CN206961165U - A kind of NFC Antiforge systems - Google Patents
A kind of NFC Antiforge systems Download PDFInfo
- Publication number
- CN206961165U CN206961165U CN201720710352.5U CN201720710352U CN206961165U CN 206961165 U CN206961165 U CN 206961165U CN 201720710352 U CN201720710352 U CN 201720710352U CN 206961165 U CN206961165 U CN 206961165U
- Authority
- CN
- China
- Prior art keywords
- unit
- nfc
- module
- database
- fake
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a kind of NFC Antiforge systems, including:Dynamic anti-fake unit, NFC unit and Database Unit;Dynamic anti-fake unit is added in existing NFC unit and Database Unit, and data are encrypted using private key unit in each inquiry operation and before NFC unit is transmitted for the dynamic anti-fake unit, it is decrypted after Database Unit receives data with corresponding public key module, external store system can not be monitored and kidnap the information of NFC unit transmission, with corresponding inquiry number retention module inquire about the verification of number using query counts module simultaneously, external store system is avoided to distort information, improve the security of product false proof inquiry, realize that the multidate information between NFC unit and Database Unit is false proof, it is effective to avoid NFC unit from being communicated with the information of Database Unit the risk cracked by external store system.
Description
Technical field
Near-field communication transmission field is the utility model is related to, more particularly to can realize that a kind of NFC of dynamic anti-fake is false proof
System.
Background technology
The anti-counterfeiting chip of product can pass through communication (NFC) of marching into the arena with the chip of routine use bank card or traffic IC card
Pattern communicates with other internet of things equipment, and then realizes the effect for accessing internet.But the two it is specifically used environmentally still
There is larger difference.The latter is mostly that special messenger uses, and its privacy preferably ensures, and the former typically has more people and handled, for example produces
The people that manufacturer business, whole seller, retailer, client and maintenance department etc. need or must contacted with the product.Contact should
The user of product can carry out Antiforge inquiry to the chip of the product, and therefore, the use environment of anti-counterfeiting chip is more complicated, its
NFC communication environment is easier to be invaded by attacker, and the NFC access system that user holds can not be also verified.
Attacker can be kidnapped NFC communication equipment by external store system at present, (false proof with DBS in NFC to realize
Database) communication process in monitored, selectivity is interrupted, distorts Content of Communication etc. NFC IC or DBS are missed
Lead, to realize the duplication to anti-counterfeiting chip, so as to which fake products to be bypassed to the discriminating of anti-pseudo-operation, reach the mesh mixed the spurious with the genuine
's.Even if IC (anti-counterfeiting chip)-NFC (near field communication system) two-way authentication pattern is employed, NFC open communication environment
Still the key of certification is easily revealed, therefore, it is impossible to the confidence level of NFC communication environment certainly, so as to cause simple at present use
The mode that NFC system carries out fake certification is unreliable, prior art Shortcomings.
Utility model content
In order to solve above-mentioned technical problem present in prior art, the purpose of this utility model is to provide a kind of plug-in
System can not mislead IC or DBS multidate information Antiforge system.
In order to solve the above-mentioned technical problem, technical scheme is used by the utility model:A kind of NFC Antiforge systems, bag
Include:NFC unit and Database Unit;The NFC unit is electrically connected with the Database Unit;Also include:With institute's NFC unit
The dynamic anti-fake unit of electric connection;The dynamic anti-fake unit is provided with main control module and distinguished with the main control module
Query counts module, information storage module and the private key module of electric connection;The query counts module is also deposited with described information
Module is stored up to be electrically connected with;
The Database Unit is provided with:Inquiry number corresponding with the query counts module retains module and the private
Public key module and database storage module corresponding to key module.
Preferably, the dynamic anti-fake unit is additionally provided with the generating random number mould being electrically connected with the main control module
Block.
Preferably, described information memory module is provided with erasable storage region and read-only storage region.
Preferably, the erasable region includes:Chip dynamic verification code memory block, chip inquiry number memory block.
Preferably, the read-only storage region includes:Chip number memory block, production code member memory block, manufacturer's information are deposited
Storage area.
Preferably, the Database Unit also includes:The inquiry number for retaining module electric connection with the inquiry number updates
Module.
Preferably, the database storage module includes:Dynamic verification code memory block and the dynamic being electrically connected with therewith are tested
Demonstrate,prove code renewal memory block.
Compared with prior art, NFC Antiforge systems of the present utility model, using in NFC unit and Database Unit (DBS)
In add dynamic anti-fake unit.The dynamic anti-fake unit uses in each inquiry operation and before NFC unit is transmitted
Data are encrypted private key unit, are being solved after Database Unit receives data with the public key in corresponding public key module
It is close, external store system can not be monitored and kidnap the information of NFC unit transmission.Meanwhile looked into using query counts module with corresponding
Ask number and retain the verification that module inquire about number, avoid external store system from distorting information, improve the peace of product false proof inquiry
Quan Xing, realize that the multidate information between NFC unit and Database Unit is false proof, effectively avoid NFC unit and Database Unit
The risk that is cracked by external store system of information communication.
Brief description of the drawings
Fig. 1 is the basic structure block diagram of the application NFC Antiforge systems;
Fig. 2 is the complete structure block diagram of the application NFC Antiforge systems.
Reference is:1st, NFC unit;2nd, Database Unit;21st, inquire about number and retain module;22nd, public key module;23rd, number
According to library storage module;24th, number update module is inquired about;3rd, dynamic anti-fake unit;31st, main control module;32nd, counting number module is inquired about;
33rd, information storage module;34th, private key module;35th, random number generation module.
Embodiment
Below with reference to accompanying drawing 1 to accompanying drawing 2, further elaboration is given to each embodiment of the present utility model.
As shown in Figure 1, a kind of NFC Antiforge systems, including:NFC unit 1 and Database Unit 2;NFC unit 1 and data
Library unit 2 is electrically connected with;Also include:The dynamic anti-fake unit 3 being electrically connected with institute NFC unit 1;Dynamic anti-fake unit 3 is set
Query counts module, information storage module 33 and the private key for having main control module 31 and being electrically connected with main control module 31
Module 34;Query counts module is also electrically connected with information storage module 33;Database Unit 2 is provided with:With query counts mould
Inquiry number retains module 21, public key module 22 corresponding with private key module 34 and database storage module 23 corresponding to block.
Specifically, NFC unit 1 includes radial coil and identification driving chip.
Database Unit 2 is sets up database server in a network and set by the terminal of the network access server
Standby, the terminal device can realize data exchange by near-field communication and NFC unit 1.
Dynamic anti-fake unit 3 is connected with NFC unit 1, and the data that will be sent to NFC unit 1 are handled, such as encryption with
And the data received to NFC unit 1 are decrypted, to ensure that data are not held as a hostage in the open transmission environment of NFC unit 1
With crack.
Main control module 31 is the data processing chip for being installed with high order modulo n arithmetic, by extracting private key from private key module 34
The information or data sent to needs carries out high order modular arithmetic and realizes encryption, to ensure the information or data in NFC transmission
Security, i.e., also None- identified, decryption are intercepted and captured by attacker.
In information storage module 33 store main control module 31 chip number, employ the Antiforge system production code member,
Product information and carry out verifying the information datas such as the inquiry number of identification, Dynamic Recognition code with Database Unit 2.
When specifically used, in dynamic anti-fake system of the present utility model, NFC unit and dynamic anti-fake unit are encapsulated as uniting
One anti-counterfeiting chip is subsidiary together to pack pin in the product for needing to carry out false proof protection or for an independent card with the product
Sell.The purchaser of product only just can be with net with the false proof anti-counterfeiting chip of the NFC reader by having access to network, anti-counterfeiting chip
Database Unit on network is electrically connected with, so as to complete specifically from querying flow, to prove whether the identity of the product is legal.
In the specific implementation, this NFC Antiforge systems use adds dynamic anti-fake unit in NFC unit 1 and Database Unit 2
3.The information to be transmitted of NFC unit 1 is encrypted by private key module 34 therein, while Database Unit 2 is by corresponding
Public key module 22 information received is decrypted because private key is arranged in private key module 34 and will not be by NFC unit 1
Read so that external store system can not learn the private key and the encryption information that it is intercepted and captured is decoded.When Database Unit 2 to
When NFC unit 1 sends information, public key that the external store system of attacker can not be equally had access in Database Unit 2, even if making it
Intercepting and capturing the data transmitted by NFC protocol can not also decode.
Meanwhile the query counts module that dynamic anti-fake unit 3 uses adds in each inquiry operation to inquiry number
One computing, its result, which is stored in information storage module 33 and accordingly updates the inquiry number in Database Unit 2, retains module
In 21.During each inquiry operation, as long as database module compares whether incoming inquiry number is protected with inquiry number retention module 21
The data stayed are identical, you can whether the object for confirming inquiry operation is legal NFC unit 1.
Using above-mentioned rivest, shamir, adelman, when key generates to (private key+public key), private key writes into dynamic anti-fake unit
3 private key module 34, public key write into the public key module 22 of Database Unit 2.Attacker can not directly contact key, also can not
Another is pushed over out from one of cipher key pair.Manufacturer use after dynamic anti-fake unit 3 need not for keeping key amount paid outside into
This.Because key is without taking care of, manufacturer can use one close strategy of a core, further improve false proof reliability.
As shown in Figure 2, in the present embodiment, dynamic anti-fake unit 3 is additionally provided with what is be electrically connected with main control module 31
Random number generation module 35.
The random number generation module 35 is used to generating and storing dynamic verification code.When dynamic anti-fake unit 3 and database list
Member 2 for the first time verify after (database by public key decryptions receive inquiry number and dynamic anti-fake unit 3 numbering after, according to
The numbering of the dynamic anti-fake unit 3 checks the inquiry book of the inquiry number of preservation and input consistent), by the data message of preservation
(including be singly not limited to:Inquire about the information such as number, dynamic verification code, anti-counterfeiting chip state) by beaming back dynamic anti-fake after public key encryption
Unit 3, dynamic anti-fake unit 3 start inquiry counting number module 32 and generate new inquiry number, start random after being decrypted by private key
Number generation module 35 generates new dynamic verification code, and beams back Database Unit 2 and preserve.Once looking into for IC to DBS can be completed
Ask synchronous.
In the present embodiment, information storage module 33 is provided with erasable storage region and read-only storage region.
By two kinds of different regions, checking data of different nature are stored respectively, and such as read-only storage region preserves chip
Numbering, manufacturer's information, product information etc. and the static check of Database Unit 2 and not modifiable information.Erasable storage region
Then preserving dynamic verification code, inquiry code, Product Status (dispatch from the factory, sell, repairing) etc. may need to move in each inquiry operation
The information of state change.
In the present embodiment, erasable region includes:Chip dynamic verification code memory block, chip inquiry number memory block.Can
Preserved with ensureing that inquiry every time has corresponding record, also cause the static data that external store system is intercepted and captured can not pretend to be true number
According to.
In the present embodiment, read-only storage region includes:Chip number memory block, production code member memory block, manufacturer's information
Memory block.As long as the information in read-only storage region completes the static matching with Database Unit 2.
In the present embodiment, Database Unit 2 also includes:The inquiry number that the electric connection of module 21 is retained with inquiry number updates
Module 24.
Dynamic anti-fake unit 3 is first stored in into the inquiry number update module with the inquiry number after new in inquiry operation
24, after the inquiry number that the inquiry number before the completion of Database Unit 2 is passed to dynamic anti-fake unit 3 compares, stayed for inquiry number
Storing module 21 is updated.
In the present embodiment, database storage module 23 includes:Dynamic verification code memory block and it is electrically connected with therewith dynamic
State identifying code updates memory block.
Dynamic anti-fake unit 3 is first stored in into the dynamic with the dynamic verification code after new in being operated in dynamic verification code
Identifying code updates memory block, the dynamic verification code that the inquiry number before the completion of Database Unit 2 is passed to dynamic anti-fake unit 3
After comparison, it is updated for dynamic verification code memory block.
In other embodiments, in addition to a kind of method used in the NFC Antiforge systems of the application.
Specifically, the dynamic anti-fake technical scheme of the application, its key point realized is to ensure IC_Count (inquiry meters
The inquiry number recorded in digital-to-analogue block) uniformity with DB_Count (inquiry number retains the inquiry number that records in module 21).Due to
Unstable communication, interception be present, forge letter in NFC in IC (dynamic anti-fake unit 3)-DBS (Database Unit 2) communication process
The possibility of breath, to ensure that completion IC_Count is synchronous with DB_Count's under insecure communication environment, in inquiry behaviour each time
In work, the strategy for first verifying resynchronisation is taken.IC_Count is encrypted by the IC private keys preserved.Due to NFC, (NFC is mono-
1) member have key, can not encrypting and decrypting, so that information can not be distorted.Either NFC does not send the information, or the information is former
Version is sent.Vice versa.In this communication links, even if NFC is insincere, communication security is nor affected on.Its process is as follows:
(1) NFC reads IC information, and IC is by IC_Count, and (chip number of dynamic anti-fake unit 3, is stored in core to IC_UID
In piece numbering memory block) encryption be sent to DBS database.
(2) DBS receives above- mentioned information, first navigates to IC_UID record, then obtains IC_Count with public key decryptions, if
IC_Count=DB_Count, then 2 random numbers DB_R1, DB_R2 are produced, then believe DB_R1, DB_R2, and database
Breath DB_TemporaryDynamicCode (is stored in the dynamic verification code with renewal in inquiry number update module 24), DB_
DynamicCode (dynamic verification code for being stored in dynamic verification code memory block), DB_TemporaryCount (is stored in inquiry
The inquiry number of a renewal in number update module 24), DB_Count, DB_SalesStatus, DB_UID (are stored in database list
The chip number of dynamic anti-fake unit 3 in member 2) IC is sent to by public key encryption.
(3) IC is decrypted after receiving DBS information, is recorded in after associated verification in IC, then by encrypted DB_
R1, and newly-generated IC_Count, IC DynamicCode, IC_UID loopbacks DBS.If NFC interrupt communication, then IC with
DBS has synchronously been partially completed, and does not influence the correctness of inquiry next time.
(4) DBS is decrypted after receiving information, after associated verification is carried out, updates DB_DynamicCode, DB_
TemporaryDynamicCode (for random number caused by dynamic anti-fake unit 3), DB_Count;DB_TemporaryCount
Add 1, encrypted DB_R2, DB_TemporaryCount, DB_Count, DB_UID are then beamed back into IC.If NFC forge with
Machine number NFC_R2, due to NFC_R2 ≠ DB_R2, communication abort, to IC and DBS without any infringement.If NFC interrupts communication,
Then IC is synchronous with DBS has completed, and does not influence the correctness of inquiry next time.
(5) IC is decrypted after receiving information, and the value that DBS is sent is placed in a temporary variable, is then performed and is added
Close DB_R2, IC_Count, IC_UID, IC ends product information beam back DBS.
(6) DBS is decrypted after receiving information, and the value that IC is sent is placed in a temporary variable, is performed correlation and is tested
DB_TemporaryCount is put into DB_Count after card, completes associative operation, front and back product information is shown at NFC ends.Protect
Demonstrate,proved the safety of information with it is complete, it is therefore prevented that to the clone of IC-card.
NFC Antiforge systems of the present utility model before NFC unit 1 carries out data transmission by private key due to being added
It is close so that even if NFC unit 1 is open communication environment, attacker can not also be truncated to useful data.Meanwhile record
The private key of dynamic anti-fake unit cannot be directly read by NFC unit 1, it is ensured that private key information is difficult to forge, and also ensures
Fake producer is difficult to copy a product with same identity information.In other words, attacker copies a same dynamic
The anti-cost of dummy unit 3 is too high, causes forgery work profitless.
On the other hand, dynamic anti-fake unit 3 employs the query counts module that each inquiry operation can be counted, and
Inquiry number corresponding with Database Unit 2 retains all synchronized update in each inquiry operation of module 21.Such dynamic is prevented
Even if puppet causes the product false proof chip containing dynamic anti-fake unit 3 to be replicated by attacker, the anti-counterfeiting chip is same with other
Difference can also be produced by replicating the dynamic anti-fake information of chip.Other replicate chip can not necessarily pass through database in Antiforge inquiry
The matching of unit 2, its Query Result are necessarily low-quality goods.By the dynamic anti-fake information of this programme, by inquiring about number and moving
The uniqueness of product has been effectively ensured in the dynamic of state identifying code so that is lost completely using the personation mode of clone's NFC unit 1
Meaning.
It can be seen that the utility model scheme claimed solves the progress of 1 dangerous transmission environment of NFC unit well
The technical problem of product false proof, avoid influence of the opening wireless communications environment of NFC unit 1 to anti-counterfeiting information safety, lifting
The security of anti-counterfeiting information, also improve the reliability of anti-counterfeiting chip using the NFC Antiforge systems.
The above, preferred embodiment only of the present utility model, is not intended to limit embodiment of the present utility model,
Those of ordinary skill in the art can very easily carry out corresponding accommodation according to central scope of the present utility model and spirit
Or modification, therefore the scope of protection of the utility model should be defined by the protection domain required by claims.
Claims (7)
1. a kind of NFC Antiforge systems, including:NFC unit and Database Unit;The NFC unit and Database Unit electricity
Property connection;Characterized in that, also include:The dynamic anti-fake unit being electrically connected with institute NFC unit;The dynamic anti-fake unit is set
Query counts module, information storage module and the private key for being equipped with main control module and being electrically connected with the main control module
Module;The query counts module is also electrically connected with described information memory module;
The Database Unit is provided with:Inquiry number corresponding with the query counts module retains module and the private key mould
Public key module and database storage module corresponding to block.
A kind of 2. NFC Antiforge systems as claimed in claim 1, it is characterised in that the dynamic anti-fake unit be additionally provided with
The random number generation module that the main control module is electrically connected with.
3. a kind of NFC Antiforge systems as claimed in claim 1, it is characterised in that described information memory module is provided with erasable
Write storage region and read-only storage region.
4. a kind of NFC Antiforge systems as claimed in claim 3, it is characterised in that the erasable region includes:Chip dynamic
Identifying code memory block, chip inquiry number memory block.
5. a kind of NFC Antiforge systems as claimed in claim 3, it is characterised in that the read-only storage region includes:Chip is compiled
Number memory block, production code member memory block, manufacturer's information memory block.
6. a kind of NFC Antiforge systems as claimed in claim 4, it is characterised in that the Database Unit also includes:With it is described
Inquire about number and retain the inquiry number update module that module is electrically connected with.
7. a kind of NFC Antiforge systems as claimed in claim 6, it is characterised in that the database storage module includes:Dynamically
Identifying code memory block and the dynamic verification code renewal memory block being electrically connected with therewith.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720710352.5U CN206961165U (en) | 2017-06-16 | 2017-06-16 | A kind of NFC Antiforge systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720710352.5U CN206961165U (en) | 2017-06-16 | 2017-06-16 | A kind of NFC Antiforge systems |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206961165U true CN206961165U (en) | 2018-02-02 |
Family
ID=61384715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720710352.5U Expired - Fee Related CN206961165U (en) | 2017-06-16 | 2017-06-16 | A kind of NFC Antiforge systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206961165U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108108988A (en) * | 2018-03-08 | 2018-06-01 | 合肥宇胜物联网标识科技有限公司 | Anti-counterfeiting and tracing method for ceramic mark |
CN108537556A (en) * | 2018-03-13 | 2018-09-14 | 深圳信息职业技术学院 | A kind of multidate information method for anti-counterfeit based on block chain and NFC chip |
CN109120395A (en) * | 2018-06-08 | 2019-01-01 | 中国银联股份有限公司 | Label data generation method, label and the data processing based on NFC label |
-
2017
- 2017-06-16 CN CN201720710352.5U patent/CN206961165U/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108108988A (en) * | 2018-03-08 | 2018-06-01 | 合肥宇胜物联网标识科技有限公司 | Anti-counterfeiting and tracing method for ceramic mark |
CN108537556A (en) * | 2018-03-13 | 2018-09-14 | 深圳信息职业技术学院 | A kind of multidate information method for anti-counterfeit based on block chain and NFC chip |
CN109120395A (en) * | 2018-06-08 | 2019-01-01 | 中国银联股份有限公司 | Label data generation method, label and the data processing based on NFC label |
CN109120395B (en) * | 2018-06-08 | 2021-12-07 | 中国银联股份有限公司 | Tag data generation method, tag and data processing based on NFC tag |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5139415B2 (en) | Article information acquisition method and apparatus | |
Chothia et al. | A traceability attack against e-passports | |
JP2777060B2 (en) | Authentication method of portable object by offline terminal and corresponding terminal | |
CN104184733B (en) | A kind of RFID lightweight mutual authentication methods encoded based on CRC | |
CN107278307A (en) | Software layer is mutually authenticated | |
Khalil et al. | A novel RFID-based anti-counterfeiting scheme for retail environments | |
Longley et al. | Data And Computer Security: A Dictionary Of Terms And Concepts | |
CN109039652B (en) | Digital certificate generation and application method | |
CN110932859B (en) | User information processing method, device and equipment and readable storage medium | |
CN107332671A (en) | A kind of safety mobile terminal system and method for secure transactions based on safety chip | |
CN110290134A (en) | A kind of identity identifying method, device, storage medium and processor | |
CN206961165U (en) | A kind of NFC Antiforge systems | |
CN109190404A (en) | A kind of data desensitization system | |
US20240056438A1 (en) | Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities | |
CA3184856A1 (en) | Method, participatant unit, transaction register, and payment system for managing transaction data sets | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
CN108537537A (en) | A kind of safe and reliable digital cash Wallet System | |
CN105791277A (en) | Identity authentication method | |
CN202870898U (en) | Radio frequency-based commodity information identification system | |
CN108667801A (en) | A kind of Internet of Things access identity safety certifying method and system | |
CN106027237B (en) | Cipher key matrix safety certifying method based on group in a kind of RFID system | |
CN205015906U (en) | Anti -fake verification system of electron certificate | |
CN109800601A (en) | A kind of internet real-name authentication method based on block chain | |
CN108234125A (en) | For the system and method for authentication | |
US20240022403A1 (en) | Delivering random number keys securely for one-time pad symmetric key encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180202 Termination date: 20210616 |
|
CF01 | Termination of patent right due to non-payment of annual fee |