[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105871860A - Method for quality product verification of shoes based on WIFI - Google Patents

Method for quality product verification of shoes based on WIFI Download PDF

Info

Publication number
CN105871860A
CN105871860A CN201610244707.6A CN201610244707A CN105871860A CN 105871860 A CN105871860 A CN 105871860A CN 201610244707 A CN201610244707 A CN 201610244707A CN 105871860 A CN105871860 A CN 105871860A
Authority
CN
China
Prior art keywords
client
server
focus
authentication result
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610244707.6A
Other languages
Chinese (zh)
Inventor
徐美琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shishi Ruifang Textile Trading Co Ltd
Original Assignee
Shishi Ruifang Textile Trading Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shishi Ruifang Textile Trading Co Ltd filed Critical Shishi Ruifang Textile Trading Co Ltd
Priority to CN201610244707.6A priority Critical patent/CN105871860A/en
Publication of CN105871860A publication Critical patent/CN105871860A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Accounting & Taxation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Toxicology (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for quality product verification of shoes based on WIFI. The method is applied between a client, a hotspot and a server. The bottom of a shoe is provided with a two-dimensional code, the two-dimensional code is provided with a password covering film, the hotspot has a unique first encryption method, and the server has a first decryption method corresponding to the first encryption method. The method comprises the steps that the client establishes connection with the hotspot through a WIFI module connected with the client; the client sends a random number to the hotpot; and verification information is obtained after the hospot performs encryption operation on the random number. According to the technical scheme, whether a product is a quality product can be verified through the server.

Description

A kind of shoes certified products verification method based on WIFI
Technical field
The present invention relates to textile certified products verification technique field, particularly relate to a kind of shoes certified products verification method based on WIFI.
Background technology
Existing shoes there is also counterfeit situation, and consumer is difficult to differentiate.And the method that shoes there is no checking.Some verification methods also rest on above note or phone, and checking cost is the highest.Existing WIFI becomes more and more popular, everybody all with, a device that can provide WIFI signal is exactly focus.Mobile phone is more universal, carries out checking by free WIFI and can greatly reduce cost.
Summary of the invention
For this reason, it may be necessary to provide a kind of shoes certified products verification method based on WIFI, solve the problem that existing shoes certified products checking cost is high.
For achieving the above object, inventor provide a kind of shoes certified products verification method based on WIFI, it is applied between client, focus and server, Quick Response Code it is provided with bottom shoes, Quick Response Code is provided above with password and scrapes overlay film, and focus has unique first encryption method, and server has the first decryption method corresponding with the first encryption method, it is characterized in that, this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start camera and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result be returned to client after server authentication 2 D code information.
Further, having unique second encryption method between server, client has second decryption method corresponding with the second encryption method, wherein:
When client sends authentication information to server, client sends client identification information to server;
After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;
Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;
If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;
Otherwise, then the connection between focus is disconnected.
Further, client sends and the information of reception server includes: client is sent by mobile phone radio frequency module and receives server info.
Further, before this method starts, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.
Further, also comprise the steps: to detect focus signal strength signal intensity, after focus signal strength signal intensity is less than preset value, disconnects the connection with focus and delete hot information.
Being different from prior art, technique scheme passes through server, it is possible to achieve the whether checking of the certified products of clothes, and server first demonstrates the uniqueness certification of focus simultaneously, it is ensured that focus is that safety is the most legal.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, it is explained in detail below in conjunction with specific embodiment.
Present embodiments providing a kind of shoes certified products verification method based on WIFI, be applied between client, focus and server, client can be mobile phone or notebook client.Being provided with Quick Response Code bottom shoes, Quick Response Code is provided above with password and scrapes overlay film, i.e. scrapes password off and scrapes overlay film it can be seen that Quick Response Code, and user is verifying whether that certified products can be scraped overlay film verify Quick Response Code by scraping password off.Focus has unique first encryption method, i.e. the most different from other focuses, can carry out uniqueness association by the identification information of focus.Server has the first decryption method corresponding with the first encryption method.
This method comprises the steps: that client is typically mounted in operating system, and operating system has certified products proving program, and operating system connects WIFI module, and application program can be communicated with external program by WIFI module.
Client sets up connection by the WIFI module being attached thereto to focus;Client can show the focus that WIFI module searches, and after user clicks on focus, i.e. can set up with thermotropism point and connect.
Client sends and counts to focus at random;Client can generate a random number, this random number have various ways.Focus uses the first encryption method to be verified information after random number is encrypted computing;Checking information is i.e. the random number after encryption.
Focus replys checking information to client;Client sends focus identification information, checking information and counts to server at random.Focus identification information can be mac address information or other information of focus, if other information, can send focus identification information together to client by focus focus replys checking information to client when.
Server obtains first decryption method according to focus identification information;After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;Server replys authentication result to client;Client judges whether authentication result is passed through.
If do not passed through, then disconnect the connection between focus;If passed through, then start camera and start to scan Quick Response Code;Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;Certified products the result be returned to client after server authentication 2 D code information.
If passed through, then proceed to scan Quick Response Code step;If do not passed through, then disconnect the connection between focus.So, random number owing to not knowing encryption method, then can not be encrypted and obtain correct checking information by the focus falsely used, and cannot authenticate the most on the server and pass through.Then client just can disconnect and the connection of the focus falsely used, thus avoids the connection of illegal focus.Thereby may be ensured that the security of certified products the result, as long as so producer arranges the WIFI of a certified products checking in brand shop, client just can connect this WIFI and carry out certified products verification.
Focus in order to avoid falsely using directly transmits legal authentication result to client, in certain embodiments, unique second encryption method is had between server, client has second decryption method corresponding with the second encryption method, wherein: when client sends authentication information to server, client sends client identification information to server;After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;Otherwise, then the connection between focus is disconnected.So, authentication result is also the data of encryption, if the focus falsely used at will sends other legal authentication results, does not then encrypt through the second encryption method due to this authentication result, then cannot decipher and obtain correct random number and authentication result.Thus avoid the focus falsely used and arbitrarily send other legal authentication result to client, and cause the problem that client connects.
Certainly, as long as client is not by being the WIFI module acquisition that is authenticated result, just can be greatly improved the correctness of authentication result, as passed through mobile phone radio frequency module (2G, 3G, 4G communication module etc.), client sends and receives the information of server and includes: client is sent by mobile phone radio frequency module and receives server info.WIFI pattern when so the focus owing to falsely using is carried out, and mobile phone radio frequency module cannot be falsely used, then client is legal authentication result from the authentication result that mobile phone radio frequency module gets.
Many times, the focus falsely used and legal focus are in a place, for this illegal in the case of, need to remind in time user.Then before this method starts, further comprise the steps of: client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.Prompting can be carried out by dialog box or by the way of being highlighted, and user one sees such situation, will vigilance relatively when of connection.
In order to avoid connecting illegal focus elsewhere, present invention additionally comprises following steps: detection focus signal strength signal intensity, after focus signal strength signal intensity is less than preset value, disconnection and the connection of focus also delete hot information.After deleting hot information, the equipment installing client just cannot connect this hot information automatically, thus ensures safety.
Although the various embodiments described above being described; but those skilled in the art once know basic creative concept; then these embodiments can be made other change and amendment; so the foregoing is only embodiments of the invention; not thereby the scope of patent protection of the present invention is limited; every equivalent structure utilizing description of the invention content to be made or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (2)

1. a shoes certified products verification method based on WIFI, is applied to client, focus and server Between, it being provided with Quick Response Code bottom shoes, Quick Response Code is provided above with password and scrapes overlay film, and focus has uniquely The first encryption method, server has the first decryption method corresponding with the first encryption method, its feature Being, this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number To authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start camera and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result be returned to client after server authentication 2 D code information.
Shoes certified products verification method based on WIFI the most according to claim 1, it is characterised in that Having unique second encryption method between server, client has second corresponding with the second encryption method Decryption method, wherein:
When client sends authentication information to server, client sends client identification information to server;
After server obtains authentication result, obtain the second encryption method according to client identification information, use Authentication result and random number are encrypted by the second encryption method, the certification after then server replys encryption Result is to client;
Client judges, when whether authentication result is passed through, to enter authentication result initially with the second decryption method Row deciphering, it is judged that random number is the most correct and whether authentication result is passed through;
If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;
Otherwise, then the connection between focus is disconnected.
CN201610244707.6A 2016-04-19 2016-04-19 Method for quality product verification of shoes based on WIFI Pending CN105871860A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610244707.6A CN105871860A (en) 2016-04-19 2016-04-19 Method for quality product verification of shoes based on WIFI

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610244707.6A CN105871860A (en) 2016-04-19 2016-04-19 Method for quality product verification of shoes based on WIFI

Publications (1)

Publication Number Publication Date
CN105871860A true CN105871860A (en) 2016-08-17

Family

ID=56633080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610244707.6A Pending CN105871860A (en) 2016-04-19 2016-04-19 Method for quality product verification of shoes based on WIFI

Country Status (1)

Country Link
CN (1) CN105871860A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096301A (en) * 2011-10-31 2013-05-08 华为技术有限公司 Method for verifying wireless local area network access point and station for the same
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
CN104281954A (en) * 2014-04-30 2015-01-14 上海高研明鉴信息技术有限公司 Anti-counterfeiting method for product
CN105009144A (en) * 2013-12-20 2015-10-28 普乐投资有限公司 System and method for authenticity verification
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103096301A (en) * 2011-10-31 2013-05-08 华为技术有限公司 Method for verifying wireless local area network access point and station for the same
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
CN105009144A (en) * 2013-12-20 2015-10-28 普乐投资有限公司 System and method for authenticity verification
CN104281954A (en) * 2014-04-30 2015-01-14 上海高研明鉴信息技术有限公司 Anti-counterfeiting method for product
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server

Similar Documents

Publication Publication Date Title
CN105119939B (en) The cut-in method and device, providing method and device and system of wireless network
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
TW201717595A (en) Smart device, and method and apparatus for establishing bluetooth connection between devices therefor
CN105553932A (en) Method, device and system of remote control safety binding of intelligent home appliance
CN109862560B (en) Bluetooth authentication method, device, equipment and medium
US11337067B2 (en) Systems and methods for providing wireless access security by interrogation
CN105635062A (en) Network access equipment verification method and device
KR20180030192A (en) Security Authentication Methods, Configuration Methods and Related Devices
CN105636037B (en) Authentication method, device and electronic equipment
CN106559785B (en) Authentication method, device and system, access device and terminal
CN104284331B (en) A kind of method and system connecting portable WLAN hot spot
CN104935435A (en) Login methods, terminal and application server
CN110738776A (en) method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
CN105357224A (en) Intelligent household gateway register, remove method and system
CN109451504B (en) Internet of things module authentication method and system
CN111327561B (en) Authentication method, system, authentication server, and computer-readable storage medium
CN113055257B (en) Terminal equipment binding method and system based on identification code
CN105430649A (en) Wifi access method and apparatus
CN105873034A (en) Safe hot spot information processing method
CN105916147A (en) Method for shoe verification through server
CN105873035A (en) Safe AP (access point) information processing method
CN105761092A (en) Method for performing clothing verification through server
CN105871860A (en) Method for quality product verification of shoes based on WIFI
CN106162644A (en) A kind of WiFi system preventing camouflage equipment and safe verification method thereof
CN105916148A (en) Garment certified product verification method based on WIFI

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817

RJ01 Rejection of invention patent application after publication