Nothing Special   »   [go: up one dir, main page]

CN110533128A - A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption - Google Patents

A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption Download PDF

Info

Publication number
CN110533128A
CN110533128A CN201910771685.2A CN201910771685A CN110533128A CN 110533128 A CN110533128 A CN 110533128A CN 201910771685 A CN201910771685 A CN 201910771685A CN 110533128 A CN110533128 A CN 110533128A
Authority
CN
China
Prior art keywords
data
nfc label
mobile terminal
encryption
tracing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910771685.2A
Other languages
Chinese (zh)
Other versions
CN110533128B (en
Inventor
杨友永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Weichain Information Technology Co Ltd
Original Assignee
Shanghai Weichain Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Weichain Information Technology Co Ltd filed Critical Shanghai Weichain Information Technology Co Ltd
Priority to CN201910771685.2A priority Critical patent/CN110533128B/en
Publication of CN110533128A publication Critical patent/CN110533128A/en
Application granted granted Critical
Publication of CN110533128B publication Critical patent/CN110533128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Computational Linguistics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption, which comprises the mark UID for obtaining NFC label obtains password corresponding with the UID from server;Based on the password encryption initial data, the NFC label is written into encrypted data, verification information is set;Mobile terminal reads the data information of the NFC label, and access server obtains the corresponding password of the UID, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.According to the solution of the present invention, encryption data and NFC label are bound, guarantees the safety of NFC label data storage;The reading and displaying of encryption data are no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can read NFC label data, and are able to verify that the data read.

Description

A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
Technical field
The present invention relates to processing data information field more particularly to it is a kind of be common to all kinds of reading equipment based on encryption Anti-fake data processing method of tracing to the source, device, system and medium, more particularly to support the encryption based on NFC label of iPhone Anti-fake data processing method of tracing to the source, device, system and medium.
Background technique
Currently, anti-fake traceability system has been applied on the various product of multi industries, anti-fake traceability system is believed using label Store commodity information is ceased, the process of producing is refine to each critical control point, consumer is scanned label, can obtain commodity Produce date, the place of origin, merchandise news etc..Have all multimodes and realizes that anti-fake traceability system, such as two-dimension code anti-counterfeit, RFID are prevented It is pseudo-, NFC is anti-fake etc..Wherein, NFC is anti-fake can read NFC label progress fake certification by mobile phone.
The key link of anti-fake traceability system is the data safety in the acquisition and transmission sources data procedures of source data. The existing anti-fake traceability system using NFC label, the source data of transmission is the clear data of unencryption protection mostly, this The anti-fake data of tracing to the source of mode are easily faked;The implementation of encipherment protection is taken the source data of transmission, and is needed anti-fake When tracing to the source, the encryption data stored in NFC label is read using special equipment by user, general mobile terminal cannot be used The encryption data stored in NFC label is read out, iPhone is not supported especially to read the encryption number stored in NFC label According to.The Information Security of the anti-fake traceability system of NFC label cannot be taken into account in the prior art and reads the versatility of equipment.
Summary of the invention
In order to solve the above technical problems, the anti-fake data processing method of tracing to the source that the invention proposes a kind of based on encryption, dress It sets, system and medium, the method, device, system and medium cannot take into account the anti-of NFC label to solve in the prior art The Information Security of pseudo- traceability system and the technical issues of read the versatility of equipment.
According to the first aspect of the invention, a kind of anti-fake data processing method of tracing to the source based on encryption is provided, comprising:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data Verification information;
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.
Further, described to be based on the password encryption initial data, the NFC label is written into encrypted data, Verification information, which is arranged, includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set.
Further, the verifying mobile terminal, if verification result is to pass through, described in the mobile terminal reading Encryption data in NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps S1032;It is no to then follow the steps S1033;
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes Step S1034;It is no to then follow the steps S1035;
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to described test by the server The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal Pass through;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition The corresponding initial data of NFC label reads the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
According to a second aspect of the present invention, a kind of anti-fake data processing equipment of tracing to the source based on encryption is provided, comprising:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked Verification information is arranged in label;
Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label Encryption data.
Further, the Data write. module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
Further, the data read module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether Greater than the auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for by the server by the auto-counter count value in the database The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole End is verified for the second time;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
According to a third aspect of the present invention, a kind of anti-fake data processing system of tracing to the source based on encryption is provided, comprising:
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as preceding institute The anti-fake data processing method of tracing to the source for the encryption stated.
According to a fourth aspect of the present invention, a kind of computer readable storage medium is provided, is stored in the storage medium more Item instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source based on encryption as previously described Reason method.
Above scheme according to the present invention, NFC label can carry out symmetric cryptography school to data symmetric cryptography, to data It tests, encryption data and NFC label is bound, guarantee the safety of NFC label data storage;The reading and displaying of encryption data, It is no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can be read NFC label data, and it is able to verify that the data read.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.
Detailed description of the invention
The attached drawing for constituting a part of the invention is used to provide further understanding of the present invention, and the present invention provides following attached Figure is illustrated.In the accompanying drawings:
Fig. 1 is the anti-fake data processing method flow chart of tracing to the source proposed by the present invention based on encryption;
Fig. 2 is the method flow diagram that encryption data is written to NFC label of one embodiment of the present invention;
Fig. 3 is the method flow diagram of the verifying mobile terminal of one embodiment of the present invention;
Fig. 4 is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It is illustrated with reference to Fig. 1 the anti-fake data processing method of tracing to the source of the invention based on encryption first, Fig. 1 is shown according to this The anti-fake data processing method flow chart of tracing to the source based on encryption of invention.As shown in Figure 1, the described method comprises the following steps:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Include:
End is generated by anti-fake information of tracing to the source, such as producer reads the unique identification UID of NFC label;The NFC label is returned It returns mark UID and generates end to anti-fake information of tracing to the source;It is described it is anti-fake trace to the source information generate end according in the UID query service device with The corresponding password of the UID;The database purchase of server has all data information of the NFC label, the database pair The all data information of the NFC label carries out storage management, according to the items for updating information update, the maintenance NFC label Data information, the server generate end to the anti-fake information of tracing to the source and return to the password.The server can be described Anti-fake information of tracing to the source generates the server at end, is also possible to third-party server;
Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data Verification information;
Illustrate the method for the invention to NFC label write-in encryption data below in conjunction with Fig. 2.It is described to be added based on the password The NFC label is written in encrypted data by close initial data, and setting verification information includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
End is generated by the anti-fake information of tracing to the source and generates the initial data for containing anti-fake information of tracing to the source, it is close based on the encryption Code, using Encryption Algorithm, encrypts the initial data.The Encryption Algorithm can be AES-128, can also be using other encryptions Algorithm only does exemplary illustration herein.By the dynamic encryption technology of the NFC label, tying up for NFC label and data is realized It is fixed.The Encryption Algorithm is built in the NFC label;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set;
The data information of the NFC label include the UID, auto-counter count value, the encrypted data, And whole packet check bit checksum;
The data information of the setting NFC label, comprising:
Auto-counter count value is set;
The UID of the NFC label, auto-counter count value are mapped to the data field of the NFC label, reflected Shooting method are as follows: be directed to the NFC label, mapping position and map information be set, NFC label is by the UID, auto-counter Count value is saved in corresponding memory block.
According to the UID, the auto-counter count value, the encrypted data that the NFC label is written, use Encryption Algorithm calculates whole packet check bit checksum, and the Encryption Algorithm can be AES-128CMAC algorithm, can also use Other Encryption Algorithm, the Encryption Algorithm are built in the NFC label, only do exemplary illustration herein.
The whole packet check bit checksum can carry out the mobile terminal for accessing the NFC label as verification information Verifying.
The server is sent by Encryption Algorithm used in the NFC label, the NFC is saved by the server Encryption Algorithm used in label.
Step S1025: the data information of the NFC label is saved as into NDEF format.
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.
The mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID Code, comprising: mobile terminal reads the data information in the NFC label, and the mobile terminal includes Android mobile phone, apple hand Machine and other intelligent terminal.The mobile terminal can access the NFC label by the app that the mobile terminal is installed Data information.The NFC label returns to the data information in the label, including the UID, automatic counting to mobile terminal Device count value, the encrypted data and whole packet check bit checksum.The NFC label updates the institute in data field Auto-counter count value is stated, 1 is added on the basis of original numerical value, the NFC label is according to the NFC label UID, updated auto-counter count value, the encrypted data, using with whole packet school is calculated in step S1024 Test the new whole packet check bit checksum that the identical Encryption Algorithm of a checksum calculates the NFC label, the NFC mark Label update the whole packet check bit checksum in data field.The mobile terminal requests described UID pairs to the server The password answered, the server send the corresponding password of the UID to the mobile terminal.
Illustrate the method for verifying mobile terminal of the invention below in conjunction with Fig. 3.The verifying mobile terminal, if verifying As a result to pass through, the mobile terminal reads the encryption data in the NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps S1032;It is no to then follow the steps S1033;
In the present embodiment, what the mobile terminal can access the acquisition NFC label by mobile terminal app includes institute State the data information of UID, auto-counter count value, the encrypted data and whole packet check bit checksum.Institute It states mobile terminal app and the server is accessed according to the UID of the NFC label, find the corresponding NFC label of the UID Attribute information, the attribute information includes the Encryption Algorithm of the NFC label.The mobile terminal is according to the password, base In the Encryption Algorithm of the NFC label got, runs Encryption Algorithm and the whole packet check bit checksum is calculated.
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes Step S1034;It is no to then follow the steps S1035;
The checking solicited message include stored in the corresponding UID of the NFC label and the NFC label it is described automatic Counter count value, the server search the database according to the UID, obtain server from the database and work as The auto-counter count value of preceding storage;Compare the auto-counter count value that the checking solicited message carries Whether the auto-counter count value corresponding with the UID stored in the database is greater than.
The purpose for verifying the auto-counter count value is to verify whether the NFC label is copied illegally institute State whether NFC label is true.
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to described test by the server The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal Pass through;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition The corresponding initial data of NFC label reads the initial data by the mobile terminal.
The operation of mobile terminal execution in the present embodiment can execute identical operation by mobile terminal app.
It is specific below in conjunction with the anti-fake data processing method of tracing to the source illustrated the present invention is based on encryption:
The present embodiment method is applied to manufacturer and produces anti-fake data of tracing to the source, and manufacturer obtains the NFC label from server Password is realized the binding of anti-fake trace to the source data and the NFC label, is arranged simultaneously by the dynamic encryption technology of NFC label Verification information.Mobile terminal user is without using special reading equipment, it is only necessary to read NFC label using mobile terminal and believe Breath, and then verify NFC tag information and obtain original anti-fake data and the chip of tracing to the source by symmetrically decrypting after being verified Information.
Referring to FIG. 4, it is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.Such as figure Shown, which includes:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked Verification information is arranged in label;
Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label Encryption data.
Further, the Data write. module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
Further, the data read module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether Greater than the auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for by the server by the auto-counter count value in the database The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole End is verified for the second time;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
The embodiment of the present invention further provides a kind of anti-fake data processing system of tracing to the source based on encryption, comprising:
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and executes institute as above The anti-fake data processing method of tracing to the source based on encryption stated.
The embodiment of the present invention further provides a kind of computer readable storage medium, is stored in the storage medium a plurality of Instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data processing of tracing to the source based on encryption as described above Method.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase Mutually combination.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or group Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown Or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Device (can be personal computer, physical machine server perhaps network Cloud Server etc. need to install Windows or Windows Server operating system) execute the part steps of each embodiment the method for the present invention.And storage above-mentioned is situated between Matter includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), the various media that can store program code such as magnetic or disk.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, according to According to technical spirit any simple modification, equivalent change and modification to the above embodiments of the invention, this hair is still fallen within In the range of bright technical solution.

Claims (12)

1. a kind of anti-fake data processing method of tracing to the source based on encryption, which is characterized in that the described method includes:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Step S102: being based on the password encryption initial data, and the NFC label, setting verifying is written in encrypted data Information;
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID Code, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.
2. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described based on described The NFC label is written in encrypted data by password encryption initial data, and setting verification information includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set.
3. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described in the verifying Mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum and institute Whether the whole packet check bit checksum for stating NFC label storage is equal;If comparison result be it is equal, then follow the steps S1032;It is no Then follow the steps S1033;
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends checking request, institute to the server It states checking request and judges whether the auto-counter count value of the NFC label is greater than the service by the server The auto-counter count value corresponding with the NFC label in the database of device;If the determination result is YES, it thens follow the steps S1034;It is no to then follow the steps S1035;
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to the verifying by the server asks The auto-counter count value in information is sought, returns to message to mobile terminal, second of the verifying of confirmation mobile terminal is logical It crosses;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, obtains the NFC mark Corresponding initial data is signed, the initial data is read by the mobile terminal.
4. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the NFC label Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit checksum。
5. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the mobile terminal For iPhone.
6. a kind of anti-fake data processing equipment of tracing to the source based on encryption, which is characterized in that described device includes:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, being written the NFC label for encrypted data, Verification information is set;
Data read module: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.
7. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the data write-in Module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
8. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the reading data Module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet check bit Whether checksum and the whole packet check bit checksum that the NFC label stores are equal;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is tested to server transmission Card request, the checking request judge whether the auto-counter count value of the NFC label is greater than by the server The auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for being updated the auto-counter count value in the database by the server For the auto-counter count value in the checking solicited message, message is returned to mobile terminal, confirmation mobile terminal the It is secondary to be verified;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: it for decrypting the encryption data of the NFC label using the password by the mobile terminal, obtains The corresponding initial data of the NFC label is obtained, the initial data is read by the mobile terminal.
9. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the NFC label Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit checksum。
10. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that described mobile whole End is iPhone.
11. a kind of anti-fake data processing system of tracing to the source based on encryption characterized by comprising
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as claim Any anti-fake data processing method of tracing to the source based on encryption of 1-5.
12. a kind of computer readable storage medium, which is characterized in that be stored with a plurality of instruction in the storage medium;It is described more Item instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source a method as claimed in any one of claims 1 to 5 based on encryption Reason method.
CN201910771685.2A 2019-08-21 2019-08-21 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium Active CN110533128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910771685.2A CN110533128B (en) 2019-08-21 2019-08-21 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910771685.2A CN110533128B (en) 2019-08-21 2019-08-21 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium

Publications (2)

Publication Number Publication Date
CN110533128A true CN110533128A (en) 2019-12-03
CN110533128B CN110533128B (en) 2023-08-04

Family

ID=68662285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910771685.2A Active CN110533128B (en) 2019-08-21 2019-08-21 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium

Country Status (1)

Country Link
CN (1) CN110533128B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113627958A (en) * 2021-08-25 2021-11-09 芯电智联(北京)科技有限公司 NFC anti-counterfeiting tracing method and server
CN114595795A (en) * 2022-03-08 2022-06-07 芯电智联(北京)科技有限公司 NFC tag source tracing data processing method

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026195A (en) * 2010-12-17 2011-04-20 北京交通大学 One-time password (OTP) based mobile terminal identity authentication method and system
CN102385710A (en) * 2011-08-15 2012-03-21 王志刚 Method and system for verifying fact or fiction
CN102404118A (en) * 2011-10-19 2012-04-04 陈坚 Object certification method based on short-distance communication terminal
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN103530785A (en) * 2013-11-04 2014-01-22 陈一峰 Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104350756A (en) * 2012-03-30 2015-02-11 耐瑞唯信有限公司 Security device for pay-tv receiver decoder
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal
CN104809618A (en) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 Radio frequency identification tag-based product anti-counterfeiting method
US20160234177A1 (en) * 2013-09-13 2016-08-11 Vodafone Ip Licensing Ltd Secure communication with a mobile device
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
CN107358350A (en) * 2017-04-01 2017-11-17 浙江汉脑数码科技有限公司 A kind of third party's intelligence trademark anti-fake certificate cloud service system
CN109711516A (en) * 2018-11-28 2019-05-03 山水云(上海)信息科技有限公司 A kind of fake certification system and method based on NFC chip

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026195A (en) * 2010-12-17 2011-04-20 北京交通大学 One-time password (OTP) based mobile terminal identity authentication method and system
CN102385710A (en) * 2011-08-15 2012-03-21 王志刚 Method and system for verifying fact or fiction
CN102404118A (en) * 2011-10-19 2012-04-04 陈坚 Object certification method based on short-distance communication terminal
CN104350756A (en) * 2012-03-30 2015-02-11 耐瑞唯信有限公司 Security device for pay-tv receiver decoder
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
US20160234177A1 (en) * 2013-09-13 2016-08-11 Vodafone Ip Licensing Ltd Secure communication with a mobile device
CN103530785A (en) * 2013-11-04 2014-01-22 陈一峰 Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104809618A (en) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 Radio frequency identification tag-based product anti-counterfeiting method
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
CN107358350A (en) * 2017-04-01 2017-11-17 浙江汉脑数码科技有限公司 A kind of third party's intelligence trademark anti-fake certificate cloud service system
CN109711516A (en) * 2018-11-28 2019-05-03 山水云(上海)信息科技有限公司 A kind of fake certification system and method based on NFC chip

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113627958A (en) * 2021-08-25 2021-11-09 芯电智联(北京)科技有限公司 NFC anti-counterfeiting tracing method and server
CN113627958B (en) * 2021-08-25 2023-09-26 芯电智联(北京)科技有限公司 NFC anti-counterfeiting tracing method and server
CN114595795A (en) * 2022-03-08 2022-06-07 芯电智联(北京)科技有限公司 NFC tag source tracing data processing method

Also Published As

Publication number Publication date
CN110533128B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
CN108197891B (en) Electronic signing device and method based on block chain
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
JP5005811B2 (en) Method, system and trusted service manager for securely transmitting an application to a mobile phone
CN105900104B (en) Applet migration in safety element
CN101511051B (en) Method, system and equipment for downloading application business of telecom smart card
EP3017580B1 (en) Signatures for near field communications
CN109670803A (en) Method, apparatus, medium and the electronic equipment tested before online trading
CN107786344A (en) Applying digital certificate, the implementation method used and device
KR20150002609A (en) Multi-issuer secure element partition architecture for nfc enabled devices
CN104917614A (en) Bidirectional verification method and device of intelligent card and acceptance terminal
CN110598433B (en) Block chain-based anti-fake information processing method and device
CN110460563A (en) Data encryption, decryption method and device, system, readable medium and electronic equipment
CN109978571A (en) Source tracing method based on block chain and device of tracing to the source
CN104941302A (en) Water purification device, filter core as well as anti-counterfeit device and method of filter core
CN109905351A (en) Method and apparatus for storing data
CN110533128A (en) A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
CN106020868B (en) A kind of smart card firmware update and system
CN105227380B (en) The method, apparatus and system of user data processing
CN108416224B (en) A kind of data encryption/decryption method and device
CN109948960A (en) Remove storehouse outbound, storage method and device and electronic equipment and storage medium
CN109635558A (en) Access control method, device and system
CN108243402B (en) Method and device for reading and writing smart card
CN110020040A (en) Inquire the methods, devices and systems of data
JP6318868B2 (en) Authentication system and portable communication terminal
CN108667647B (en) Method and device for setting device parameters and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant