CN112801677B - Anti-counterfeiting tracing method based on electronic tag - Google Patents
Anti-counterfeiting tracing method based on electronic tag Download PDFInfo
- Publication number
- CN112801677B CN112801677B CN202110165211.0A CN202110165211A CN112801677B CN 112801677 B CN112801677 B CN 112801677B CN 202110165211 A CN202110165211 A CN 202110165211A CN 112801677 B CN112801677 B CN 112801677B
- Authority
- CN
- China
- Prior art keywords
- write device
- read
- server
- identity
- electronic tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 141
- 238000013475 authorization Methods 0.000 claims abstract description 126
- 238000004519 manufacturing process Methods 0.000 claims description 128
- 238000004891 communication Methods 0.000 claims description 59
- 238000004364 calculation method Methods 0.000 claims description 39
- 238000012360 testing method Methods 0.000 claims description 27
- 101100256916 Caenorhabditis elegans sid-1 gene Proteins 0.000 claims description 20
- 101100256918 Caenorhabditis elegans sid-2 gene Proteins 0.000 claims description 20
- 101000840469 Arabidopsis thaliana Isochorismate synthase 1, chloroplastic Proteins 0.000 claims description 17
- 239000000284 extract Substances 0.000 claims description 9
- 101100064323 Arabidopsis thaliana DTX47 gene Proteins 0.000 claims description 5
- 101150026676 SID1 gene Proteins 0.000 claims description 5
- 238000004458 analytical method Methods 0.000 claims description 2
- 238000005336 cracking Methods 0.000 abstract description 3
- 230000002427 irreversible effect Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000006698 induction Effects 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses an anti-counterfeiting tracing method based on an electronic tag, the anti-counterfeiting tracing method comprises the steps of preparing an electronic tag, applying the electronic tag to a product, and checking anti-counterfeiting tracing information of the product through a radio frequency verification terminal. According to the anti-counterfeiting tracing method, the unique identification code of the radio frequency chip is written in the chip circuit of the radio frequency chip, the unique identification code is readable in the chip and is unreadable in external software and hardware, meanwhile, the tag identity identification code formed after secondary deformation is obtained through independent authorization and automatic writing of a tag manufacturer and a tag application manufacturer and through secondary operation of the radio frequency chip, the original unique identification code is obtained through irreversible operation or decryption of the tag identity identification code, copying or cracking of the unique identification code is effectively avoided, the whole anti-counterfeiting tracing process is safe and reliable, counterfeiting is radically avoided, and real anti-counterfeiting tracing is realized.
Description
Technical Field
The application relates to the technical field of electronic anti-counterfeiting, in particular to an anti-counterfeiting tracing method based on an electronic tag.
Background
With the development of technology, the radio frequency technology is increasingly applied in the anti-counterfeiting technical field, and the radio frequency identification technology is gradually changed into the near field communication technology.
The radio frequency identification technology (Radio Frequency Identification, RFID for short) is a non-contact automatic identification technology, and performs non-contact bidirectional data communication in a radio frequency mode, and reads and writes a recording medium in a radio frequency mode, so that the purposes of identification target and data exchange are achieved.
Near Field Communication (NFC) is evolved by combining a wireless interconnection technology on the basis of a wireless radio frequency identification technology, and the mobile terminal is utilized to realize applications such as mobile payment, mobile identity recognition and anti-counterfeiting by integrating functions of an induction card reader, an induction card and point-to-point Communication on a single chip.
In the existing electronic tag, the unique identification code of the radio frequency chip is disclosed outwards and is used as one of verification information, meanwhile, encryption information is written in a manual operation mode in the production or application process of the electronic tag, so that the radio frequency chip is easy to crack or copy, and further is used for counterfeit products, the anti-counterfeiting tracing effect cannot be fundamentally achieved, and larger losses are brought to merchants and consumers.
Disclosure of Invention
The present application aims to solve at least to some extent one of the above technical problems.
The application provides an anti-counterfeiting tracing method based on an electronic tag, which comprises the following steps of:
preparing an electronic tag;
applying the electronic tag to a product;
Checking the product anti-counterfeiting traceability information through a radio frequency verification terminal;
the electronic tag comprises a radio frequency chip, and the step of preparing the electronic tag comprises the following steps:
the production end read-write device establishes remote communication connection with a server;
Writing a unique identification code of the radio frequency chip in a chip circuit of the radio frequency chip; the unique identification code chip is readable and the external software and hardware are not readable and writable;
Writing a first algorithm in the radio frequency chip;
the production end read-write device sends a production end authorization request to the server; the production end authorization request comprises a request server for configuring a production authorization code and allowing the production authorization code to be written into an audio chip;
the server receives the production end authorization request, configures a production authorization code and transmits the production authorization code to the production end read-write device;
the production end read-write device writes the production authorization code into a read-only memory module of the video chip;
The radio frequency chip automatically generates a factory identity code; the factory identity code is generated by calculating a unique identification code and a production authorization code by using a first algorithm;
The step of applying the electronic tag to a product comprises:
the application end read-write device establishes remote communication connection with the server;
the application end read-write device sends an application end authorization request to the server; the application end authorization request comprises a request server for configuring an application end authorization code and allowing writing into an audio chip;
The server receives the application end authorization request, configures an application end authorization code and transmits the application end authorization code to the application end read-write device;
The application end read-write device writes the application end authorization code into a read-only memory module of the incident frequency chip;
the radio frequency chip automatically generates a tag identity code; the label identity code is generated by calculating a factory identity code and an application authorization code by using a first algorithm;
the step of checking the product anti-counterfeiting traceability information through the radio frequency verification terminal comprises the following steps of:
the radio frequency verification terminal establishes radio frequency communication connection with the electronic tag;
The electronic tag generates a dynamic verification data packet and sends the dynamic verification data packet to the radio frequency verification terminal; the dynamic verification data packet does not comprise a unique identification code of the electronic tag;
The radio frequency verification terminal reads the dynamic verification data packet to acquire a remote communication protocol and establishes remote communication connection with the server;
The radio frequency verification terminal sends the dynamic verification data packet to the server and sends a verification request to the server;
and the server performs verification according to the received dynamic verification data packet and transmits a verification result to the frequency verification terminal.
Further, the dynamic verification data packet comprises a production authorization code, an application authorization code, a tag identity identification code, a dynamic code and a signature of the electronic tag; the signature is generated by the label identity code, the factory authorization code, the application authorization code and the dynamic code through calculation by using a first algorithm.
Further, the first algorithm is an MD5 message digest algorithm,
The calculation formula of the factory identity code is as follows: SID1 = MD5 (UID + PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = MD5 (sid1+ac);
The calculation formula of the signature is as follows: sign=md5 (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
Further, the first algorithm is an SHA secure hash algorithm,
The calculation formula of the factory identity code is as follows: sid1=sha (uid+pkey);
the calculation formula of the tag identity identification code is as follows: SID2 = SHA (sid1+ac);
the calculation formula of the signature is as follows: sign=sha (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
Further, the first algorithm is an encryption algorithm:
the calculation formula of the factory identity code is as follows: sid1=encrypt (UID, PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = Encrypt (SID 1, AC);
The calculation formula of the signature is as follows:
Sign=Encrypt[(SID2+PKey+AC+RC),PKey];
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
Further, the step of preparing the electronic tag further comprises: the server verifies the identity of the read-write device at the production end; if the identity verification of the production end read-write device is passed, the server is kept in remote communication connection with the production end read-write device; if the identity verification of the production end read-write device is not passed, the server shields the production end read-write device.
Further, the step of verifying the identity of the production-side read-write device by the server includes:
the server is matched with the production end read-write device in advance according to a label manufacturer and writes matching information into a database; the matching information comprises the identity verification information of the read-write device at the production end;
after the production end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed production end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device at the production end; if the pre-stored matching information in the database has the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the production end read-write device passes the verification; if the pre-stored matching information in the database does not have the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the verification of the production end read-write device is not passed.
Further, the step of applying the electronic tag to a product further includes: the server verifies the identity of the read-write device of the application end; if the identity verification of the application-side read-write device is passed, the server is kept in remote communication connection with the application-side read-write device; if the identity verification of the application-side read-write device is not passed, the server shields the application-side read-write device.
Further, the step of verifying the identity of the application end read-write device by the server includes:
the server is matched with the application end read-write device in advance according to a label application manufacturer, and the matched information is written into a database; the matching information comprises identity verification information of the reading and writing device of the application end;
After the application end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed application end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device of the application end; if the pre-stored matching information in the database has the identity verification information of the application-side read-write device which is matched with the identity information of the currently accessed application-side read-write device, the verification of the application-side read-write device is passed; if the pre-stored matching information in the database does not have the application end read-write device identity verification information matched with the identity information of the currently accessed application end read-write device, the verification of the application end read-write device is not passed.
Further, the step of applying the electronic tag to a product further includes: the anti-counterfeiting traceability system carries out self-test on the electronic tag;
the step of the anti-fake traceability system for carrying out self-test on the electronic tag comprises the following steps:
The application end read-write device extracts the production authorization code, the application authorization code and the signature of the electronic tag and sends the production authorization code, the application authorization code and the signature to the server as self-test information of the electronic tag;
The server stores electronic tag verification information; the server is provided with a second algorithm which is the same as the first algorithm; after receiving the electronic tag self-test information, the server analyzes the electronic tag self-test information through a second algorithm, and compares the analysis result with prestored electronic tag verification information; if the result is consistent, the electronic tag passes the self-test; if the two values do not match with each other, the electronic tag does not pass the self-test;
And the server writes the self-test result into a database and displays the self-test result on a server interface.
The beneficial effects of the application are as follows: by setting a unique identification code which is readable only in a chip and is unreadable by external software and hardware, simultaneously, by independent authorization of a label manufacturer and a label application manufacturer, and obtaining a label identification code formed after secondary deformation through secondary operation, the label identification code is irreversibly operated or decrypted to obtain an original unique identification code, and copying or cracking of the unique identification code is effectively stopped; the production end read-write device and the application end read-write device are fully operated, so that manual intervention is completely eradicated, and the read-write is intelligent and safe, high in efficiency and low in cost; the dynamic verification data packet is formed by packing the production authorization code, the application authorization code, the tag identity identification code, the dynamic code and the signature of the electronic tag, and is read by the radio frequency verification terminal and sent to the server for verification, so that the anti-counterfeiting verification process is safe and reliable, can not be tampered or copied, and the anti-counterfeiting verification result is reliable.
Drawings
Fig. 1 is a schematic diagram of a frame structure of the anti-counterfeiting traceability system of the present application.
Fig. 2 is a schematic diagram of a frame structure of the electronic tag of the present application.
Fig. 3 is a schematic diagram of a frame structure of a server according to the present application.
Fig. 4 is a schematic frame structure of the read-write device of the present application.
Fig. 5 is a schematic diagram of a frame structure of the rf authentication terminal according to the present application.
Fig. 6 is a flowchart of the anti-counterfeiting traceability system of the present application.
