CN110533128A - A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption - Google Patents
A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption Download PDFInfo
- Publication number
- CN110533128A CN110533128A CN201910771685.2A CN201910771685A CN110533128A CN 110533128 A CN110533128 A CN 110533128A CN 201910771685 A CN201910771685 A CN 201910771685A CN 110533128 A CN110533128 A CN 110533128A
- Authority
- CN
- China
- Prior art keywords
- data
- nfc label
- mobile terminal
- encryption
- tracing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 19
- 238000012795 verification Methods 0.000 claims abstract description 18
- 238000000034 method Methods 0.000 claims description 24
- 238000012545 processing Methods 0.000 claims description 14
- 238000012790 confirmation Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 abstract description 2
- 238000012360 testing method Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000013524 data verification Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Computational Linguistics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption, which comprises the mark UID for obtaining NFC label obtains password corresponding with the UID from server;Based on the password encryption initial data, the NFC label is written into encrypted data, verification information is set;Mobile terminal reads the data information of the NFC label, and access server obtains the corresponding password of the UID, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.According to the solution of the present invention, encryption data and NFC label are bound, guarantees the safety of NFC label data storage;The reading and displaying of encryption data are no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can read NFC label data, and are able to verify that the data read.
Description
Technical field
The present invention relates to processing data information field more particularly to it is a kind of be common to all kinds of reading equipment based on encryption
Anti-fake data processing method of tracing to the source, device, system and medium, more particularly to support the encryption based on NFC label of iPhone
Anti-fake data processing method of tracing to the source, device, system and medium.
Background technique
Currently, anti-fake traceability system has been applied on the various product of multi industries, anti-fake traceability system is believed using label
Store commodity information is ceased, the process of producing is refine to each critical control point, consumer is scanned label, can obtain commodity
Produce date, the place of origin, merchandise news etc..Have all multimodes and realizes that anti-fake traceability system, such as two-dimension code anti-counterfeit, RFID are prevented
It is pseudo-, NFC is anti-fake etc..Wherein, NFC is anti-fake can read NFC label progress fake certification by mobile phone.
The key link of anti-fake traceability system is the data safety in the acquisition and transmission sources data procedures of source data.
The existing anti-fake traceability system using NFC label, the source data of transmission is the clear data of unencryption protection mostly, this
The anti-fake data of tracing to the source of mode are easily faked;The implementation of encipherment protection is taken the source data of transmission, and is needed anti-fake
When tracing to the source, the encryption data stored in NFC label is read using special equipment by user, general mobile terminal cannot be used
The encryption data stored in NFC label is read out, iPhone is not supported especially to read the encryption number stored in NFC label
According to.The Information Security of the anti-fake traceability system of NFC label cannot be taken into account in the prior art and reads the versatility of equipment.
Summary of the invention
In order to solve the above technical problems, the anti-fake data processing method of tracing to the source that the invention proposes a kind of based on encryption, dress
It sets, system and medium, the method, device, system and medium cannot take into account the anti-of NFC label to solve in the prior art
The Information Security of pseudo- traceability system and the technical issues of read the versatility of equipment.
According to the first aspect of the invention, a kind of anti-fake data processing method of tracing to the source based on encryption is provided, comprising:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data
Verification information;
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID
Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label
Data.
Further, described to be based on the password encryption initial data, the NFC label is written into encrypted data,
Verification information, which is arranged, includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set.
Further, the verifying mobile terminal, if verification result is to pass through, described in the mobile terminal reading
Encryption data in NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum
It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps
S1032;It is no to then follow the steps S1033;
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks
Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described
The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes
Step S1034;It is no to then follow the steps S1035;
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to described test by the server
The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal
Pass through;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition
The corresponding initial data of NFC label reads the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption
Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
According to a second aspect of the present invention, a kind of anti-fake data processing equipment of tracing to the source based on encryption is provided, comprising:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked
Verification information is arranged in label;
Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID
Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label
Encryption data.
Further, the Data write. module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
Further, the data read module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school
Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server
Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether
Greater than the auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for by the server by the auto-counter count value in the database
The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole
End is verified for the second time;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal
According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption
Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
According to a third aspect of the present invention, a kind of anti-fake data processing system of tracing to the source based on encryption is provided, comprising:
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as preceding institute
The anti-fake data processing method of tracing to the source for the encryption stated.
According to a fourth aspect of the present invention, a kind of computer readable storage medium is provided, is stored in the storage medium more
Item instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source based on encryption as previously described
Reason method.
Above scheme according to the present invention, NFC label can carry out symmetric cryptography school to data symmetric cryptography, to data
It tests, encryption data and NFC label is bound, guarantee the safety of NFC label data storage;The reading and displaying of encryption data,
It is no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can be read
NFC label data, and it is able to verify that the data read.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.
Detailed description of the invention
The attached drawing for constituting a part of the invention is used to provide further understanding of the present invention, and the present invention provides following attached
Figure is illustrated.In the accompanying drawings:
Fig. 1 is the anti-fake data processing method flow chart of tracing to the source proposed by the present invention based on encryption;
Fig. 2 is the method flow diagram that encryption data is written to NFC label of one embodiment of the present invention;
Fig. 3 is the method flow diagram of the verifying mobile terminal of one embodiment of the present invention;
Fig. 4 is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and
Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It is illustrated with reference to Fig. 1 the anti-fake data processing method of tracing to the source of the invention based on encryption first, Fig. 1 is shown according to this
The anti-fake data processing method flow chart of tracing to the source based on encryption of invention.As shown in Figure 1, the described method comprises the following steps:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Include:
End is generated by anti-fake information of tracing to the source, such as producer reads the unique identification UID of NFC label;The NFC label is returned
It returns mark UID and generates end to anti-fake information of tracing to the source;It is described it is anti-fake trace to the source information generate end according in the UID query service device with
The corresponding password of the UID;The database purchase of server has all data information of the NFC label, the database pair
The all data information of the NFC label carries out storage management, according to the items for updating information update, the maintenance NFC label
Data information, the server generate end to the anti-fake information of tracing to the source and return to the password.The server can be described
Anti-fake information of tracing to the source generates the server at end, is also possible to third-party server;
Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data
Verification information;
Illustrate the method for the invention to NFC label write-in encryption data below in conjunction with Fig. 2.It is described to be added based on the password
The NFC label is written in encrypted data by close initial data, and setting verification information includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
End is generated by the anti-fake information of tracing to the source and generates the initial data for containing anti-fake information of tracing to the source, it is close based on the encryption
Code, using Encryption Algorithm, encrypts the initial data.The Encryption Algorithm can be AES-128, can also be using other encryptions
Algorithm only does exemplary illustration herein.By the dynamic encryption technology of the NFC label, tying up for NFC label and data is realized
It is fixed.The Encryption Algorithm is built in the NFC label;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set;
The data information of the NFC label include the UID, auto-counter count value, the encrypted data,
And whole packet check bit checksum;
The data information of the setting NFC label, comprising:
Auto-counter count value is set;
The UID of the NFC label, auto-counter count value are mapped to the data field of the NFC label, reflected
Shooting method are as follows: be directed to the NFC label, mapping position and map information be set, NFC label is by the UID, auto-counter
Count value is saved in corresponding memory block.
According to the UID, the auto-counter count value, the encrypted data that the NFC label is written, use
Encryption Algorithm calculates whole packet check bit checksum, and the Encryption Algorithm can be AES-128CMAC algorithm, can also use
Other Encryption Algorithm, the Encryption Algorithm are built in the NFC label, only do exemplary illustration herein.
The whole packet check bit checksum can carry out the mobile terminal for accessing the NFC label as verification information
Verifying.
The server is sent by Encryption Algorithm used in the NFC label, the NFC is saved by the server
Encryption Algorithm used in label.
Step S1025: the data information of the NFC label is saved as into NDEF format.
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID
Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label
Data.
The mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID
Code, comprising: mobile terminal reads the data information in the NFC label, and the mobile terminal includes Android mobile phone, apple hand
Machine and other intelligent terminal.The mobile terminal can access the NFC label by the app that the mobile terminal is installed
Data information.The NFC label returns to the data information in the label, including the UID, automatic counting to mobile terminal
Device count value, the encrypted data and whole packet check bit checksum.The NFC label updates the institute in data field
Auto-counter count value is stated, 1 is added on the basis of original numerical value, the NFC label is according to the NFC label
UID, updated auto-counter count value, the encrypted data, using with whole packet school is calculated in step S1024
Test the new whole packet check bit checksum that the identical Encryption Algorithm of a checksum calculates the NFC label, the NFC mark
Label update the whole packet check bit checksum in data field.The mobile terminal requests described UID pairs to the server
The password answered, the server send the corresponding password of the UID to the mobile terminal.
Illustrate the method for verifying mobile terminal of the invention below in conjunction with Fig. 3.The verifying mobile terminal, if verifying
As a result to pass through, the mobile terminal reads the encryption data in the NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum
It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps
S1032;It is no to then follow the steps S1033;
In the present embodiment, what the mobile terminal can access the acquisition NFC label by mobile terminal app includes institute
State the data information of UID, auto-counter count value, the encrypted data and whole packet check bit checksum.Institute
It states mobile terminal app and the server is accessed according to the UID of the NFC label, find the corresponding NFC label of the UID
Attribute information, the attribute information includes the Encryption Algorithm of the NFC label.The mobile terminal is according to the password, base
In the Encryption Algorithm of the NFC label got, runs Encryption Algorithm and the whole packet check bit checksum is calculated.
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks
Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described
The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes
Step S1034;It is no to then follow the steps S1035;
The checking solicited message include stored in the corresponding UID of the NFC label and the NFC label it is described automatic
Counter count value, the server search the database according to the UID, obtain server from the database and work as
The auto-counter count value of preceding storage;Compare the auto-counter count value that the checking solicited message carries
Whether the auto-counter count value corresponding with the UID stored in the database is greater than.
The purpose for verifying the auto-counter count value is to verify whether the NFC label is copied illegally institute
State whether NFC label is true.
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to described test by the server
The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal
Pass through;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition
The corresponding initial data of NFC label reads the initial data by the mobile terminal.
The operation of mobile terminal execution in the present embodiment can execute identical operation by mobile terminal app.
It is specific below in conjunction with the anti-fake data processing method of tracing to the source illustrated the present invention is based on encryption:
The present embodiment method is applied to manufacturer and produces anti-fake data of tracing to the source, and manufacturer obtains the NFC label from server
Password is realized the binding of anti-fake trace to the source data and the NFC label, is arranged simultaneously by the dynamic encryption technology of NFC label
Verification information.Mobile terminal user is without using special reading equipment, it is only necessary to read NFC label using mobile terminal and believe
Breath, and then verify NFC tag information and obtain original anti-fake data and the chip of tracing to the source by symmetrically decrypting after being verified
Information.
Referring to FIG. 4, it is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.Such as figure
Shown, which includes:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked
Verification information is arranged in label;
Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID
Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label
Encryption data.
Further, the Data write. module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
Further, the data read module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school
Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server
Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether
Greater than the auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for by the server by the auto-counter count value in the database
The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole
End is verified for the second time;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal
According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.
Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption
Data and whole packet check bit checksum afterwards.
Further, the mobile terminal is iPhone.
The embodiment of the present invention further provides a kind of anti-fake data processing system of tracing to the source based on encryption, comprising:
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and executes institute as above
The anti-fake data processing method of tracing to the source based on encryption stated.
The embodiment of the present invention further provides a kind of computer readable storage medium, is stored in the storage medium a plurality of
Instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data processing of tracing to the source based on encryption as described above
Method.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or group
Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown
Or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
Device (can be personal computer, physical machine server perhaps network Cloud Server etc. need to install Windows or
Windows Server operating system) execute the part steps of each embodiment the method for the present invention.And storage above-mentioned is situated between
Matter includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), the various media that can store program code such as magnetic or disk.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, according to
According to technical spirit any simple modification, equivalent change and modification to the above embodiments of the invention, this hair is still fallen within
In the range of bright technical solution.
Claims (12)
1. a kind of anti-fake data processing method of tracing to the source based on encryption, which is characterized in that the described method includes:
Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;
Step S102: being based on the password encryption initial data, and the NFC label, setting verifying is written in encrypted data
Information;
Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID
Code, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.
2. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described based on described
The NFC label is written in encrypted data by password encryption initial data, and setting verification information includes:
Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;
Step S1022: the initial data is encrypted based on the Crypted password;
Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;
Step S1024: the data information of the NFC label is set.
3. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described in the verifying
Mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label:
Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum and institute
Whether the whole packet check bit checksum for stating NFC label storage is equal;If comparison result be it is equal, then follow the steps S1032;It is no
Then follow the steps S1033;
Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends checking request, institute to the server
It states checking request and judges whether the auto-counter count value of the NFC label is greater than the service by the server
The auto-counter count value corresponding with the NFC label in the database of device;If the determination result is YES, it thens follow the steps
S1034;It is no to then follow the steps S1035;
Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;
Step S1034: the auto-counter count value in the database is updated to the verifying by the server asks
The auto-counter count value in information is sought, returns to message to mobile terminal, second of the verifying of confirmation mobile terminal is logical
It crosses;Enter step S1036;
Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;
Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, obtains the NFC mark
Corresponding initial data is signed, the initial data is read by the mobile terminal.
4. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the NFC label
Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit
checksum。
5. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the mobile terminal
For iPhone.
6. a kind of anti-fake data processing equipment of tracing to the source based on encryption, which is characterized in that described device includes:
It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;
Data write. module: for being based on the password encryption initial data, being written the NFC label for encrypted data,
Verification information is set;
Data read module: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID
Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label
Data.
7. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the data write-in
Module includes:
Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;
Encrypt submodule: for encrypting the initial data based on the Crypted password;
Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;
Submodule is set: for the data information of the NFC label to be arranged.
8. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the reading data
Module includes:
First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet check bit
Whether checksum and the whole packet check bit checksum that the NFC label stores are equal;
Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is tested to server transmission
Card request, the checking request judge whether the auto-counter count value of the NFC label is greater than by the server
The auto-counter count value corresponding with the NFC label in the database of the server;
First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;
Data update submodule: for being updated the auto-counter count value in the database by the server
For the auto-counter count value in the checking solicited message, message is returned to mobile terminal, confirmation mobile terminal the
It is secondary to be verified;
Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;
Reading data submodule: it for decrypting the encryption data of the NFC label using the password by the mobile terminal, obtains
The corresponding initial data of the NFC label is obtained, the initial data is read by the mobile terminal.
9. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the NFC label
Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit
checksum。
10. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that described mobile whole
End is iPhone.
11. a kind of anti-fake data processing system of tracing to the source based on encryption characterized by comprising
Processor, for executing a plurality of instruction;
Memory, for storing a plurality of instruction;
Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as claim
Any anti-fake data processing method of tracing to the source based on encryption of 1-5.
12. a kind of computer readable storage medium, which is characterized in that be stored with a plurality of instruction in the storage medium;It is described more
Item instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source a method as claimed in any one of claims 1 to 5 based on encryption
Reason method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910771685.2A CN110533128B (en) | 2019-08-21 | 2019-08-21 | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910771685.2A CN110533128B (en) | 2019-08-21 | 2019-08-21 | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110533128A true CN110533128A (en) | 2019-12-03 |
CN110533128B CN110533128B (en) | 2023-08-04 |
Family
ID=68662285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910771685.2A Active CN110533128B (en) | 2019-08-21 | 2019-08-21 | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110533128B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113627958A (en) * | 2021-08-25 | 2021-11-09 | 芯电智联(北京)科技有限公司 | NFC anti-counterfeiting tracing method and server |
CN114595795A (en) * | 2022-03-08 | 2022-06-07 | 芯电智联(北京)科技有限公司 | NFC tag source tracing data processing method |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026195A (en) * | 2010-12-17 | 2011-04-20 | 北京交通大学 | One-time password (OTP) based mobile terminal identity authentication method and system |
CN102385710A (en) * | 2011-08-15 | 2012-03-21 | 王志刚 | Method and system for verifying fact or fiction |
CN102404118A (en) * | 2011-10-19 | 2012-04-04 | 陈坚 | Object certification method based on short-distance communication terminal |
CN103065168A (en) * | 2012-12-19 | 2013-04-24 | 深圳市江波龙电子有限公司 | Anti-fake method and system of radio frequency identification |
CN103413227A (en) * | 2013-08-02 | 2013-11-27 | 四川航天系统工程研究所 | Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof |
CN103530785A (en) * | 2013-11-04 | 2014-01-22 | 陈一峰 | Double anti-counterfeiting system and method based on near field communication (NFC) function |
CN104350756A (en) * | 2012-03-30 | 2015-02-11 | 耐瑞唯信有限公司 | Security device for pay-tv receiver decoder |
CN104463606A (en) * | 2014-12-25 | 2015-03-25 | 张世龙 | Anti-fake tracing method and system based on mobile intelligent terminal |
CN104809618A (en) * | 2014-01-27 | 2015-07-29 | 上海高研明鉴信息技术有限公司 | Radio frequency identification tag-based product anti-counterfeiting method |
US20160234177A1 (en) * | 2013-09-13 | 2016-08-11 | Vodafone Ip Licensing Ltd | Secure communication with a mobile device |
US20170017967A1 (en) * | 2015-07-17 | 2017-01-19 | Lui Kam Ming | Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof |
CN107358350A (en) * | 2017-04-01 | 2017-11-17 | 浙江汉脑数码科技有限公司 | A kind of third party's intelligence trademark anti-fake certificate cloud service system |
CN109711516A (en) * | 2018-11-28 | 2019-05-03 | 山水云(上海)信息科技有限公司 | A kind of fake certification system and method based on NFC chip |
-
2019
- 2019-08-21 CN CN201910771685.2A patent/CN110533128B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026195A (en) * | 2010-12-17 | 2011-04-20 | 北京交通大学 | One-time password (OTP) based mobile terminal identity authentication method and system |
CN102385710A (en) * | 2011-08-15 | 2012-03-21 | 王志刚 | Method and system for verifying fact or fiction |
CN102404118A (en) * | 2011-10-19 | 2012-04-04 | 陈坚 | Object certification method based on short-distance communication terminal |
CN104350756A (en) * | 2012-03-30 | 2015-02-11 | 耐瑞唯信有限公司 | Security device for pay-tv receiver decoder |
CN103065168A (en) * | 2012-12-19 | 2013-04-24 | 深圳市江波龙电子有限公司 | Anti-fake method and system of radio frequency identification |
CN103413227A (en) * | 2013-08-02 | 2013-11-27 | 四川航天系统工程研究所 | Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof |
US20160234177A1 (en) * | 2013-09-13 | 2016-08-11 | Vodafone Ip Licensing Ltd | Secure communication with a mobile device |
CN103530785A (en) * | 2013-11-04 | 2014-01-22 | 陈一峰 | Double anti-counterfeiting system and method based on near field communication (NFC) function |
CN104809618A (en) * | 2014-01-27 | 2015-07-29 | 上海高研明鉴信息技术有限公司 | Radio frequency identification tag-based product anti-counterfeiting method |
CN104463606A (en) * | 2014-12-25 | 2015-03-25 | 张世龙 | Anti-fake tracing method and system based on mobile intelligent terminal |
US20170017967A1 (en) * | 2015-07-17 | 2017-01-19 | Lui Kam Ming | Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof |
CN107358350A (en) * | 2017-04-01 | 2017-11-17 | 浙江汉脑数码科技有限公司 | A kind of third party's intelligence trademark anti-fake certificate cloud service system |
CN109711516A (en) * | 2018-11-28 | 2019-05-03 | 山水云(上海)信息科技有限公司 | A kind of fake certification system and method based on NFC chip |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113627958A (en) * | 2021-08-25 | 2021-11-09 | 芯电智联(北京)科技有限公司 | NFC anti-counterfeiting tracing method and server |
CN113627958B (en) * | 2021-08-25 | 2023-09-26 | 芯电智联(北京)科技有限公司 | NFC anti-counterfeiting tracing method and server |
CN114595795A (en) * | 2022-03-08 | 2022-06-07 | 芯电智联(北京)科技有限公司 | NFC tag source tracing data processing method |
Also Published As
Publication number | Publication date |
---|---|
CN110533128B (en) | 2023-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108197891B (en) | Electronic signing device and method based on block chain | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
JP5005811B2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
CN105900104B (en) | Applet migration in safety element | |
CN101511051B (en) | Method, system and equipment for downloading application business of telecom smart card | |
EP3017580B1 (en) | Signatures for near field communications | |
CN109670803A (en) | Method, apparatus, medium and the electronic equipment tested before online trading | |
CN107786344A (en) | Applying digital certificate, the implementation method used and device | |
KR20150002609A (en) | Multi-issuer secure element partition architecture for nfc enabled devices | |
CN104917614A (en) | Bidirectional verification method and device of intelligent card and acceptance terminal | |
CN110598433B (en) | Block chain-based anti-fake information processing method and device | |
CN110460563A (en) | Data encryption, decryption method and device, system, readable medium and electronic equipment | |
CN109978571A (en) | Source tracing method based on block chain and device of tracing to the source | |
CN104941302A (en) | Water purification device, filter core as well as anti-counterfeit device and method of filter core | |
CN109905351A (en) | Method and apparatus for storing data | |
CN110533128A (en) | A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption | |
CN106020868B (en) | A kind of smart card firmware update and system | |
CN105227380B (en) | The method, apparatus and system of user data processing | |
CN108416224B (en) | A kind of data encryption/decryption method and device | |
CN109948960A (en) | Remove storehouse outbound, storage method and device and electronic equipment and storage medium | |
CN109635558A (en) | Access control method, device and system | |
CN108243402B (en) | Method and device for reading and writing smart card | |
CN110020040A (en) | Inquire the methods, devices and systems of data | |
JP6318868B2 (en) | Authentication system and portable communication terminal | |
CN108667647B (en) | Method and device for setting device parameters and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |