例如,所述用户可以随订单信息同步设置商品的用户密码,也可以在订单提交完成后另行设置商品的用户密码。所述用户终端包括但不限于如PC等非移动设备以及如PAD或手机等移动设备。
在图1中,以商品14表示该用户15所订购的商品。
所述网络设备11获取到所述用户15所输入的一个或多个用户密码,并将其与该用户15所订购的一个或多个商品一一对应;然后,所述网络设备11获取一个或多个射频标签13的芯片特征信息,其中,所述一个或多个射频标签13分别对应于所述一个或多个商品,所述芯片特征信息包括例如芯片UID。
其中,所述芯片UID(Unique Identifier)为所述射频标签的芯片的产品身份编码固定码,且UID为半导体固件代码,每个芯片UID全球唯一,不随使用方数据读写更改或删除。
或者,所述网络设备11为所订购的一个或多个商品确定一个或多个用户密码,每个商品均对应于一个用户密码。所述网络设备11基于短信、邮件、信息推送渠道等中的至少任一种,将所述用户密码发送至所述射频标签对应的用户15。然后,所述网络设备11获取一个或多个射频标签13的芯片特征信息,其中,所述一个或多个射频标签13分别对应于所述一个或多个商品,所述芯片特征信息包括例如芯片UID。
在此,本领域技术人员应能理解,所述网络设备11对所述用户密码 的发送可以在用户购买商品时直接发送(例如通过用户订购商品的APP),也可以在用户收到商品后并对所述射频标签进行扫描时再行发送。此外,所述网络设备11对于用户密码的确定,可以在所述用户15确定了所购买的商品后进行,也即,当用户确定了购买的商品之后,所述网络设备开始确定相对应的用户密码;也可以在所述用户确定购买商品前就执行,也即,所述网络设备预先确定相对应的用户密码,而当用户购买商品后,则将与该用户密码相对应的射频标签与该商品相关联。
所述网络设备11将所述商品所对应的用户密码以及所述商品所对应的所述芯片特征信息,和/或所述商品的商品信息进行存储记录,其中,所述射频标签13被附着于所述商品上。如附图1所示,所述射频标签13基于粘贴的方式被附着于所述商品14上;在另一个实施例中,所述附着方式还可以是内置于所述商品上。在此,每一只射频标签附着于一件指定商品,确保不会剥离、替换使用,以便唯一性指代该指定商品。
所述商品14经由例如物流等方式被运送到所述用户15的手中。当所述用户15收到所述商品14后,所述用户15通过读取设备来对该商品14上所附着的射频标签13进行扫描读取。在此,所述读取设备可以仅包含有读取射频标签的设备,也可以是如手机等具有读取射频标签功能的设备;在一个实施例中,所述读取设备可以等同于所述用户15用于输入用户密码的用户终端设备12。在本发明的实施例中,以用户终端设备12包括读取设备的功能为例进行说明。当然,本领域的技术人员可以理解用户可以使用单独的读取设备进行读取,并结合用户终端设备来输入读取到的信息。
当所述用户终端设备12对所述射频标签进行读取后,所述用户终端设备12获取所述射频标签固件中的芯片特征信息,并通过与所述用户15的交互,获取用户所输入的用户密码。
然后,所述用户终端设备12将所获取的芯片特征信息以及用户所输入的用户密码均发送至所述网络设备11;所述网络设备11基于自身所存储的所述商品所对应的用户密码和所述商品所对应的所述芯片特 征信息,对所述用户终端设备12所发送的上述信息进行验证。而根据不同的验证结果,所述网络设备11将与所述验证结果相对应的所述商品的商品相关信息发送至所述用户终端设备12。例如,如果所述用户密码和所述芯片特征信息中的任一项不符,所述网络设备11向所述用户终端设备12提供“未通过验证”等反馈信息;如果所述用户密码和所述芯片特征信息均比对一致,所述网络设备11向所述用户终端设备12提供“正品”等校验通过类似信息,并向所述用户终端设备12提供所述商品的商品信息。
经由上述过程,在对射频标签的验证过程中,所述用户15通过提交用户密码的方式,对所验证的信息进行主动设置,或者通过网络设备所设置的用户密码,以对所述芯片特征信息以及所述用户密码进行双重验证,实现了交叉检验,保证了所验证的信息无法被简单复制,也无法被仿冒,保证了验证的唯一性。
图2(a)示出根据本申请一个实施例的一种将射频标签与易碎外标签相结合,以带有易碎外标签的射频标签的示意图。
其中,易碎外标签131上包含有唯一序列号133,该易碎外标签131覆盖粘贴于射频标签132上。图2(a)中,所述易碎外标签131为采用易碎材料制作的长方形标签,所述唯一序列号133印刷于所述易碎外标签31上。本领域技术人员应能理解,所述易碎外标签131可以为任意形状。通常,所述易碎外标签131的尺寸大于所述射频标签132的尺寸,并能将该射频标签132完全覆盖。所述射频标签132包括射频芯片以及与该射频芯片相对应的天线。一般地,所述射频标签132的封装以及所述易碎外标签131的制作可由不同的处理方完成,也即,所述易碎外标签131的生产制作可以与所述射频标签132的生产制作相分离。
在一种实施例一个实施例中,所述易碎外标签的大小与所述射频标签的大小相关联。例如,所述易碎外标签的大小可以与所述射频标签相同,从而所述易碎外标签能够以覆盖的方式粘贴在所述射频标签上。在 另一种实施例一个实施例中,所述易碎外标签的尺寸大于所述射频标签的尺寸,从而所述易碎外标签能够将所述射频标签完全覆盖。所述易碎标签采用易碎材料制作,并覆盖粘贴于射频标签上(例如采用热熔胶的方式),能够实现“一撕即毁”的效果,保证了第三方无法容易地替换该易碎外标签。在一种实施例中,所述易碎外标签以易碎纸材料制作。
在一个实施例中,所述易碎外标签的形状可以为任意形状,如方形、圆形、椭圆形、不规则多边形、三角形等。
在一个实施例中,所述易碎外标签上的唯一序列号可由射频标签的使用方来确定,该唯一序列号可以基于任意生成唯一序列号的生成方式进行确定,仅需保证该易碎外标签在预定范围内具有唯一性即可。例如,所生产的每个易碎外标签均具有唯一的唯一序列号,或者,在该射频标签的流通地区内,所使用的易碎外标签具有唯一的唯一序列号。
在一个实施例中,所述唯一序列号是被印刷于所述易碎外标签上的。
在一个实施例中,所述唯一序列号可以是数字、字母、汉字、图形等的任一种或多种的组合。
图3示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证的方法流程图。
其中,在步骤S1中,所述网络设备获取一个或多个用户密码,其中,所述一个或多个用户密码对应于所述用户所订购的一个或多个商品。
在步骤S2中,所述网络设备获取一个或多个射频标签的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID,所述一个或多个射频标签分别对应于所述一个或多个商品。
在步骤S3中,所述网络设备在所述网络设备中记录所述商品所对应的用户密码、所述商品所对应的所述芯片特征信息以及所述商品的商 品信息,其中,所述射频标签被附着于所述商品上。
在步骤S4中,当所述用户收到所述商品时,所述用户所对应的用户终端设备读取所述射频标签并获取所述射频标签的固件中的芯片特征信息,并基于对所述射频标签的读取,与所述用户进行交互以获取所述用户输入的所述用户密码。
在步骤S5中,所述用户终端设备将所述用户输入的所述用户密码以及所述射频标签的芯片特征信息发送至所述网络设备。
在步骤S6中,所述网络设备验证所述芯片特征信息以及所述用户密码。
在步骤S7中,根据所述用户密码以及所述芯片特征信息的验证结果,所述网络设备将与所述验证结果相关的信息发送给所述用户。例如通知用户验证通过或不通过。在一个实施例中,所述网络设备进一步将与所述验证结果相对应的所述商品的相关信息发送至所述用户终端设备。
以下对上述步骤进行具体说明。
在步骤S1中,所述网络设备获取一个或多个用户密码,其中,所述一个或多个用户密码对应于所述用户所订购的一个或多个商品。
在一个实施例中,所述网络设备获取用户所设置的一个或多个用户密码,其中,所述一个或多个用户密码对应于所述用户所订购的一个或多个商品。
具体地,在步骤S1中,所述用户通过任意一种用户终端输入自身所设置的用户密码,所述用户终端将所述用户密码发送至所述网络设备。例如,所述用户通过PC端口、H5或APP手机端口、订制手持终端联网远程方式向所述网络设备提交所设置的用户密码。在此,所述用户终端包括但不限于如PC等非移动设备以及如PAD或手机等移动设备。所述用户密码可以在订购商品时直接随商品订单一起提交,也可以在提交订单之后另行提交。
在此,所述用户可以输入一个或多个密码来为所订购的部分或全部 商品设置对应的密码。例如,一个用户密码可以对应于一个或多个订购商品(例如一张订单对应于一个用户密码),也可以为每个订购商品分别设置不同的用户密码。从所订购的商品的角度,若需要为某一个商品进行射频标签防伪,则该商品就会对应于一个用户密码,也即每件商品对应的一只射频芯片均分配一个密码。
在另一个实施例中,所述网络设备确定一个或多个用户密码,其中,所述一个或多个用户密码对应于所述用户所订购的一个或多个商品;其中,该方法还包括步骤(未示出):所述网络设备将所述一个或多个用户密码发送至与所述商品相对应的用户。
具体地,所述网络设备11通过自动生成或人工方式确定与所述射频标签所对应的用户密码;此外,所述网络设备11基于短信、邮件、信息推送渠道中的至少任一种,将所述用户密码发送至所述射频标签对应的用户。
在此,本领域技术人员应能理解,所述网络设备11对所述用户密码的发送可以在用户购买商品时直接发送,也可以在用户收到商品后并对所述射频标签进行扫描时再行发送。此外,所述网络设备11对于用户密码的确定,可以在所述用户确定了所购买的商品后进行,也即,当用户确定了购买的商品之后,所述网络设备开始确定相对应的用户密码;也可以在所述用户确定购买商品前就执行,也即,所述网络设备预先确定相对应的用户密码,而当用户购买商品后,则将与该用户密码相对应的射频标签与该商品相关联。
在步骤S2中,所述网络设备获取一个或多个射频标签的固件中的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID,所述一个或多个射频标签分别对应于所述一个或多个商品。
具体地,在一个实施例中,所述网络设备直接读取一个或多个射频标签的芯片特征信息。在此,所述读取包含读取空白射频芯片或是读取已经预先附着在商品上的射频芯片,也即,通过直接读取芯片以获取芯片特征信息。
在一个实施例中,所述芯片特征信息还包括所述芯片的固件参数信息。具体地,所述固件参数信息包括但不限于标签类型、版本、格式、所采用的技术、通信协议关联参数(如ATQA:用于判断UID有的级别,SAK:用于对防冲突和选卡的回应)、内存信息、厂商代码等一项或多项,不同类型的射频芯片所具有的固件参数信息不同,本申请中可以采用其中至少任一项作为读取/记录的固件参数信息,以将固件参数信息也作为所验证的信息之一。在此,本申请对于所述固件参数信息的处理方式是与芯片UID的处理方式相同或相似,在此不再赘述。
图4(a)示出根据本申请一个实施例的一种网络设备获取一个或多个射频标签的芯片特征信息的系统示意图。以一个商品为例,所述网络设备11选择一个空白射频标签13,并将其作为对应于该商品的射频标签;然后,所述网络设备11通过直接读取或与其他读写卡设备相交互,以获取该空白射频标签的芯片特征信息。在另一个实施例中,所述射频标签13是已经预先附着在商品上的射频标签,所述网络设备11也可以直接读取所述射频标签的芯片特征信息。
在此,所述芯片特征信息包括例如芯片UID。在读取过程中,除了所述芯片UID之外,该网络设备11或其他读写卡设备还可以读取所述射频标签的固件参数信息。
在一个实施例中,所述读写卡设备可以是具有读写卡功能的移动设备,如手机;在另一个实施例中,所述读写卡设备可以是不具有读写卡功能的设备(如PC客户端)以及具有读写卡功能的外设(如PC读写卡器)的组合,不具有读写卡功能的设备以及具有读写卡功能的外设之间可通过例如ActiveX网页控件等形式进行连接。
在另一个实施例中,所述网络设备从芯片特征提供装置处获取射频标签的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID,所述射频标签对应于所述商品。
具体地,所述芯片特征提供装置包括但不限于存储有射频标签的芯片特征信息的数据库,所述射频标签已经与所述商品相对应。例如, 订购商品的网络平台中可以包括存储有某一商品以及其对应的射频标签的芯片特征信息的数据库,所述射频标签已经被分配给所述商品,若用户订购了该商品,则所述网络设备从所述芯片特征提供装置处获取该射频标签的芯片特征信息;或者,其他第三方设备,如商品供应商也可以直接为其所提供的商品分配射频标签,并存储有该商品以及其所对应的射频标签的芯片特征信息,所述网络设备可以直接与所述第三方设备相交互,以获取该射频标签的芯片特征信息。
图4(b)示出根据本申请一个实施例的一种网络设备获取一个或多个射频标签的芯片特征信息的系统示意图。以一个商品为例,所述网络设备11需要获取用户所订购商品所对应的射频标签13的芯片特征信息,则所述网络设备11与存储有该商品所对应的射频标签13的芯片特征信息的芯片特征提供装置,即DB-UID进行交互,以获取该商品所对应的芯片特征信息。例如,所述网络设备11向所述DB-UID发送该商品的名称、批次、编号等信息,所述DB-UID将该商品所对应的射频标签13的芯片特征信息发送给所述网络设备11。
其中,在一个实施例中,所述网络设备根据所述用户所订购的商品,从与所述商品相对应的芯片特征提供装置处获取与所述商品相对应的射频标签的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID。
具体地,当所述用户下单订购商品以后,所述网络设备根据所订购的商品,从所述芯片特征提供装置处获取与该商品对应的射频标签的芯片特征信息;也即,只有在所述用户订购商品后,所述网络设备才向所述芯片特征提供装置发送请求,以获取对应的芯片特征信息。
在另一个实施例中,该方法还包括步骤:所述网络设备从一个或多个芯片特征提供装置处获取一个或多个射频标签的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID,每个射频标签对应于一个或多个商品;其中,所述步骤S2包括:所述网络设备根据所述用户所订购的商品,从所获取的一个或多个射频标签的芯片特征信息中选择与所述商品相对应的芯片特征信息。
也即,所述网络设备可以预先从所述芯片特征提供装置处获取一个或多个射频标签的芯片特征信息以进行存储,由于每个射频标签对应于一个或多个商品,当用户订购商品时,则所述网络设备则根据所订购的商品,从所获取的上述芯片特征信息中选择与该商品对应的芯片特征信息。
上述两种实施例能够实现将网络设备与芯片特征提供装置分设,例如,若网络设备对应于网络发货平台,芯片特征提供装置对应于厂商UID数据库,则通过分设的方式能够防止厂商方一次性泄露UID数据库,实现了UID数据的存储安全。
在此,以用户购买蜂蜜为例,蜂蜜厂商为每一瓶蜂蜜均分配了一个射频标签,并在DB-UID中记录了每一瓶蜂蜜以及其对应的射频标签的芯片UID;当用户在网络发货平台购买某一瓶蜂蜜时,所述网络发货平台向该蜂蜜厂商提交用户的购买信息,蜂蜜厂商从DB-UID中获取用户所购买的蜂蜜以及其对应的射频标签的芯片UID,并将该芯片UID信息发送给该网络发货平台;
或者,所述网络发货平台也可以预先从蜂蜜厂商处获取多瓶蜂蜜以及与该多瓶蜂蜜分别对应的射频标签的芯片UID,当用户购买其中一瓶蜂蜜时,则所述网络发货平台调用与该蜂蜜对应的芯片UID的信息。
在步骤S3中,所述网络设备在所述网络设备中记录所述商品所对应的用户密码、所述商品所对应的所述芯片特征信息以及所述商品的商品信息,其中,所述射频标签被附着于所述商品上。
具体地,所述网络设备在网络设备中将所述商品所对应的用户密码、所述商品所对应的所述芯片特征信息以及所述商品的商品信息进行存储,在此,所述商品信息包括但不限于如商品名称、批号、保质期、产地、订单相关信息等信息,所述订单相关信息包括订单时间、订单编号、下单用户名称等。所述射频标签通过粘贴或内置等方式附着于所述商品上。
在一个实施例中,在步骤S3中,所述网络设备在所述网络设备中 加密记录所述商品所对应的用户密码、所述商品所对应的所述芯片特征信息以及所述商品的商品信息,所述射频标签已被附着于所述商品上。
具体地,所述记录可以为加密记录。在此,可以对所述用户密码、所述芯片特征信息以及所述商品信息进行分别加密,在分别加密时可以采用相同或不同的加密算法;也可以对所述用户密码、所述芯片特征信息以及所述商品信息中的至少任两项进行共同加密,即将两者合并为一个字符串后,采用同一加密算法进行加密。
所述加密算法可以为任意用于信息加密的对称式或非对称式加密算法。在加密过程中,可以直接利用特定算法对上述信息进行加密,也可以在加密过程中加入其他加密特征信息以增强保密性。
本领域技术人员应能理解,当以所述加密方式记录所述商品的商品信息、所述商品所对应的用户密码、以及所述商品所对应的所述芯片特征信息时,在验证时,相应地具有对应的解密方式,以将所记录的上述信息进行解密,从而与所述用户所对应的用户终端设备所获取的所述用户输入的所述用户密码以及所述电子标签的芯片特征信息进行验证。
在步骤S4中,当所述用户收到所述商品时,所述用户所对应的用户终端设备读取所述射频标签并获取所述射频标签的芯片特征信息,并基于对所述射频标签的读取,与所述用户进行交互以获取所述用户输入的所述用户密码。
具体地,当所述用户收到所述商品时,所述用户可采用对应的用户终端设备以对所述射频标签进行扫描;当扫描所述射频标签后,所述用户终端设备可根据该扫描信息请求所述用户输入所述用户密码。在此,所述请求可以是所述用户终端设备自行发送的输入请求;也可以是所述用户终端设备与所述网络设备相交互后,获取所述网络设备所发送的请求,并基于该请求在所述用户终端设备上请求该用户输入用户密码。
例如,所述用户终端设备可弹出输入框以要求所述用户输入用户密码。
同时,当所述用户终端设备对所述射频标签进行读取时,所述用户 终端设备能够获取所述射频标签的芯片特征信息。
在步骤S5中,所述用户终端设备通过加密或非加密的通信方式,将所述用户输入的所述用户密码以及所述射频标签的芯片特征信息发送至所述网络设备。
在步骤S6中,所述网络设备验证所述芯片特征信息以及所述用户密码。
具体地,所述网络设备与所述用户终端设备交互,获取所述用户终端设备所发送的所述用户输入的所述用户密码以及所述射频标签的芯片特征信息;然后,所述网络设备将从所述用户终端设备处获取的信息与该网络设备自身存储的信息进行匹配,也即,将所述用户终端设备所获取的用户密码与所述网络设备所存储的用户密码、将所述用户终端设备所读取的芯片特征信息与所述网络设备所存储的芯片特征信息分别进行匹配验证,并获得验证结果。在此,所述匹配验证的过程可以基于预定的匹配顺序进行,例如先匹配用户密码,再匹配芯片特征信息,或反之;或者,所述匹配验证的过程可以同时进行,即同时分别匹配用户密码与芯片特征信息。
在一个实施例中,上述一种或多种信息是通过加密存储的,则在读取时,所述网络设备基于预定的解密方式将其进行解密。
在此,所述匹配结果包括但不限于:
-所述芯片特征信息无法匹配:所述用户终端设备所读取的芯片特征信息并未记录在所述网络设备中;
-所述芯片特征信息匹配但所述用户密码无法匹配;
-所述芯片特征信息与所述用户密码均不匹配;
-所述芯片特征信息与所述用户密码均匹配。
在步骤S7中,根据所述用户密码以及所述芯片特征信息的验证结果,所述网络设备将与所述验证结果相关的信息发送给所述用户。例如通知用户验证通过或不通过。在一个实施例中,所述网络设备进一步将与所述验证结果相对应的所述商品的相关信息发送至所述用户终端设 备。
具体地,所述网络设备根据不同的验证结果,将所述商品的相关信息发送至所述用户终端设备,所述商品的相关信息包括但不限于所述商品的全部信息、部分信息、关联信息或者是该商品相关的空信息(如拒绝提供该商品的信息)。
例如,若所述芯片特征信息无法匹配,即所述用户终端设备所读取的芯片特征信息并未记录在所述网络设备中,则所述网络设备提供“非本系统卡片”或“无法通过验证”等信息;优选地,所述网络设备终止进一步的校验与反馈。
若所述芯片特征信息匹配但所述用户密码无法匹配或若所述芯片特征信息与所述用户密码均不匹配,则所述网络设备提供“无法通过验证”等信息;优选地,所述网络设备终止进一步的校验与反馈。
若所述芯片特征信息与所述用户密码均匹配,则所述网络设备提供“正品”或“通过防伪验证”等信息,并将该商品的商品信息推送给所述用户终端设备。优选地,若所述射频标签上覆盖粘贴有带有唯一序列号的易碎外标签,则所述网络设备还可以将存储于网络设备中的唯一序列号推送至所述用户终端设备。
在本发明的另一个实施例中,在步骤S4之前,所述网络设备还将所述商品所对应的待验证信息写入所述射频标签,其中,所述待验证信息包括所述用户密码。在一个实施例中,所述待验证信息还可进一步包括所述网络设备所获取的与所述商品所对应的射频标签的芯片特征信息,例如UID。
具体地,与步骤S4之前,所述网络设备直接或通过读写卡设备,将所述商品所对应的待验证信息写入所述射频标签的芯片。在此,所述网络设备或读写卡设备可先读取所述射频标签,以获取所述射频标签的芯片格式、通信协议、芯片UID等参数;然后,基于上述参数,将所需要写入的信息,如所述用户所设置的用户密码、所获取的芯片特征信息写入到所述射频标签中。在一个实施例中,所述待验证信息还可以包 括所述商品的商品信息等。
在一个实施例中,所述待验证信息还包括附加特征信息,即所述网络设备或所述读写卡设备还可以将其他附加特征信息写入到所述射频标签中。所述网络设备还可以将所述附加特征信息存储与所述网络设备中。所述附加特征信息包括但不限于特征代码、特征信息等。在此,优选地,所述附加特征信息可以基于任意一种算法进行写入。
在一个实施例中,所述读写卡设备可以是具有读写卡功能的移动设备,如利用手机,以通过手机上的APP实现读写;在另一个实施例中,所述读写卡设备可以是不具有读写卡功能的设备(如PC客户端)以及具有读写卡功能的外设(如PC读写卡器)的组合,不具有读写卡功能的设备以及具有读写卡功能的外设之间可通过例如ActiveX网页控件等形式进行连接,例如,从PC客户端上的特定网页,通过ActiveX网页控件,控制PC读写卡器进行读写。
在步骤S4中,当所述用户所对应的用户终端设备在读取所述射频标签时,除了获取所述射频标签的固件中的芯片特征信息以及基于对所述射频标签的读取,与所述用户进行交互以获取所述用户输入的所述用户密码,还对所述射频标签中所述网络设备所写入的待验证信息进行读取。
在一个实施例中,所述用户终端设备根据所述用户输入的用户密码和/或所获取的所述射频标签的固件中的芯片特征信息,将该用户密码和/或芯片特征信息与所述网络设备所写入的待验证信息中的相应信息相匹配,以在所述用户终端设备对所述用户密码和/或芯片特征信息进行用户端验证。所述匹配验证的过程可以基于预定的匹配顺序进行,例如先验证用户密码,然后验证芯片特征信息,或者反之;或者,所述匹配验证的过程可以同时进行;或者,所述匹配验证过程可以只匹配用户密码、芯片特征信息之一。例如,在一个实施例中,所述用户终端设备可以首先将获取的所述射频标签的固件中的芯片特征信息与从所述待验证信息中获取的芯片特征信息进行匹配。如果匹配成功,则与所述用户进行 交互以获取所述用户输入的所述用户密码以进行密码验证;如果匹配不成功,则直接向所述用户提供“非本系统卡片”之类的提示。在另一个实施例中,所述用户终端设备可以在获取所述射频标签的固件中的芯片特征信息以及从所述待验证信息中获取芯片特征信息之后或同时,与所述用户进行交互以获取所述用户输入的所述用户密码,可以先进行密码校验,如果密码校验通过再进行芯片特征信息校验,也可以两者同时进行。在一个实施例中,若所述用户密码和/或芯片特征信息任一项未通过验证,可以直接向所述用户提供“验证未通过”之类的提示,终止验证过程,无需再执行步骤S5至S7。即所述用户终端设备不再向所述网络设备发送后续信息,从而避免了大量无效信息的传递,避免网络设备的资源消耗。在一个实施例中,所述用户终端设备可选择性地向所述网络设备发送用户端验证失败的信息和用户端获取的信息。所述用户终端设备也可选择性地执行步骤S5。在一个实施例中,步骤S5也可以在用户端验证之前执行。在一个实施例中若所述待验证信息通过验证,则所述用户终端设备可以执行步骤S5,通过加密或非加密的通信方式,将所述用户输入的所述用户密码以及所获取的所述射频标签的固件中的芯片特征信息发送至所述网络设备。所述用户终端设备也可选择性地将所述待验证信息的验证结果发送至所述网络设备。在此,本领域技术人员应该理解,用户终端设备可以将关于用户端验证的各种信息选择性地发送至所述网络设备。在步骤S6中,所述网络设备对所述芯片特征信息以及所述用户密码执行验证。然后,在步骤S7中,所述网络设备将与所述验证结果相对应的所述商品的相关信息发送至所述用户终端设备。例如,若所述网络设备结果为“未通过验证”,则所述网络设备向所述用户终端设备提供“无法通过验证”的信息。若所述网络设备通过验证,则所述网络设备向所述用户终端设备提供“正品”或“通过防伪验证”等信息,并将该商品的商品信息推送给所述用户终端设备。
在本发明的一个实施例中,若在所述用户终端设备所述待验证信息通过验证,可以向所述用户提供“用户端验证通过”之类的提示。用户可 以无需等待网络设备的进一步验证。可以进一步向用户提供“等待网络设备进一步验证”之类的提示或者可以询问用户是否需要网络设备进一步验证。在一个实施例中,可能存在用户终端设备因各种原因离线的情况。在离线状态下,也可以进一步向用户提供“网络连接失败”、“等待网络设备进一步验证”之类的提示或者可以询问用户是否需要网络设备进一步验证。在该实施例中,用户终端设备可以在恢复在线的情况下执行步骤S5(若未执行过),可选地,用户终端设备还可以选择性地将用户终端设备的验证结果发送至网络设备,网络设备执行步骤网络端验证,不再赘述。
图5示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证的网络设备的结构示意图。所述网络设备50包括装置501、装置502、装置503、装置504、装置505、装置506。
其中,所述装置501被配置成执行步骤S1。所述装置502被配置成执行步骤S2。所述装置503被配置成执行步骤S3。所述装置504用于获取来自用户终端设备的所述射频标签的芯片特征信息以及所述用户在所述用户终端设备中所输入的用户密码。所述装置505被配置成执行步骤S6。所述装置506被配置成执行步骤S7。
在一个实施例中,所述装置501被配置成获取用户所设置的一个或多个用户密码。
在一个实施例中,所述装置501被配置成确定一个或多个用户密码,其中,所述一个或多个用户密码对应于所述用户所订购的一个或多个商品;其中,所述网络设备还包括用于将所述一个或多个用户密码发送至与所述商品相对应的用户的装置(未示出)。
在一个实施例中,所述装置502被配置成直接读取一个或多个射频标签的芯片特征信息。在另一个实施例中,所述装置502被配置成从芯片特征提供装置处获取射频标签的芯片特征信息,其中,所述芯片特征信息包括例如芯片UID,所述射频标签对应于所述商品。
在另一个实施例中,所述网络设备还包括被配置成从一个或多个芯 片特征提供装置处获取一个或多个射频标签的芯片特征信息的装置,其中,所述芯片特征信息包括例如芯片UID,每个射频标签对应于一个或多个商品;其中,所述装置502被配置成根据所述用户所订购的商品,从所获取的一个或多个射频标签的芯片特征信息中选择与所述商品相对应的芯片特征信息。
在一个实施例中,所述装置503被配置成在所述网络设备中加密记录所述商品所对应的用户密码、所述商品所对应的所述芯片特征信息以及所述商品的商品信息。
当所述用户收到所述商品时,所述装置504被配置成获取用户终端设备所读取的所述射频标签的芯片特征信息以及所述用户在所述用户终端设备中所输入的用户密码。
具体地,当所述用户收到所述商品时,所述用户可采用对应的用户终端设备以对所述射频标签进行扫描;当扫描所述射频标签后,所述用户终端设备可根据该扫描信息请求所述用户输入所述用户密码。在此,所述请求可以是所述用户终端设备自行发送的输入请求;也可以是所述用户终端设备与所述网络设备相交互后,获取所述网络设备所发送的请求,并基于该请求在所述用户终端设备上请求该用户输入用户密码。
所述用户终端设备通过加密或非加密的通信方式,将所述用户输入的所述用户密码以及所述射频标签的芯片特征信息发送至所述网络设备,相应地,所述装置504被配置成与所述用户终端设备通信以获取上述信息。
在一个实施例中,所述装置505被配置成将从所述用户终端设备处获取的信息与该网络设备中自身存储的信息进行匹配,也即,将所述用户终端设备所获取的用户密码与所述网络设备所存储的用户密码、将所述用户终端设备所读取的芯片特征信息与所述网络设备所存储的芯片特征信息分别进行匹配验证,并获得验证结果。在此,所述匹配验证的过程可以基于预定的匹配顺序进行,例如先匹配用户密码,再匹配芯片特征信息,或反之;或者,所述匹配验证的过程可以同时进行,即同时 分别匹配用户密码与芯片特征信息。
在一个实施例中,上述一种或多种信息是通过加密存储的,则在读取时,所述网络设备基于预定的解密方式将其进行解密。
在此,所述匹配结果包括但不限于:
-所述芯片特征信息无法匹配:所述用户终端设备所读取的芯片特征信息并未记录在所述网络设备中;
-所述芯片特征信息匹配但所述用户密码无法匹配;
-所述芯片特征信息与所述用户密码均不匹配;
-所述芯片特征信息与所述用户密码均匹配。
在一个实施例中,所述装置506被配置成根据不同的验证结果,将与所述验证结果相关的信息发送给所述用户。例如通知用户验证通过或不通过。在一个实施例中,所述装置506被进一步配置成将所述商品的相关信息发送至所述用户终端设备,所述商品的相关信息包括但不限于所述商品的全部信息、部分信息、关联信息或者是该商品相关的空信息(如拒绝提供该商品的信息)。
在一个实施例中,所述网络设备还包括被配置成将所述商品所对应的待验证信息写入所述射频标签的装置,其中,所述待验证信息包括所述用户所设置的用户密码。在一个实施例中,所述待验证信息还可进一步包括所述网络设备所获取的与所述商品所对应的射频标签的芯片特征信息,例如UID。
在一个实施例中,所述待验证信息还包括附加特征信息。所述网络设备还可以将所述附加特征信息存储与所述网络设备中。所述附加特征信息包括但不限于特征代码、特征信息等。在此,优选地,所述附加特征信息可以基于任意一种算法进行写入。
在一个实施例中,所述网络设备还可选地包括被配置成获取所述用户终端设备对所述待验证信息的验证结果的装置。在此,所述验证结果包括所述待验证信息通过验证或所述待验证信息未通过验证。
在一个实施例中,在所述用户终端设备对所述待验证信息的验证结 果为验证未通过的情况下,所述用户终端设备不再向所述网络设备发送后续信息,从而避免了大量无效信息的传递,避免网络设备的资源消耗。在所述用户终端设备对所述待验证信息的验证结果为验证通过的情况下,所述用户终端设备向所述网络设备发送所述用户输入的用户密码以及所获取的所述射频标签的固件中的芯片特征信息,所述装置506被配置成对从所述用户终端设备接收的所述用户输入的用户密码和所述芯片特征信息执行验证。所述装置507被配置成将与所述验证结果相对应的所述商品的相关信息发送至所述用户终端设备。例如,若所述网络设备结果为“未通过验证”,则向所述用户终端设备提供“无法通过验证”的信息。若通过验证,则向所述用户终端设备提供“正品”或“通过防伪验证”等信息,并将该商品的商品信息推送给所述用户终端设备。
图6示出根据本申请一个实施例的一种基于射频标签的用户交互式物联验证的用户终端设备的结构示意图。其中,所述用户终端设备60包括装置601、装置602以及装置603。
具体地,所述装置601被配置成获取所述射频标签的固件中的芯片特征信息,并与所述用户进行交互以获取所述用户输入的用户密码,其中,所述用户密码为所述用户在订购商品时所设置或由网络设备为所述用户所订购的商品所设置并由所述网络设备发送至所述用户,所述芯片特征信息包括例如芯片UID,所述射频标签被附着于所述商品上。在本发明的一个实施例中,所述装置601可被配置成读取所述射频标签。在本发明的另一个实施例中,所述装置601可被配置成从与所述用户终端设备分开的读取装置获得所述射频标签的芯片特征信息,其中所述用户可以通过读取装置获得所述芯片特征信息并将其输入所述装置601;或者所述用户终端设备可通过本领域熟知的各种方式从所述读取装置获得所述芯片特征信息,例如所述读取装置可在读取所述射频标签之后生成所述芯片特征信息的二维码或条形码,所述用户终端设备通过扫描二维码或条形码进行识别来获得所述芯片特征信息。在此实例中,所述用户终端设备或所述装置601可被配置成包括扫描并识别二维码或条形码 的装置。
所述装置602可被配置成将所述用户输入的所述用户密码以及所获取的所述射频标签的芯片特征信息发送至所述网络设备。
所述装置603可被配置成获取所述网络设备所发送的、与所述用户密码以及所述芯片特征信息的验证结果相对应的所述商品的相关信息。在一个实施例中,若所述芯片特征信息无法匹配,则所述装置603获取到的为“非本系统卡片”或“无法通过验证”等信息;若所述芯片特征信息匹配但所述用户密码无法匹配或若所述芯片特征信息与所述用户密码均不匹配,则所述装置603获取到的为“无法通过验证”等信息;若所述芯片特征信息与所述用户密码均匹配,则所述装置603获取到的为“正品”或“通过防伪验证”等信息,优选地,还可以获取所述商品的商品信息。优选地,若所述射频标签上覆盖粘贴有带有唯一序列号的易碎外标签,则所述装置603还可以获取所述网络设备所发送的网络设备中的唯一序列号。
在一个实施例中,在获得所述射频标签的芯片特征信息之后,所述装置601请求所述用户输入用户密码。在此,所述请求可以是所述用户终端设备自行发送的输入请求;也可以是所述用户终端设备与所述网络设备相交互后,获取所述网络设备所发送的请求,并基于该请求在所述用户终端设备上请求该用户输入用户密码。
例如,所述用户终端设备可弹出输入框以要求所述用户输入用户密码。在该实施例中,所述用户终端设备可包括被配置成显示该输入框的装置。或者在另一实施例中,所述装置601可被进一步配置成显示该输入框。
在一个实施例中,所述装置601还被配置成进一步获取所述网络设备在所述射频标签中所写入的待验证信息,所述待验证信息包括所述用户密码。在一个实施例中,所述待验证信息还可进一步包括所述网络设备所获取的与所述商品所对应的射频标签的芯片特征信息,例如UID。
在一个实施例中,所述用户终端设备还包括用户端验证装置(未示 出),所述用户端验证装置被配置成根据所述用户输入的用户密码和/或所获取的所述射频标签的固件中的芯片特征信息,将该用户密码和/或芯片特征信息与所述网络设备所写入的待验证信息中的相应信息相匹配,以对所述用户密码和/或芯片特征信息进行用户端验证。所述匹配验证的过程可以基于预定的匹配顺序进行,例如先验证用户密码,然后验证芯片特征信息,或者反之;或者,所述匹配验证的过程可以同时进行;或者,所述匹配验证过程可以只匹配用户密码、芯片特征信息之一。例如,在一个实施例中,可以首先将获取的所述射频标签的固件中的芯片特征信息与从所述待验证信息中获取的芯片特征信息进行匹配。如果匹配成功,则进行密码验证;如果匹配不成功,则直接向所述用户提供“非本系统卡片”之类的提示。在另一个实施例中,可以在获取所述射频标签的固件中的芯片特征信息以及从所述待验证信息中获取芯片特征信息之后或同时,获取所述用户输入的所述用户密码,可以先进行密码校验,如果密码校验通过再进行芯片特征信息校验,也可以两者同时进行。在一个实施例中,若所述用户密码和/或芯片特征信息任一项未通过验证,可以直接向所述用户提供“验证未通过”之类的提示,终止验证过程。即所述用户终端设备不再向所述网络设备发送后续信息,从而避免了大量无效信息的传递,避免网络设备的资源消耗。在一个实施例中,所述用户终端设备可包括用于向所述网络设备发送所述待验证信息的验证结果的装置。在一个实施例中,所述装置602可被配置成选择性地向所述网络设备发送所述待验证信息的验证结果。在一个实施例中,可选择性地向所述网络设备发送用户端验证失败的信息。
在本发明的一个实施例中,可能存在用户终端设备因各种原因离线的情况。若在用户端所述待验证信息通过验证,可以向所述用户提供“用户端验证通过”之类的提示。进一步,在离线状态下,可以进一步向用户提供“等待网络设备验证”之类的提示。在该实施例中,用户终端设备可以在恢复在线的情况下将用户端的验证结果发送至网络设备,由网络设备执行进一步验证,不再赘述。
在本发明的一个实施例中,所述用户终端设备还可进一步包括被配置成显示用户端验证结果和/或从网络设备接收到的网络端验证结果的装置。在本发明的一个实施例中,所述装置605可被进一步配置成显示用户端验证结果和/或从网络设备接收到的网络端验证结果。
图2(b)示出根据本申请一个实施例的一种射频标签防伪系统。
所述射频标签防伪系统中包含服务设备61、读取设备62、射频标签以及易碎外标签。所述易碎外标签上带有唯一序列号,且所述易碎外标签被覆盖粘贴于所述射频标签上,以形成具有易碎外标签的射频标签63。该具有易碎外标签的射频标签63粘贴于商品64上。所述读取设备62用于读取所述商品64上的射频标签63;所述服务设备61用于存储与所述射频标签63所对应的所述唯一序列号,并在所述读取设备62读取所述射频标签63时,将与所述射频标签63相对应的唯一序列号发送至所述读取设备62。
在此,所述读取装置可以为任意能够读取射频标签的电子设备,如专业读取射频标签的读卡器、包含读取射频标签功能的手机等。
所述服务设备61包括但不限于单个服务器或多个服务器构成的服务器组。当所述服务设备为多个服务器构成的服务器组时,所述多个服务器可以对应于不同的服务商。例如,发送所述唯一序列号至所述读取设备的服务设备,不等同于对所述芯片唯一标识码以及一个或多个唯一性认证信息进行校验的服务设备。
当所述读取设备62读取所述射频标签时,所述读取设备62可与所述服务设备61通信以请求所述服务设备61将与所述射频标签相对应的唯一序列号发送至所述读取设备62。所述读取设备62根据所获取的唯一序列号,与所述易碎外标签上的唯一序列号进行比对,若一致,则确定所述该射频标签未被替换。
在本发明的一个实施例中,所述读取设备62可以是如上所述的具有读取射频标签功能的用户终端设备或与所述用户终端设备分开的读取设备,所述服务设备61可以是如上所述的网络设备或与所述网络设 备分开的服务设备。
在本发明的一个实施例中,除了上述用户端验证和网络设备端验证之外,通过具有上述易碎外标签的射频标签,用户端也可以进一步或额外地验证射频标签本身是否被替换过。例如,所述网络设备可包括被配置成获取所述商品的射频标签上所覆盖的易碎外标签的唯一序列号的装置(例如装置502或其他装置),被配置成记录所述唯一序列号的装置(例如装置503或其他装置),被配置成将所述唯一序列号作为待验证信息的一部分写入所述射频标签的装置。或者所述网络设备可基于短信、邮件、信息推送渠道等中的至少任一种,将所述唯一序列号发送至用户。所述用户终端设备可包括被配置成获取所述商品的射频标签上所覆盖的易碎外标签上的唯一序列号的装置(例如装置601或其他装置,例如可与用户输入密码的方式类似地由用户基于收到的商品手动输入),被配置成从待验证信息中获取由网络设备写入的唯一序列号的装置(例如装置601或其他装置)或者接收网络设备的推送获得所述唯一序列号的装置,被配置成对唯一序列号进行验证的装置。在一个实施例中,除了上述用户端验证中对用户密码和/或芯片特征信息进行验证之外,还可加入对唯一序列号的验证。如上所述,本领域的技术人员应该明白用户端验证可以对上述三种信息的验证采用任意顺序或组合,这里不再赘述。
尽管上述实施例采用射频标签外部覆盖易碎外标签的形式,但是在本发明的另一个实施例中,所述易碎外标签可以容易地应用于任何物品,从而通过对唯一序列号的验证来验证物品未被替换过。本领域的技术人员可以容易地构想易碎外标签的其他应用方式。
图7示出了可被用于实施本申请中所述的各个实施例的示例性系统。
在一些实施例中,系统700能够作为图1、图2(a)、图2(b)、图3、图4(a)、图4(b)、图5、图6所示的实施例或其他所述实施 例中的任意一个计算设备。在一些实施例中,系统700可包括具有指令的一个或多个计算机可读介质(例如,系统存储器或NVM/存储设备720)以及与该一个或多个计算机可读介质耦合并被配置为执行指令以实现模块从而执行本申请中所述的动作的一个或多个处理器(例如,(一个或多个)处理器705)。
对于一个实施例,系统控制模块710可包括任意适当的接口控制器,以向(一个或多个)处理器705中的至少一个和/或与系统控制模块710通信的任意适当的设备或组件提供任意适当的接口。
系统控制模块710可包括存储器控制器模块730,以向系统存储器715提供接口。存储器控制器模块730可以是硬件模块、软件模块和/或固件模块。
系统存储器715可被用于例如为系统700加载和存储数据和/或指令。对于一个实施例,系统存储器715可包括任意适当的易失性存储器,例如,适当的DRAM。在一些实施例中,系统存储器715可包括双倍数据速率类型四同步动态随机存取存储器(DDR4SDRAM)。
对于一个实施例,系统控制模块710可包括一个或多个输入/输出(I/O)控制器,以向NVM/存储设备720及(一个或多个)通信接口725提供接口。
例如,NVM/存储设备720可被用于存储数据和/或指令。NVM/存储设备720可包括任意适当的非易失性存储器(例如,闪存)和/或可包括任意适当的(一个或多个)非易失性存储设备(例如,一个或多个硬盘驱动器(HDD)、一个或多个光盘(CD)驱动器和/或一个或多个数字通用光盘(DVD)驱动器)。
NVM/存储设备720可包括在物理上作为系统700被安装在其上的设备的一部分的存储资源,或者其可被该设备访问而不必作为该设备的一部分。例如,NVM/存储设备720可通过网络经由(一个或多个)通信接口725进行访问。
(一个或多个)通信接口725可为系统700提供接口以通过一个或多个网络和/或与任意其他适当的设备通信。系统700可根据一个或多个无线网络标准和/或协议中的任意标准和/或协议来与无线网络的一个或多个组件进行无线通信。
对于一个实施例,(一个或多个)处理器705中的至少一个可与系统控制模块710的一个或多个控制器(例如,存储器控制器模块730)的逻辑封装在一起。对于一个实施例,(一个或多个)处理器705中的至少一个可与系统控制模块710的一个或多个控制器的逻辑封装在一起以形成系统级封装(SiP)。对于一个实施例,(一个或多个)处理器705中的至少一个可与系统控制模块710的一个或多个控制器的逻辑集成在同一模具上。对于一个实施例,(一个或多个)处理器705中的至少一个可与系统控制模块710的一个或多个控制器的逻辑集成在同一模具上以形成片上系统(SoC)。
在各个实施例中,系统700可以但不限于是:服务器、工作站、台式计算设备或移动计算设备(例如,膝上型计算设备、手持计算设备、平板电脑、上网本等)。在各个实施例中,系统700可具有更多或更少的组件和/或不同的架构。例如,在一些实施例中,系统700包括一个或多个摄像机、键盘、液晶显示器(LCD)屏幕(包括触屏显示器)、非易失性存储器端口、多个天线、图形芯片、专用集成电路(ASIC)和扬声器。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包 括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM); 以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。“多个”的含义是两个或者更多,除非另有明确具体的限定。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (53)

  1. 一种在网络设备处执行的方法,包括以下步骤:
    至少记录与一个或多个商品所对应的第一用户密码、以及与所述一个或多个商品所对应的一个或多个射频标签的第一芯片特征信息,其中,所述一个或多个射频标签被附着于对应的一个或多个商品上;
    将所述一个或多个商品所对应的待验证信息写入与所述一个或多个商品所对应的一个或多个射频标签中,所述待验证信息至少包括所述第一用户密码和所述第一芯片特征信息;
    在用户收到所述一个或多个商品后,从所述用户接收所述用户读取的所述一个或多个射频标签的第二芯片特征信息、所述用户输入的与所述一个或多个商品所对应的第二用户密码、以及对所述待验证信息的用户端验证的结果,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;
    在收到所述用户端验证的结果为通过验证的情况下,执行网络设备端验证以验证从所述用户接收的所述第二芯片特征信息以及所述第二用户密码,其中所述网络设备端验证包括将从所述用户接收的所述第二芯片特征信息与所记录的第一芯片特征信息进行比较和/或将所述第二用户密码与所记录的第一用户密码进行比较;以及
    将所述网络设备端验证的结果发送至所述用户。
  2. 根据权利要求1的方法,其中,所述记录进一步包括记录所述一个或多个商品的商品信息。
  3. 根据权利要求2的方法,其中,所述方法进一步包括将与所述网络设备端验证的结果相对应的所述一个或多个商品的相关信息发送至所述用户。
  4. 根据权利要求1所述的方法,其中,所述方法进一步包括:在记录步骤之前,
    获取所述第一用户密码;以及
    获取所述一个或多个射频标签的第一芯片特征信息,其中,所述第一芯片特征信息和所述第二芯片特征信息至少包括芯片UID。
  5. 根据权利要求4所述的方法,其中,所述第一用户密码是用户设置的或是由所述网络设备为所述用户确定并提供给所述用户的。
  6. 根据权利要求4所述的方法,其中,获取一个或多个射频标签的第一芯片特征信息包括:
    通过读取装置读取或从芯片特征提供装置处获取一个或多个射频标签的第一芯片特征信息。
  7. 根据权利要求1至6中任一项所述的方法,其中,所述记录、所述接收和/或所述发送采用加密方式。
  8. 根据权利要求1至6中任一项所述的方法,其中,所述一个或多个射频标签基于内置或粘贴的方式被附着于所述一个或多个商品上。
  9. 根据权利要求8所述的方法,其中,所述射频标签上覆盖粘贴有易碎外标签,所述易碎外标签上具有唯一序列号。
  10. 根据权利要求9所述的方法,其中,所述待验证信息进一步包括所述唯一序列号,或者所述网络设备将所述唯一序列号通过通信手段推送给所述用户。
  11. 根据权利要求10所述的方法,所述用户端验证进一步包括对所述唯一序列号的用户端验证。
  12. 一种在用户终端设备处执行的方法,包括以下步骤:
    在用户收到一个或多个商品之后,从所述一个或多个商品所对应的一个或多个射频标签获取所述一个或多个商品所对应的待验证信息,其中所述待验证信息是由网络设备写入的,所述待验证信息至少包括与所述一个或多个商品所对应的第一用户密码和所述一个或多个射频标签的第一芯片特征信息;
    获取所述一个或多个射频标签的第二芯片特征信息;
    与所述用户进行交互以获取所述用户输入的与所述一个或多个商品所对应的第二用户密码;
    对所述待验证信息进行用户端验证,包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;
    在所述用户端验证的结果为通过验证的情况下:
    如果所述用户终端设备离线,则通知所述用户用户端验证通过,以及
    如果所述用户终端设备在线,则执行以下至少之一:通知所述用户用户端验证通过,和/或至少将所述第二用户密码和所述第二芯片特征信息发送至所述网络设备以进行网络设备端验证并从所述网络设备接收所述网络设备端验证的结果。
  13. 根据权利要求12所述的方法,其中,所述第一芯片特征信息和所述第二芯片特征信息至少包括芯片UID。
  14. 根据权利要求13所述的方法,其中,所述第一用户密码是在所述用户收到所述一个或多个商品之前由所述用户设置的或由所述网络 设备为所述用户确定并提供给所述用户的。
  15. 根据权利要求13所述的方法,其中,获取所述一个或多个射频标签的第一芯片特征信息和/或获取所述一个或多个商品所对应的待验证信息包括:通过读取装置读取所述第一芯片特征信息和/或所述待验证信息,所述读取装置与所述用户终端设备分开或集成。
  16. 根据权利要求13所述的方法,其中,在所述用户端验证的结果为未通过验证的情况下,直接通知用户验证不通过。
  17. 根据权利要求16所述的方法,其中,在所述第一用户密码与所述第二用户密码不匹配或所述第一芯片特征信息与所述第二芯片特征不匹配时,所述用户端验证的结果为未通过验证。
  18. 根据权利要求12所述的方法,其中,所述方法进一步包括将所述用户端验证的结果发送至所述网络设备。
  19. 根据权利要求12至18中任一项所述的方法,其中,所述用户端设备和所述网络设备之间的通信采用加密方式。
  20. 根据权利要求12至18中任一项所述的方法,其中,所述一个或多个射频标签基于内置或粘贴的方式被附着于所述一个或多个商品上。
  21. 根据权利要求20所述的方法,其中,所述射频标签上覆盖粘贴有易碎外标签,所述易碎外标签上具有唯一序列号。
  22. 根据权利要求21所述的方法,其中,所述待验证信息进一步包 括所述唯一序列号,或者所述用户终端设备通过通信手段从所述网络设备获得所述唯一序列号。
  23. 根据权利要求22所述的方法,所述用户端验证进一步包括对所述唯一序列号的用户端验证。
  24. 一种用户交互式物联验证的方法,其中,所述方法包括如权利要求1至11中任一项所述的方法,以及如权利要求12至23中任一项所述的方法。
  25. 一种网络设备,包括:
    被配置成至少记录与一个或多个商品所对应的第一用户密码、以及与所述一个或多个商品所对应的一个或多个射频标签的第一芯片特征信息的装置,其中,所述一个或多个射频标签被附着于对应的一个或多个商品上;
    被配置成将所述一个或多个商品所对应的待验证信息写入与所述一个或多个商品所对应的一个或多个射频标签中的装置,所述待验证信息至少包括所述第一用户密码和所述第一芯片特征信息;
    被配置成在用户收到所述一个或多个商品后,从所述用户接收所述用户读取的所述一个或多个射频标签的第二芯片特征信息、所述用户输入的与所述一个或多个商品所对应的第二用户密码、以及对所述待验证信息的用户端验证的结果的装置,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;
    被配置成在收到所述用户端验证的结果为通过验证的情况下,执行网络设备端验证以验证从所述用户接收的所述第二芯片特征信息以及所述第二用户密码的装置,其中所述网络设备端验证包括将从所述用户接收的所述第二芯片特征信息与所记录的第一芯片特征信息进行比较 和/或将所述第二用户密码与所记录的第一用户密码进行比较;以及
    被配置成将所述网络设备端验证的结果发送至所述用户的装置。
  26. 根据权利要求25的网络设备,其中,被配置成记录的装置进一步被配置成记录所述一个或多个商品的商品信息。
  27. 根据权利要求26的网络设备,其中,进一步包括被配置成将与所述网络设备端验证的结果相对应的所述一个或多个商品的相关信息发送至所述用户的装置。
  28. 根据权利要求25所述的网络设备,其中,进一步包括:
    被配置成获取所述第一用户密码的装置;以及
    被配置成获取所述一个或多个射频标签的第一芯片特征信息的装置,其中,所述第一芯片特征信息和所述第二芯片特征信息至少包括芯片UID。
  29. 根据权利要求28所述的网络设备,其中,所述第一用户密码是用户设置的或是由所述网络设备为所述用户确定并提供给所述用户的。
  30. 根据权利要求28所述的网络设备,其中,被配置成获取一个或多个射频标签的第一芯片特征信息的装置包括:
    被配置成通过读取装置读取或从芯片特征提供装置处获取一个或多个射频标签的第一芯片特征信息的装置。
  31. 根据权利要求25至30中任一项所述的网络设备,其中,所述记录、所述接收和/或所述发送采用加密方式。
  32. 根据权利要求25至30中任一项所述的网络设备,其中,所述 一个或多个射频标签基于内置或粘贴的方式被附着于所述一个或多个商品上。
  33. 根据权利要求32所述的网络设备,其中,所述射频标签上覆盖粘贴有易碎外标签,所述易碎外标签上具有唯一序列号。
  34. 根据权利要求33所述的网络设备,其中,所述待验证信息进一步包括所述唯一序列号,或者所述网络设备将所述唯一序列号通过通信手段推送给所述用户。
  35. 根据权利要求34所述的网络设备,所述用户端验证进一步包括对所述唯一序列号的用户端验证。
  36. 一种用户终端设备,包括:
    被配置成在用户收到一个或多个商品之后,从所述一个或多个商品所对应的一个或多个射频标签获取所述一个或多个商品所对应的待验证信息的装置,其中所述待验证信息是由网络设备写入的,所述待验证信息至少包括与所述一个或多个商品所对应的第一用户密码和所述一个或多个射频标签的第一芯片特征信息;
    被配置成获取所述一个或多个射频标签的第二芯片特征信息的装置;
    被配置成与所述用户进行交互以获取所述用户输入的与所述一个或多个商品所对应的第二用户密码的装置;
    被配置成对所述待验证信息进行用户端验证的装置,所述用户端验证包括将所述第一用户密码与所述第二用户密码进行比较和/或将所述第一芯片特征信息与所述第二芯片特征信息进行比较;
    在所述用户端验证的结果为通过验证的情况下:
    被配置成如果所述用户终端设备离线,则通知所述用户用户端验 证通过的装置,以及
    被配置成如果所述用户终端设备在线,则执行以下至少之一的装置:通知所述用户用户端验证通过,和/或至少将所述第二用户密码和所述第二芯片特征信息发送至所述网络设备以进行网络设备端验证并从所述网络设备接收所述网络设备端验证的结果。
  37. 根据权利要求36所述的用户终端设备,其中,所述第一芯片特征信息和所述第二芯片特征信息至少包括芯片UID。
  38. 根据权利要求37所述的用户终端设备,其中,所述第一用户密码是在所述用户收到所述一个或多个商品之前由所述用户设置的或由所述网络设备为所述用户确定并提供给所述用户的。
  39. 根据权利要求37所述的用户终端设备,其中,被配置成获取所述一个或多个射频标签的第一芯片特征信息的装置和/或被配置成获取所述一个或多个商品所对应的待验证信息的装置包括:被配置成通过读取装置读取所述第一芯片特征信息和/或所述待验证信息的装置,所述读取装置与所述用户终端设备分开或集成。
  40. 根据权利要求37所述的用户终端设备,进一步包括被配置成在所述用户端验证的结果为未通过验证的情况下,直接通知用户验证不通过的装置。
  41. 根据权利要求40所述的用户终端设备,其中,在所述第一用户密码与所述第二用户密码不匹配或所述第一芯片特征信息与所述第二芯片特征不匹配时,所述用户端验证的结果为未通过验证。
  42. 根据权利要求36所述的用户终端设备,进一步包括被配置成将 所述用户端验证的结果发送至所述网络设备的装置。
  43. 根据权利要求36至42中任一项所述的用户终端设备,其中,所述用户端设备和所述网络设备之间的通信采用加密方式。
  44. 根据权利要求36至42中任一项所述的用户终端设备,其中,所述一个或多个射频标签基于内置或粘贴的方式被附着于所述一个或多个商品上。
  45. 根据权利要求44所述的用户终端设备,其中,所述射频标签上覆盖粘贴有易碎外标签,所述易碎外标签上具有唯一序列号。
  46. 根据权利要求45所述的用户终端设备,其中,所述待验证信息进一步包括所述唯一序列号,或者所述用户终端设备通过通信手段从所述网络设备获得所述唯一序列号。
  47. 根据权利要求46所述的用户终端设备,所述用户端验证进一步包括对所述唯一序列号的用户端验证。
  48. 一种用户交互式物联验证的系统,其中,所述系统包括如权利要求25至35中任一项所述的网络设备,以及如权利要求36至47中任一项所述的用户终端设备。
  49. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可读指令,当所述计算机可读指令被一个或多个设备执行时,使得所述设备执行如权利要求1至24中任一项所述的方法。
  50. 一种用户交互式物联验证的系统,其特征在于,所述系统包括 存储器和处理器,所述存储器中存储有计算机可读指令,当所述计算机可读指令被所述处理器执行时,所述处理器执行如权利要求1至24中任一项所述的方法。
  51. 一种用户交互式物联验证的系统,其特征在于,所述系统包括如权利要求25至35中任一项所述的网络设备,以及如权利要求30所述的计算机可读存储介质。
  52. 一种标签防伪系统,所述标签防伪系统包括服务设备、读取设备、以及易碎外标签,
    所述易碎外标签被配置成覆盖粘贴于物体表面上,且所述易碎外标签上带有唯一序列号,
    所述服务设备被配置成将所述唯一序列号与所述物体相关联,并存储在所述服务设备中,以及
    所述读取设备被配置成在获得所述物品时与所述服务设备通信以获得与所述物品相关联的所述唯一序列号,从而通过验证所述易碎外标签上的唯一序列号与从所述服务设备获得的与所述物品相关联的唯一序列号来确定物品的真实性。
  53. 如权利要求52所述的标签防伪系统,其中,所述物品为射频标签。
PCT/CN2020/086330 2019-07-09 2020-04-23 基于射频标签的用户交互式物联验证的方法、装置与系统 WO2021004125A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2020203171A AU2020203171A1 (en) 2019-07-09 2020-04-23 Method, apparatus and system for user interactive IoT verification based on radio frequency tag

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201921060079.1 2019-07-09
CN201921060079.1U CN210324263U (zh) 2019-07-09 2019-07-09 一种射频标签防伪系统
CN201910612556.9A CN110135542B (zh) 2019-07-09 2019-07-09 基于射频标签的用户交互式物联验证的方法、装置与系统
CN201910612556.9 2019-07-09

Publications (1)

Publication Number Publication Date
WO2021004125A1 true WO2021004125A1 (zh) 2021-01-14

Family

ID=74113811

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/086330 WO2021004125A1 (zh) 2019-07-09 2020-04-23 基于射频标签的用户交互式物联验证的方法、装置与系统

Country Status (1)

Country Link
WO (1) WO2021004125A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113239342A (zh) * 2021-05-27 2021-08-10 广州众诺电子技术有限公司 一种芯片、验证装置、芯片验证方法和芯片验证系统
CN114444525A (zh) * 2022-01-11 2022-05-06 芯电智联(北京)科技有限公司 一种预防nfc标签丢失的方法及系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894289A (zh) * 2010-06-23 2010-11-24 厦门信达汇聪科技有限公司 一种防伪射频标签及利用该防伪射频标签实现的防伪方法
CN204229440U (zh) * 2014-10-27 2015-03-25 深圳市远望谷信息技术股份有限公司 一种防伪防转移rfid电子标签
CN105849739A (zh) * 2013-09-17 2016-08-10 香港物流及供应链管理应用技术研发中心 验证系统和验证方法
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
CN109426970A (zh) * 2017-08-31 2019-03-05 田保林 一种物品追踪防伪方法、服务平台、用户终端及系统
CN110135542A (zh) * 2019-07-09 2019-08-16 上海吾十吾信息技术有限公司 基于射频标签的用户交互式物联验证的方法、装置与系统
CN210324263U (zh) * 2019-07-09 2020-04-14 上海吾十吾信息技术有限公司 一种射频标签防伪系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894289A (zh) * 2010-06-23 2010-11-24 厦门信达汇聪科技有限公司 一种防伪射频标签及利用该防伪射频标签实现的防伪方法
CN105849739A (zh) * 2013-09-17 2016-08-10 香港物流及供应链管理应用技术研发中心 验证系统和验证方法
CN204229440U (zh) * 2014-10-27 2015-03-25 深圳市远望谷信息技术股份有限公司 一种防伪防转移rfid电子标签
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
CN109426970A (zh) * 2017-08-31 2019-03-05 田保林 一种物品追踪防伪方法、服务平台、用户终端及系统
CN110135542A (zh) * 2019-07-09 2019-08-16 上海吾十吾信息技术有限公司 基于射频标签的用户交互式物联验证的方法、装置与系统
CN210324263U (zh) * 2019-07-09 2020-04-14 上海吾十吾信息技术有限公司 一种射频标签防伪系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113239342A (zh) * 2021-05-27 2021-08-10 广州众诺电子技术有限公司 一种芯片、验证装置、芯片验证方法和芯片验证系统
CN114444525A (zh) * 2022-01-11 2022-05-06 芯电智联(北京)科技有限公司 一种预防nfc标签丢失的方法及系统

Similar Documents

Publication Publication Date Title
CA3121679A1 (en) Tap to copy data to clipboard via nfc
US11676152B2 (en) Application-based point of sale system in mobile operating systems
WO2021004125A1 (zh) 基于射频标签的用户交互式物联验证的方法、装置与系统
US11671454B2 (en) Enabling communications between applications in a mobile operating system
CN114424192A (zh) 基于非接触式卡定位的数字服务持续认证
JP2023548369A (ja) 非接触カードのウェブベースの有効化
JP2023508051A (ja) 制限された仮想番号を使用したカード発行
KR20230002337A (ko) 비접촉식 카드 활성화를 위한 특정 약관의 결정
JP2022551544A (ja) サードパーティのデジタルウォレットプロビジョニングのための認証
CN110135542B (zh) 基于射频标签的用户交互式物联验证的方法、装置与系统
JP2024037975A (ja) 非接触カードを使用した許可の委任された管理
CN115552440A (zh) 增强现实卡激活体验
AU2020100757A4 (en) Method, apparatus and system for user interactive IoT verification based on radio frequency tag
KR20240023613A (ko) 비접촉식 카드의 확장 가능한 암호화 인증을 위한 시스템 및 방법
JP2024502434A (ja) 非接触カードを使用したワンタイムパスコードの安全な生成
AU2020203171A1 (en) Method, apparatus and system for user interactive IoT verification based on radio frequency tag
US20240054493A1 (en) Methods and arrangements for proof of purchase
US20230419295A1 (en) Mobile web browser authentication and checkout using a contactless card
US20240062216A1 (en) Systems and methods for dynamic data generation and cryptographic card authentication
US20230325810A1 (en) Techniques to perform tap to pay operations in the ios and android operating system environments
US20230162187A1 (en) Autofilling data based on account authentication using a contactless card

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2020203171

Country of ref document: AU

Date of ref document: 20200423

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20836362

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20836362

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20836362

Country of ref document: EP

Kind code of ref document: A1