Fig. 7 is a flowchart of the method for manufacturing an electronic tag according to the present application.
Fig. 8 is a flowchart of the present application for applying an electronic tag to a product.
Fig. 9 is a flowchart of checking anti-counterfeiting traceability information of a product through a radio frequency verification terminal.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present application and should not be construed as limiting the application.
In the description of the present application, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the present application, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
The application will be described in further detail below with reference to the drawings by means of specific embodiments.
Referring to fig. 1 to 5, the present application provides an anti-counterfeit tracing system based on an electronic tag, which includes an electronic tag 10, a server 20, a production-side read-write device 30, an application-side read-write device 40, and a radio frequency verification terminal 50.
As shown in fig. 2, the electronic tag 10 includes a radio frequency chip and a radio frequency antenna connected to the radio frequency chip. The radio frequency chip has a physically hidden unique identification code that is programmed into the chip circuitry during production of the radio frequency chip. The unique identification code of the radio frequency chip is set as readable in the chip and unreadable by external software and hardware, namely: the unique identification code only participates in the internal operation of the radio frequency chip according to a preset rule and is not disclosed externally. In this embodiment, the radio frequency chip is preferably configured as a chip based on NFC technology. In other embodiments, the radio frequency chip may also be an RFID technology based chip, or other contactless communication technology based chip.
The radio frequency chip comprises a chip main control unit 11, a chip operation unit 12, a read-only memory unit 13, a dynamic code generation unit 14 and a signature generation unit 15 thereof.
The chip main control unit 11 is used for controlling and coordinating each unit in the radio frequency chip to work according to a preset program.
The chip operation unit 12 is connected with the chip main control unit 11, and the chip operation unit 12 is pre-provided with a first algorithm for completing data operation in the radio frequency chip, so as to realize deformation encryption processing of the related information of the radio frequency chip.
The read-only memory unit 13 is connected to the chip main control unit 11, and is used for storing read-only information of the electronic tag 10. In this embodiment, the read-only information of the electronic tag 10 specifically includes a production authorization code, a factory identity code, an application authorization code and a tag identity code of the electronic tag 10.
Wherein the production authorization code is authorized by the server 20 to the label manufacturer and written into the radio frequency chip when the label is produced; the factory identity code is generated by calculating a unique identification code and a production authorization code by using a first algorithm; the application authorization code is authorized by the server 20 to the label application manufacturer and written into the radio frequency chip when the label is applied; the tag identification code is generated by calculating a factory identification code and an application authorization code by using a first algorithm.
The read-only memory unit 13 includes a ROM area, a PROM area, and/or an EEPROM area.
In this embodiment, the production authorization code is only opened to a preset label manufacturer, and when the label manufacturer produces the electronic label 10, the server 20 authorizes and configures the production authorization code, and then writes the received production authorization code into the ROM area of the radio frequency chip.
After a label manufacturer writes a production authorization code into a radio frequency chip, the radio frequency chip automatically calculates the unique identification code and the production authorization code by using a first algorithm according to a preset program to generate a factory identity identification code. Before the electronic tag 10 is applied, the factory identification code is used as a unique external identification code of the electronic tag 10.
The application authorization code is only opened to a preset tag application manufacturer, and when the electronic tag 10 is applied, the tag application manufacturer writes the received application authorization code into a PROM area or an EEPROM area of the radio frequency chip after authorizing and configuring the application authorization code by the server 20.
After the label application manufacturer writes the application authorization code into the radio frequency chip, the radio frequency chip automatically calculates the factory identity identification code and the application authorization code by using a first algorithm according to a preset program to generate the label identity identification code. After the electronic tag 10 is arranged on the product to be anti-counterfeit, the tag identity code is used as the unique external identity code of the electronic tag 10, namely the product to be anti-counterfeit.
The dynamic code generating unit 14 is connected to the chip main control unit 11, and is configured to generate a dynamic code when establishing a radio frequency communication connection with the radio frequency verification terminal 50. As a preferred embodiment, the dynamic code is preferably set as a time sequence code, and the dynamic code generating unit 14 is a time sequence code generator built in the radio frequency chip. Of course, the dynamic code may also be set as a random code, and the dynamic code generating unit 14 is a random code generator built in the radio frequency chip.
The signature generation unit 15 is connected to the chip main control unit 11, and is configured to generate a signature when a radio frequency communication connection is established with the radio frequency verification terminal 50. The signature is generated by the label identity code, the factory authorization code, the application authorization code and the dynamic code through calculation by using a first algorithm.
In some embodiments of the application, the first algorithm may be set as a cryptographic hash function. When the first algorithm is set as a cryptographic hash function, the cryptographic hash function may specifically be an MD5 information digest algorithm or a SHA secure hash algorithm. In other embodiments of the present application, the first algorithm may also be configured as an encryption algorithm. When the first algorithm is set as an encryption algorithm, the encryption algorithm may be specifically a symmetric encryption algorithm or an asymmetric encryption algorithm.
