[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103544617B - Anti-counterfeiting system - Google Patents

Anti-counterfeiting system Download PDF

Info

Publication number
CN103544617B
CN103544617B CN201310084977.1A CN201310084977A CN103544617B CN 103544617 B CN103544617 B CN 103544617B CN 201310084977 A CN201310084977 A CN 201310084977A CN 103544617 B CN103544617 B CN 103544617B
Authority
CN
China
Prior art keywords
key
server
embedded devices
instruction
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310084977.1A
Other languages
Chinese (zh)
Other versions
CN103544617A (en
Inventor
J·H·高
高潮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUBEI SANHE BUILDING MATERIAL TECHNOLOGY DEVELOPMENT CO., LTD.
Original Assignee
HUBEI SANHE BUILDING MATERIAL TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUBEI SANHE BUILDING MATERIAL TECHNOLOGY DEVELOPMENT Co Ltd filed Critical HUBEI SANHE BUILDING MATERIAL TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201310084977.1A priority Critical patent/CN103544617B/en
Publication of CN103544617A publication Critical patent/CN103544617A/en
Application granted granted Critical
Publication of CN103544617B publication Critical patent/CN103544617B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an anti-counterfeiting system which comprises mobile equipment, a server and an embedded device which are in wire connection with one another. The embedded device is embedded in a product package and comprises a transmitter/receiver and a microprocessor. The mobile equipment transmits product information to the server. The server generates a key curve according to the product information, the key patterns corresponding to the product and saved in the server, and the encryption algorithm and transmits the key curve along with an instruction. The server transmits feedback information to the mobile equipment according to the instruction. The transmitter/receiver of the embedded device receives the key curve and the instruction. The microprocessor generates key patterns of the key curve according to the decryption algorithm, and compares the generated key patterns with the key patterns pre-saved in the embedded device, and if the key patterns generated by decryption are identical with the key patterns pre-saved in the embedded device, the embedded device executes the operation corresponding to the instruction.

Description

A kind of Antiforge system
Technical field
The present invention relates to a kind of Antiforge system, particularly relate to one and utilize radio communication and multidate information to add secret skill The Antiforge system of art.
Background technology
M2M/D2D(machine to machine, or machine is interactive) it is a technology application risen, it It is to utilize wireless signal, completes two or more machine/set especially by cell phone network or WiFi network Interaction between Bei, Remote realizes the function of machine/apparatus.The application of low side M2M such as intelligence man Occupy, control the unclassified machinery equipments such as air-conditioning, refrigerator, electromagnetic oven with mobile phone remote regulation.When When M2M/D2D is applied to safety equipment or valuable product anti-counterfeit field, signal encryption and interactive encryption are one Individual key issue.Affected by cost, power consumption and microprocessor arithmetic speed, a lot of conventional encryption sides Case, such as RSA cryptographic algorithms, is very restricted in the application of M2M.
Summary of the invention
It is an object of the invention to provide a kind of reliability height, low cost, M2M that power consumption is low add cipher telegram Sub-Antiforge system, can be used for the anti-fake check of valuable product.
The purpose of the present invention is realized, including mobile device, server and embedded device by a kind of Antiforge system Part, the wireless connections each other of described mobile device, server and embedded devices;Described embedded devices embeds Product pack in and include transmission/receptor and microprocessor;Wherein said mobile device is to described server Send product information;Described server is according to the key corresponding to this product preserved in product information and server Spoon figure generates secret key curve by AES and sends together with instruction;Meanwhile, described server according to Described instruction sends feedback information to described mobile device;The transmission of described embedded devices/receptor receives institute Stating secret key curve and instruction, the secret key curve received is generated key figure by decipherment algorithm by described microprocessor Shape also compares with the key figure being pre-stored in embedded devices, if the key figure that deciphering generates Shape is identical with the key figure pre-saved, and the most described embedded devices performs the behaviour corresponding to described instruction Make.
In a preferred embodiment, described AES includes: in the key figure corresponding to product with preservation Any point be fulcrum, calculate distance r to this fulcrum of the every bit in key graph edge boundary line;With key That starting to calculate r in spoon graph edge boundary line at first be the first point on boundary line, calculating key graph edge Every bit in boundary line to described first, length L along boundary line, i.e. r is that accumulation border is long The function of degree L, thus draw a r-L curve and i.e. generate a group key curve;And described decipherment algorithm bag Include: according to selected fulcrum and the first point, reversely generate key figure with r-L curve.
In a preferred embodiment, described instruction is one of the following or multiple: a) send to described mobile device Product is for really confirming message;B) sound equipment or visual signal are sent.
In a preferred embodiment, described embedded devices also includes that microcontroller and sound equipment or visual signal occur Device;When described instruction is or includes sending sound equipment or visual signal, sound equipment described in described microprocessor controls Or visual signal generator sends corresponding sound equipment or visual signal.
In a preferred embodiment, when described product packaging is opened, described embedded devices is to described server The information that sends is to nullify the embedded devices in this product packaging.
The M2M/D2D Antiforge system of the present invention can ensure that the accuracy of false proof examination.Use preventing of the present invention Antiforge system, personator is difficult to be said to be genuine by forgery M2M device signal by false pain product or interference is true The identification of product.
Accompanying drawing explanation
The present invention will below with reference to accompanying drawing, combine preferred implementation and illustrate in greater detail.
Fig. 1 is the block diagram of the Antiforge system according to the present invention.
Fig. 2 is the schematic diagram of dynamic encryption.
For clarity, these accompanying drawings are schematically figure, and they only give for understanding institute of the present invention Necessary details, and omit other details.
By detailed description given below, the further scope of application of the present invention will be apparent to.But, Should be appreciated that, while detailed description and object lesson show the preferred embodiment of the present invention, they are only and say Being given of improving eyesight.For a person skilled in the art, can exist apparently from detailed description below Variations and modifications are carried out in the spirit and scope of the present invention.
Detailed description of the invention
Fig. 1 shows an embodiment of Antiforge system of the present invention, including mobile device such as mobile phone 1, server 2 and embedded devices 3, mobile phone 1, server 2 and embedded devices 3 are each other by cell phone network or WiFi Network wireless connects;Mobile phone is carried by consumer, and embedded devices is embedded in product packaging, server position At production manufacturer.Embedded devices 3 includes transmission/receptor 31 and microprocessor 32.Work as consumption When whether person wants the product checking it to buy to be certified products, it is short that consumer utilizes its mobile phone 1 to send an inquiry Letter is such as the server 2 of product serial number to manufacturer.After server 2 receives this product serial number, server 2 Press AES according to the key figure corresponding to this product preserved in product serial number and server and generate secret key song Line also sends jointly to the embedded devices corresponding to this product together with instruction, instructs as instruction embedded devices Product is sent for really confirming message to the mobile phone inquiring about this product;Meanwhile, server sends product to mobile phone On embedded devices will be sent to the feedback information that product is genuine message;The transmission of embedded devices/connect Receiving device 31 and receive secret key curve and instruction, microprocessor 32 is by raw by decipherment algorithm for the secret key curve received Become key figure and compared by pattern recognition with the key figure being pre-stored in embedded devices, If the key figure that deciphering generates is identical with the key figure pre-saved, then embedded devices is sent out to mobile phone Sending product is really to confirm message.When product packaging is opened, embedded devices therein sends to server One information is to nullify the embedded devices in this product packaging, it is to avoid occur that true packaging, the situation of false pain product are sent out Raw.If fruit product is false, user mobile phone can not receive confirmation message or receives the note that vendor server is sent Inform product serial number mistake.
As shown in Figure 2, above mentioned secret key curve so generates: with corresponding to of preserving in server Point M in the key figure of this product is fulcrum, calculates the every bit in key graph edge boundary line to this fulcrum Distance r of M;Start at first in key graph edge boundary line that A calculating r as boundary line on A bit, calculate the every bit in key graph edge boundary line to first A, length L along boundary line, That is, r is the function of accumulation boundary length L, thus draws a r-L curve and i.e. generate key curve, as Shown in the curve of Fig. 2 middle and upper part.Another is inquired about, the some N in key figure can elect as fulcrum, and with Point A is the first point, thus generates another key curve, and as shown in the curve of Fig. 2 middle and lower part, the rest may be inferred. Decipherment algorithm, according to selected fulcrum and the first point, reversely generates key figure with r-L curve, for in advance The key graphics Web publishing first preserved.So, key curve is becoming all the time, thus realizes dynamic encryption, is difficult to Crack.Dynamic Signal encryption transfers and processes most important, and otherwise personator can be by forging M2M device False pain product are said to be really by signal, or the identification of interference real childbirth product, destroy false proof utilization.
In another embodiment, in addition to the element that preceding embodiment includes, embedded devices 3 also includes Microcontroller 33 and sound equipment/visual signal generator 34.Whether the product wanting to check it to buy when consumer During for certified products, consumer utilizes its mobile phone to send the short message enquiry such as product serial number server to manufacturer 2.After server 2 receives this product serial number, server 2 is right according to preserve in product serial number and server Should in the key figure of this product by AES generate secret key curve and together with instruction send jointly to corresponding to The embedded devices of this product, instructs and sends a certain sound equipment or visual signal for instruction embedded devices;With Time, the embedded devices that server sends on product to mobile phone will send the feedback of which kind of sound equipment or visual signal Information;Transmission/the receptor 31 of embedded devices receives secret key curve and instruction, and microprocessor 32 will be connect Receive secret key curve by decipherment algorithm generate key figure and with the key figure being pre-stored in embedded devices Shape is compared by pattern recognition, if the key figure of deciphering generation and the key figure phase pre-saved With, then microcontroller 33 controls sound equipment or visual signal generator 34 sends corresponding sound equipment or vision letter Number.When product packaging is opened, embedded devices therein sends an information to nullify this product to server Embedded devices in packaging.If user can't hear or can't see corresponding sound equipment or visual signal, then illustrate Product is false.
In another embodiment, the key curve generated in server and instruction are also not directly sent to corresponding Embedded devices, and it is destined to the mobile phone of user, the mobile phone of user is again by junction service such as Bluetooth Or key curve and instruction are transmitted to embedded devices by Zigbee, it is then inserted into formula device as other embodiments In be equally operated.Owing to using junction service, the cost of Antiforge system between mobile phone and embedded devices Can be reduced further.
Some preferred embodiments are in explanation made above, it should be emphasized, however, that the present invention is not subject to The restriction of these embodiments, but can realize with the alternate manner in the theme of claim restriction.

Claims (8)

1. an Antiforge system, including mobile device, server and embedded devices, described movement sets Standby, server and embedded devices wireless connections each other;Described embedded devices is embedded in product packaging also Including transmission/receptor and microprocessor;Wherein
Described mobile device sends product information to described server;
Described server according in product information and server preserve the key figure corresponding to this product by adding Close algorithm generates secret key curve and sends together with instruction;Meanwhile, described server according to described instruction to Described mobile device sends feedback information;
The transmission of described embedded devices/receptor receives described secret key curve and instruction, and described microprocessor will The secret key curve received by decipherment algorithm generate key figure and with the key being pre-stored in embedded devices Spoon figure compares, if the key figure that deciphering generates is identical with the key figure pre-saved, then and institute State embedded devices and perform the operation corresponding to described instruction;
Wherein said AES includes:
With any point in the key figure corresponding to product preserved as fulcrum, calculate key graphic limit Every bit on line is to distance r of this fulcrum;
Start at first to calculate in key graph edge boundary line that of r as boundary line on the first point, calculate key Every bit in spoon graph edge boundary line to described first, length L along boundary line, i.e. r is tired The function of long-pending boundary length L, thus draw a r-L curve and i.e. generate a group key curve;And
Described decipherment algorithm includes: according to selected fulcrum and the first point, reversely generate key with r-L curve Figure.
Antiforge system the most according to claim 1, wherein key figure relatively pass through pattern recognition Complete.
Antiforge system the most according to claim 1, wherein said instruction is one of the following or multiple: A) product is sent for really confirming message to described mobile device;B) sound equipment or visual signal are sent.
Antiforge system the most according to claim 1, wherein said feedback information includes: 1) about inciting somebody to action Which kind of can receive and confirm the information of message;Or 2) sound equipment that will send about described embedded devices or regard The message of feel signal;Or a combination thereof.
Antiforge system the most according to claim 3, described embedded devices also include microcontroller and Sound equipment or visual signal generator;When described instruction is or includes sending sound equipment or visual signal, described micro- Controller controls described sound equipment or visual signal generator sends corresponding sound equipment or visual signal.
Antiforge system the most according to claim 1, wherein when described product packaging is opened, described Embedded devices sends an information to nullify the embedded devices in this product packaging to described server.
Antiforge system the most according to claim 1, the key curve that wherein said server generates is even It is transmitted directly to described embedded devices with instruction.
Antiforge system the most according to claim 1, the key curve that wherein said server generates is even First it is sent to described mobile device with instruction, then is transmitted to described embedded devices by described mobile device.
CN201310084977.1A 2013-03-15 2013-03-15 Anti-counterfeiting system Expired - Fee Related CN103544617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310084977.1A CN103544617B (en) 2013-03-15 2013-03-15 Anti-counterfeiting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310084977.1A CN103544617B (en) 2013-03-15 2013-03-15 Anti-counterfeiting system

Publications (2)

Publication Number Publication Date
CN103544617A CN103544617A (en) 2014-01-29
CN103544617B true CN103544617B (en) 2017-01-11

Family

ID=49968045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310084977.1A Expired - Fee Related CN103544617B (en) 2013-03-15 2013-03-15 Anti-counterfeiting system

Country Status (1)

Country Link
CN (1) CN103544617B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412728A (en) * 2001-10-11 2003-04-23 黄涛 Electronic digital code antifalse technique of electromechanical products and its application system
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
CN101018125A (en) * 2007-03-02 2007-08-15 中兴通讯股份有限公司 Radio terminal security network and card locking method based on the ellipse curve public key cipher
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN201489578U (en) * 2009-09-03 2010-05-26 九江职业大学 Wireless automatic anti-fake system
CN102054308A (en) * 2009-10-30 2011-05-11 上海工程技术大学 Digital watermark anti-counterfeit method for railway ticket based on mobile phone terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040174998A1 (en) * 2003-03-05 2004-09-09 Xsides Corporation System and method for data encryption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412728A (en) * 2001-10-11 2003-04-23 黄涛 Electronic digital code antifalse technique of electromechanical products and its application system
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
CN101018125A (en) * 2007-03-02 2007-08-15 中兴通讯股份有限公司 Radio terminal security network and card locking method based on the ellipse curve public key cipher
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN201489578U (en) * 2009-09-03 2010-05-26 九江职业大学 Wireless automatic anti-fake system
CN102054308A (en) * 2009-10-30 2011-05-11 上海工程技术大学 Digital watermark anti-counterfeit method for railway ticket based on mobile phone terminal

Also Published As

Publication number Publication date
CN103544617A (en) 2014-01-29

Similar Documents

Publication Publication Date Title
MX2021002836A (en) Systems and methods for cryptographic authentication of contactless cards.
CN102315942B (en) Security terminal with Bluetooth and communication method thereof of security terminal and client end
CN103905187B (en) A kind of network service encryption method based on content
CN106603485A (en) Secret key negotiation method and device
RU2015118109A (en) Wireless communication system
WO2014198903A3 (en) Device and method for controlling a lighting means
CN102722921A (en) Access control system
CN103875006A (en) Radio frequency identification technology incorporating cryptographics
CN110224822B (en) Key negotiation method and system
CN103067161B (en) A kind of cryptographic key distribution method and system
CN104270244A (en) NFC encryption method and system
KR102022707B1 (en) Non contact type power transmission apparatus, mobile terminal, server and service system based location using the same
WO2015178226A1 (en) Wireless communication system, beacon device and wireless communication method
CN103905183A (en) Method for improving safety of communication transmission of embedded encryption chip
CN105357007A (en) Encryption communication method and communication terminal
MX2021002904A (en) Systems and methods for cryptographic authentication of contactless cards.
IL203260A (en) Mac code verification without disclosure
CN108809954A (en) The methods, devices and systems of data transmission
CN106302514A (en) The dynamic encrypting method of memory card and decryption method and device thereof
CN101895871A (en) Method, server and system for card writing over air and telecom smart card
CN104903907A (en) System and method for securing data exchange, portable user object and remote device for downloading data
CN106452752B (en) Method, system and the client of Modify password, server and smart machine
CN103544617B (en) Anti-counterfeiting system
CN105228087A (en) Based on the mobile payment encryption method of near-field communication
MY138993A (en) Multiple pairing control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: J, H, Gao

Inventor after: Gao Chao

Inventor before: Gao Chao

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: GAO CHAO TO: J. H. GAO GAO CHAO

GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right

Effective date of registration: 20161219

Address after: West Industrial Park, Xiaogan hi tech Development Zone, Hubei, China

Applicant after: HUBEI SANHE BUILDING MATERIAL TECHNOLOGY DEVELOPMENT CO., LTD.

Address before: American California

Applicant before: Gao Chao

TA01 Transfer of patent application right
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170111

Termination date: 20200315