Specifically, the following formula is set: SID1 is the factory identity code, SID2 is the tag identity code, UID is the unique identity code, PKey is the production authorization code, and AC is the application authorization code;
when the first algorithm is set to the MD5 information summarization algorithm,
The calculation formula of the factory identity code is as follows: SID1 = MD5 (UID + PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = MD5 (sid1+ac);
The calculation formula of the signature is as follows: sign=md5 (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
When the first algorithm is set to the SHA secure hash algorithm,
The calculation formula of the factory identity code is as follows: sid1=sha (uid+pkey);
the calculation formula of the tag identity identification code is as follows: SID2 = SHA (sid1+ac);
the calculation formula of the signature is as follows: sign=sha (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
When the first algorithm is set as an encryption algorithm:
the calculation formula of the factory identity code is as follows: sid1=encrypt (UID, PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = Encrypt (SID 1, AC);
The calculation formula of the signature is as follows:
Sign=Encrypt[(SID2+PKey+AC+RC),PKey];
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
The electronic tag 10 of the application is provided with the physical unique identification code, so that the unique identification code is readable only in a chip and is unreadable by external software and hardware; meanwhile, the label identification code formed after secondary deformation is obtained through independent authorization of a label manufacturer and a label application manufacturer respectively and through secondary operation, so that the original unique identification code is obtained through irreversible operation or decryption of the label identification code, copying or cracking of the unique identification code is effectively avoided, the safety and the authenticity of the electronic label 10 are guaranteed, and further the real anti-counterfeiting tracing is realized.
The production-side read-write device 30 can be connected with the server 20 in a remote communication manner, and simultaneously establishes a radio frequency communication connection with the electronic tag 10, and the production-side read-write device 30 is used for writing a production authorization code issued by the server 20 in a radio frequency chip when the electronic tag 10 is produced.
The application-side read-write device 40 can be connected with the server 20 in a remote communication manner, and simultaneously establishes a radio frequency communication connection with the electronic tag 10, and the application-side read-write device 40 is used for writing an application authorization code issued by the server 20 in a radio frequency chip when the electronic tag 10 is applied to a product to be anti-counterfeit.
In the present application, the production-side read-write device 30 and the application-side read-write device 40 each include a read-write main control unit 31, a power supply unit 32, a first remote communication unit 33, an authorization request unit 34, a first radio frequency communication unit 35, and an automatic read-write unit 36.
The read-write main control unit 31 is used for controlling each unit of the read-write device to work according to a preset program.
The power supply unit 32 is used for providing electric energy for the read-write main control unit 31 and each unit.
The first remote communication unit 33 is connected to the read-write master control unit 31 for automatically establishing a remote communication connection with the server 20.
The authorization request unit 34 is connected to the read-write main control unit 31, and is configured to automatically issue an authorization request to the server 20 when the server 20 is in a remote communication connection state.
The first radio frequency communication unit 35 is connected to the read-write main control unit 31, and is configured to automatically establish radio frequency communication connection with the electronic tag 10.
The automatic read-write unit 36 is connected to the read-write main control unit 31, and is configured to automatically read and write anti-counterfeiting information to the electronic tag 10.
The production-end read-write device 30 and the application-end read-write device 40 realize full-automatic remote communication and data transmission of the read-write device, the server 20 and the electronic tag 10 through full-automatic operation of each unit, so that full-automatic read-write operation of the radio frequency chip is realized, manual intervention is completely eradicated, and the read-write of the electronic tag 10 is more intelligent and safer, higher in efficiency and lower in cost.
Referring to fig. 5, the radio frequency authentication terminal 50 includes a second radio frequency communication unit 51, a tag information reading unit 52, a second remote communication unit 53, an authentication request unit 54, and a terminal authentication display unit 55.
The second radio frequency communication unit 51 is configured to establish radio frequency communication connection with the electronic tag 10 and perform data transmission.
The tag information reading unit 52 is configured to read the dynamic verification data packet of the electronic tag 10. In this embodiment, the dynamic verification data packet includes a production authorization code, an application authorization code, a tag identification code, a dynamic code and a signature of the electronic tag 10.
The second remote communication unit 53 is used for establishing a remote communication connection with the server 20 and performing data transmission.
The authentication request unit 54 is configured to issue an anti-counterfeit authentication request to the server 20. The radio frequency verification terminal 50 transmits the dynamic verification data packet to the server 20 through the second remote communication unit 53 while sending an anti-counterfeiting verification request to the server 20; the server 20 performs verification on the dynamic verification data packet of the electronic tag 10, where the dynamic verification data packet does not include the unique identification code of the electronic tag 10.
The terminal verification display unit 55 is configured to display the anti-counterfeit verification result fed back by the server 20 to the anti-counterfeit verification user.
In the application, the dynamic verification data packet is formed by packing the production authorization code, the application authorization code, the tag identity identification code, the dynamic code and the signature of the electronic tag, and is read by the radio frequency verification terminal 50 and sent to the server 20 for verification, so that the anti-counterfeiting verification process is safe and reliable, can not be tampered and copied, and the anti-counterfeiting verification result is reliable.
As shown in fig. 3, the server 20 includes a server main control unit 21, a database 22, a server operation unit 23, a third remote communication unit 24, an authorization code configuration unit 25, an anti-counterfeit verification unit 26, and a server display unit 27 thereof.
The server main control unit 21 is used for controlling the coordination database 22 and each unit to work according to a preset program. The server master control unit 21 may be a server integrated processor.
The database 22 is connected to the server main control unit 21, and is used for storing anti-counterfeit verification information of the electronic tag 10. The database 22 may be located in memory, cloud, or blockchain.
The server operation unit 23 is connected to the server main control unit 21, and the server operation unit 23 is preset with a second algorithm, and the second algorithm is the same as the first algorithm.
The third remote communication unit 24 is connected to the server main control unit 21, and is used for establishing a remote communication connection with the production side read-write device 30, the application side read-write device 40 and the radio frequency verification terminal 50.
The authorization code configuration unit 25 is connected to the server main control unit 21, and is configured to configure and generate an authorization code or an application authorization code to the production side read-write device 30 or the application side read-write device 40.
The anti-counterfeiting verification unit 26 is connected to the server main control unit 21, and is configured to parse the information in the dynamic verification data packet according to a preset rule through a second algorithm, and verify the parsing result to the anti-counterfeiting verification information in the database 22.
The server display unit 27 is connected to the server main control unit 21, and is configured to display the anti-counterfeit verification result to a server side worker, so that the server side worker performs subsequent processing of the anti-counterfeit work according to the anti-counterfeit verification result.
In the present application, to further enhance the control of the anti-counterfeit verification system on the electronic tag 10, the radio frequency verification terminal 50 further includes a GPS positioning unit 56, where the GPS positioning unit 56 is used to obtain the current geographic location information of the radio frequency verification terminal 50; the dynamic verification data packet also includes GPS location information of the radio frequency verification terminal 50. Specifically, the radio frequency verification terminal 50 obtains the current geographical location information through the GPS positioning unit 56, and forms a dynamic verification data packet with other information through the second remote communication unit 53, and sends the dynamic verification data packet to the server 20 and simultaneously sends an anti-counterfeiting verification request to the server 20. By uploading the GPS location information to the server 20, the geographical location information of each time the electronic tag 10 is read can be accurately marked, and thus the product location can be quickly found and recorded in the database 22.
Referring to fig. 6 to 9, the present application provides an anti-counterfeiting tracing method based on an electronic tag, where the anti-counterfeiting tracing method uses the anti-counterfeiting tracing system as described above.
The anti-counterfeiting tracing method comprises the following steps:
s101, preparing an electronic tag;
s102, applying an electronic tag to a product;
S103, checking the product anti-counterfeiting traceability information through the radio frequency verification terminal.
As shown in fig. 7, the steps of preparing the electronic tag include:
s201, the production end read-write device establishes remote communication connection with a server; when the electronic tag is produced, the radio frequency chip and the radio frequency antenna are manufactured on the base material, and the production end read-write device is powered on when the radio frequency chip is manufactured, and the production end read-write device is powered on to establish remote communication connection with a server, so that subsequent read-write operation on the radio frequency chip can be performed;
s202, a unique identification code of the radio frequency chip is programmed in a chip circuit of the radio frequency chip; the attribute of the unique identification code is set as follows: the chip is readable and the external software and hardware are not readable and writable;
s203, writing a first algorithm in the radio frequency chip;
s204, the production end read-write device sends a production end authorization request to the server; the production end authorization request comprises a request server for configuring a production authorization code and allowing the production authorization code to be written into an audio chip;
S205, after receiving the authorization request of the production end, the server configures a production authorization code and issues the production authorization code to the production end read-write device; in the application, the server is preset with a production end authorization configuration program which is started only when the requesting party is a production end read-write device and the request content is production end authorization, namely: the production authorization code is only opened to the appointed label manufacturer;
S206, the production end read-write device writes the production authorization code into a read-only memory module of the incident frequency chip; in this embodiment, the production authorization code is written into the ROM area of the radio frequency chip, the ROM area works in a non-destructive readout mode, only information can be read out but information cannot be written in, the information is fixed once written in, and even if the power supply is cut off, the information is not lost;
s207, the radio frequency chip automatically generates a factory identity code; the factory identity code is generated by calculating a unique identification code and a production authorization code by using a first algorithm. Before the electronic tag is applied, the factory identity code is used as the unique external identity code of the electronic tag.
In specific implementation, the step of preparing the electronic tag further includes: the server verifies the identity of the read-write device at the production end; if the identity verification of the production end read-write device is passed, the server is kept in remote communication connection with the production end read-write device; if the identity verification of the production end read-write device is not passed, the server shields the production end read-write device;
the step of verifying the identity of the production end read-write device by the server specifically comprises the following steps:
the server is matched with the production end read-write device in advance according to a label manufacturer and writes matching information into a database; the matching information comprises the identity verification information of the read-write device at the production end;
after the production end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed production end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device at the production end; if the pre-stored matching information in the database has the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the production end read-write device passes the verification; if the pre-stored matching information in the database does not have the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the verification of the production end read-write device is not passed.
Referring to fig. 8, the step of applying the electronic tag to a product includes:
S301, the application end read-write device establishes remote communication connection with a server;
s302, an application end read-write device sends an application end authorization request to a server; the application end authorization request comprises a request server for configuring an application end authorization code and allowing writing into an audio chip;
S303, after receiving the application end authorization request, the server configures an application end authorization code and issues the application end authorization code to the application end read-write device; in the application, the server is preset with an application-side authorization configuration program, and the application-side authorization configuration program is started only when the requesting party is an application-side read-write device and the request content is application-side authorization, namely: the application end authorization code is only opened to the appointed label application manufacturer;
S304, the application end read-write device writes the application end authorization code into a read-only memory module of the incident frequency chip; in some embodiments of the present application, the application-side authorization code is written into a PROM area of the audio chip, where the PROM area is a programmable read-only memory area, and the area allows writing only once, that is, a one-time programmable read-only memory area; it can be appreciated that, as another implementation manner, the application-side authorization code may also be written into an EEPROM area of the audio chip, where the EEPROM area is an electrically-charged erasable programmable read-only memory area, and data is not lost after power is turned off;
S305, the radio frequency chip automatically generates a tag identity code; the tag identification code is generated by calculating a factory identification code and an application authorization code by using a first algorithm.
The step of applying the electronic tag to a product further comprises: the server verifies the identity of the read-write device of the application end; if the identity verification of the application-side read-write device is passed, the server is kept in remote communication connection with the application-side read-write device; if the identity verification of the application-side read-write device is not passed, the server shields the application-side read-write device;
The step of verifying the identity of the read-write device of the application end by the server comprises the following steps:
the server is matched with the application end read-write device in advance according to a label application manufacturer, and the matched information is written into a database; the matching information comprises identity verification information of the reading and writing device of the application end;
After the application end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed application end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device of the application end; if the pre-stored matching information in the database has the identity verification information of the application-side read-write device which is matched with the identity information of the currently accessed application-side read-write device, the verification of the application-side read-write device is passed; if the pre-stored matching information in the database does not have the application end read-write device identity verification information matched with the identity information of the currently accessed application end read-write device, the verification of the application end read-write device is not passed.
Further, the step of applying the electronic tag to a product further includes: the anti-counterfeiting traceability system carries out self-test on the electronic tag; the step of the anti-fake traceability system for carrying out self-test on the electronic tag comprises the following steps:
The application end read-write device extracts the production authorization code, the application authorization code and the signature of the electronic tag and sends the production authorization code, the application authorization code and the signature to the server as self-test information of the electronic tag;
The server stores electronic tag verification information; the server is provided with a second algorithm which is the same as the first algorithm; after receiving the electronic tag self-test information, the server analyzes the electronic tag self-test information through a second algorithm, and compares the calculation result with prestored electronic tag verification information; if the result is consistent, the electronic tag passes the self-test; if the two values do not match with each other, the electronic tag does not pass the self-test;
the server writes the self-test result into a database, and displays the self-test result on a server interface for subsequent processing by a server staff.
As shown in fig. 9, the step of checking the product anti-counterfeiting traceability information through the radio frequency verification terminal includes:
S401, establishing radio frequency communication connection between the radio frequency verification terminal and the electronic tag;
s402, the electronic tag generates a dynamic verification data packet and sends the dynamic verification data packet to the radio frequency verification terminal; the content of the dynamic verification data packet comprises a tag identity code, a production authorization code, an application end authorization code, a dynamic code and a signature; the signature is generated by calculating a tag identity code, a production authorization code, an application authorization code and a dynamic code by using a first algorithm; the dynamic verification data packet does not comprise a unique identification code of the electronic tag;
S403, the radio frequency verification terminal reads the dynamic verification data packet to acquire a remote communication protocol and establishes remote communication connection with a server;
S404, the radio frequency verification terminal sends the dynamic verification data packet to a server and sends a verification request to the server;
S405, the server verifies according to the received dynamic verification data packet and transmits the verification result to the frequency verification terminal.
As a first example, the first algorithm is the MD5 information summarization algorithm,
The calculation formula of the factory identity code is as follows: SID1 = MD5 (UID + PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = MD5 (sid1+ac);
The calculation formula of the signature is as follows: sign=md5 (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
As a second example, the first algorithm is a SHA secure hash algorithm,
The calculation formula of the factory identity code is as follows: sid1=sha (uid+pkey);
the calculation formula of the tag identity identification code is as follows: SID2 = SHA (sid1+ac);
the calculation formula of the signature is as follows: sign=sha (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
As a third embodiment, the first algorithm is an encryption algorithm:
the calculation formula of the factory identity code is as follows: sid1=encrypt (UID, PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = Encrypt (SID 1, AC);
The calculation formula of the signature is as follows:
Sign=Encrypt[(SID2+PKey+AC+RC),PKey];
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
In the description of the present specification, the descriptions of the terms "one implementation," "some implementations," "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is a further detailed description of the application in connection with specific embodiments, and it is not intended that the application be limited to such description. It will be apparent to those skilled in the art that several simple deductions or substitutions can be made without departing from the spirit of the application.
Claims (6)
1. An anti-counterfeiting tracing method based on an electronic tag is characterized by comprising the following steps:
preparing an electronic tag;
applying the electronic tag to a product;
Checking the product anti-counterfeiting traceability information through a radio frequency verification terminal;
the electronic tag comprises a radio frequency chip, and the step of preparing the electronic tag comprises the following steps:
the production end read-write device establishes remote communication connection with a server;
Writing a unique identification code of the radio frequency chip in a chip circuit of the radio frequency chip; the unique identification code chip is readable and the external software and hardware are not readable and writable; the unique identification code participates in the internal operation of the radio frequency chip only according to a preset rule and is not disclosed externally;
Writing a first algorithm in the radio frequency chip;
the production end read-write device sends a production end authorization request to the server; the production end authorization request comprises a request server for configuring a production authorization code and allowing the production authorization code to be written into an audio chip;
The server receives the production end authorization request, configures a production authorization code and transmits the production authorization code to the production end read-write device; the server is preset with a production end authorization configuration program which is started only when a requester is a production end read-write device and the request content is production end authorization, and the production authorization code is only opened to a designated label manufacturer;
the production end read-write device writes the production authorization code into a read-only memory module of the video chip;
the radio frequency chip automatically generates a factory identity code; the factory identity code is generated by calculating a unique identification code and a production authorization code by using a first algorithm; before the electronic tag is applied, the factory identity code is used as a unique external identity code of the electronic tag;
The step of applying the electronic tag to a product comprises:
the application end read-write device establishes remote communication connection with the server;
the application end read-write device sends an application end authorization request to the server; the application end authorization request comprises a request server for configuring an application end authorization code and allowing writing into an audio chip;
The server receives the application end authorization request, configures an application end authorization code and transmits the application end authorization code to the application end read-write device;
The application end read-write device writes the application end authorization code into a read-only memory module of the incident frequency chip;
the radio frequency chip automatically generates a tag identity code; the label identity code is generated by calculating a factory identity code and an application authorization code by using a first algorithm; after the electronic tag is arranged on the product to be anti-counterfeiting, the tag identity code is used as the unique external identity code of the electronic tag, namely the product to be anti-counterfeiting;
the step of checking the product anti-counterfeiting traceability information through the radio frequency verification terminal comprises the following steps of:
the radio frequency verification terminal establishes radio frequency communication connection with the electronic tag;
The electronic tag generates a dynamic verification data packet and sends the dynamic verification data packet to the radio frequency verification terminal; the dynamic verification data packet does not comprise a unique identification code of the electronic tag;
The radio frequency verification terminal reads the dynamic verification data packet to acquire a remote communication protocol and establishes remote communication connection with the server;
The radio frequency verification terminal sends the dynamic verification data packet to the server and sends a verification request to the server;
the server verifies according to the received dynamic verification data packet and transmits a verification result to the frequency verification terminal;
The dynamic verification data packet comprises a production authorization code, an application authorization code, a tag identity identification code, a dynamic code and a signature of the electronic tag; the signature is generated by calculating a tag identity code, a factory authorization code, an application authorization code and a dynamic code by using a first algorithm;
the first algorithm is an MD5 information summarization algorithm,
The calculation formula of the factory identity code is as follows: SID1 = MD5 (UID + PKey);
the calculation formula of the tag identity identification code is as follows: SID2 = MD5 (sid1+ac);
the calculation formula of the signature is as follows: sign=md5 (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc;
Or, the first algorithm is SHA secure hash algorithm,
The calculation formula of the factory identity code is as follows: sid1=sha (uid+pkey);
the calculation formula of the tag identity identification code is as follows: SID2 = SHA (sid1+ac);
the calculation formula of the signature is as follows: sign=sha (sid2+ pkey+ac+rc);
the output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc;
Or, the first algorithm is an encryption algorithm:
the calculation formula of the factory identity code is as follows: sid1=encrypt (UID, PKey);
The calculation formula of the tag identity identification code is as follows: SID2 = Encrypt (SID 1, AC);
The calculation formula of the signature is as follows:
Sign=Encrypt[(SID2+PKey+AC+RC),PKey];
The output parameter form of the signature is as follows: sid=sid2 & Sign =sign & rc=rc.
2. The electronic tag-based anti-counterfeiting traceability method according to claim 1, wherein the step of preparing the electronic tag further comprises: the server verifies the identity of the read-write device at the production end; if the identity verification of the production end read-write device is passed, the server is kept in remote communication connection with the production end read-write device; if the identity verification of the production end read-write device is not passed, the server shields the production end read-write device.
3. The anti-counterfeiting tracing method based on the electronic tag according to claim 2, wherein the step of verifying the identity of the production-side read-write device by the server comprises the following steps:
the server is matched with the production end read-write device in advance according to a label manufacturer and writes matching information into a database; the matching information comprises the identity verification information of the read-write device at the production end;
after the production end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed production end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device at the production end; if the pre-stored matching information in the database has the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the production end read-write device passes the verification; if the pre-stored matching information in the database does not have the production end read-write device identity verification information matched with the identity information of the currently accessed production end read-write device, the verification of the production end read-write device is not passed.
4. The electronic tag-based anti-counterfeiting traceability method according to claim 1, wherein the step of applying the electronic tag to a product further comprises: the server verifies the identity of the read-write device of the application end; if the identity verification of the application-side read-write device is passed, the server is kept in remote communication connection with the application-side read-write device; if the identity verification of the application-side read-write device is not passed, the server shields the application-side read-write device.
5. The anti-counterfeiting traceability method based on the electronic tag according to claim 4, wherein the step of verifying the identity of the application-side read-write device by the server comprises the steps of:
the server is matched with the application end read-write device in advance according to a label application manufacturer, and the matched information is written into a database; the matching information comprises identity verification information of the reading and writing device of the application end;
After the application end read-write device establishes a remote communication connection with a server, the server extracts the identity information of the accessed application end read-write device;
The server verifies the identity of the read-write device according to the extracted identity information of the read-write device of the application end; if the pre-stored matching information in the database has the identity verification information of the application-side read-write device which is matched with the identity information of the currently accessed application-side read-write device, the verification of the application-side read-write device is passed; if the pre-stored matching information in the database does not have the application end read-write device identity verification information matched with the identity information of the currently accessed application end read-write device, the verification of the application end read-write device is not passed.
6. The electronic tag-based anti-counterfeiting traceability method according to claim 1, wherein the step of applying the electronic tag to a product further comprises: the anti-counterfeiting traceability system carries out self-test on the electronic tag;
the step of the anti-fake traceability system for carrying out self-test on the electronic tag comprises the following steps:
The application end read-write device extracts the production authorization code, the application authorization code and the signature of the electronic tag and sends the production authorization code, the application authorization code and the signature to the server as self-test information of the electronic tag;
The server stores electronic tag verification information; the server is provided with a second algorithm which is the same as the first algorithm; after receiving the electronic tag self-test information, the server analyzes the electronic tag self-test information through a second algorithm, and compares the analysis result with prestored electronic tag verification information; if the result is consistent, the electronic tag passes the self-test; if the two values do not match with each other, the electronic tag does not pass the self-test;
And the server writes the self-test result into a database and displays the self-test result on a server interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110165211.0A CN112801677B (en) | 2021-02-06 | 2021-02-06 | Anti-counterfeiting tracing method based on electronic tag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110165211.0A CN112801677B (en) | 2021-02-06 | 2021-02-06 | Anti-counterfeiting tracing method based on electronic tag |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112801677A CN112801677A (en) | 2021-05-14 |
CN112801677B true CN112801677B (en) | 2024-09-10 |
Family
ID=75814562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110165211.0A Active CN112801677B (en) | 2021-02-06 | 2021-02-06 | Anti-counterfeiting tracing method based on electronic tag |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112801677B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113344593B (en) * | 2021-05-31 | 2022-04-26 | 优合集团有限公司 | Meat product traceability management system based on DNA detection technology |
CN115953957A (en) * | 2023-03-10 | 2023-04-11 | 立芯科技股份有限公司 | Ink screen display system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436596A (en) * | 2011-11-08 | 2012-05-02 | 北京博大光通国际半导体技术有限公司 | Commodity anti-counterfeiting tracing system and method based on radio frequency active RFID technology |
CN103955839A (en) * | 2014-05-13 | 2014-07-30 | 许发旺 | Anti-fake traceability system, method and platform based on RFID |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1588386B (en) * | 2004-08-02 | 2011-08-24 | 上海质尊电子科技有限公司 | System and method for realizing article information detection by radio frequency identification and mobile communication combination |
CN100405386C (en) * | 2006-09-30 | 2008-07-23 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
CN101763526B (en) * | 2010-01-28 | 2012-06-13 | 上海华申智能卡应用系统有限公司 | Radio frequency tag capable of controlling read-write and monitoring method thereof |
CN102063633A (en) * | 2010-03-26 | 2011-05-18 | 广州信睿网络科技有限公司 | Anti-counterfeiting method based on radio frequency identification technology |
CN102456148A (en) * | 2010-10-27 | 2012-05-16 | 善存科技股份有限公司 | Authorization identifying and managing system and anti-counterfeiting method thereof |
CN102955958A (en) * | 2011-08-31 | 2013-03-06 | 北京中电华大电子设计有限责任公司 | Anti-counterfeiting method and system based on radio frequency identification technology |
CN108573384B (en) * | 2018-03-07 | 2022-05-06 | 北京安讯奔科技有限责任公司 | Product with double identification codes and product tracing anti-counterfeiting verification method and device |
US11568424B2 (en) * | 2018-10-18 | 2023-01-31 | CPI Card Group—Colorado, Inc. | Method and system for product authentication |
CN111241858B (en) * | 2018-11-29 | 2023-07-18 | 北京航空航天大学苏州创新研究院 | High-efficiency global space-time coding read-write system and read-write method |
CN111210229A (en) * | 2019-12-27 | 2020-05-29 | 绍兴心越科技有限公司 | Product circulation authenticity verification method |
CN111612484A (en) * | 2020-04-09 | 2020-09-01 | 李梦宇 | Block chain logistics traceability system |
CN211529202U (en) * | 2020-04-14 | 2020-09-18 | 深圳市哈深智材科技有限公司 | Commodity anti-counterfeiting traceability system |
-
2021
- 2021-02-06 CN CN202110165211.0A patent/CN112801677B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436596A (en) * | 2011-11-08 | 2012-05-02 | 北京博大光通国际半导体技术有限公司 | Commodity anti-counterfeiting tracing system and method based on radio frequency active RFID technology |
CN103955839A (en) * | 2014-05-13 | 2014-07-30 | 许发旺 | Anti-fake traceability system, method and platform based on RFID |
Also Published As
Publication number | Publication date |
---|---|
CN112801677A (en) | 2021-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
EP2893736B1 (en) | Method, apparatus, and system for providing and using a trusted tag | |
US10019530B2 (en) | ID tag authentication system and method | |
CN104217327A (en) | Financial IC (integrated circuit) card Internet terminal and trading method thereof | |
CN104680389A (en) | NFC mobile phone terminal anti-fake system and method based on time encryption | |
CN104281954A (en) | Anti-counterfeiting method for product | |
CN112801677B (en) | Anti-counterfeiting tracing method based on electronic tag | |
CN103955733B (en) | Electronic identity card chip card, card reader and electronic identity card verification system and method | |
CN103501191A (en) | Mobile payment device and method thereof based on NFC technology | |
WO2021218166A1 (en) | Contract signing method and apparatus, device and computer-readable storage medium | |
CN102855574A (en) | Method and system for identifying commodity information based on NFC (Near Field Communication) | |
US12069173B2 (en) | Key recovery based on contactless card authentication | |
US11902442B2 (en) | Secure management of accounts on display devices using a contactless card | |
BR112021005150A2 (en) | data transmission system, method of guiding a transmission device, and receiving application | |
WO2021133498A1 (en) | Authentication for third party digital wallet provisioning | |
KR100512064B1 (en) | contactless type communication tag and portable tag reader for verifying a genuine article | |
CN116783864A (en) | Secure verification of medical status using contactless cards | |
US20230252451A1 (en) | Contactless card with multiple rotating security keys | |
CN107483427B (en) | Self-enhanced anti-counterfeiting method based on Ntag21X series chips | |
CN112862047B (en) | Dual-authorization intelligent anti-counterfeit label generation method | |
CN104094274A (en) | Method for personalizing security module for smart meter or smart meter gateway | |
CN103281182B (en) | Conversion equipment and display system | |
CN204066182U (en) | A kind of financial IC card internet terminal | |
CN215987352U (en) | Intelligent anti-counterfeit label and application product thereof | |
KR101626962B1 (en) | Transaction System of Card Information and Encryption/Decryption Server therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |