Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile identification method based on NFC

An identification method and technology for authenticity identification, applied in the field of information security, can solve problems such as inconvenience for commodity manufacturers and consumers, inability to identify the authenticity of commodities or authenticity identification, etc., to prevent reuse and prevent anti-counterfeiting behaviors , the effect of preventing copying

Inactive Publication Date: 2009-06-10
龙冬阳 +1
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main problems existing in the existing anti-counterfeiting technology: 1) No matter how advanced and complex the commodity carrier, packaging body and production process are, under today’s manufacturing technology, counterfeiters can quickly imitate or reuse the commodity carrier and packaging body; 2) Commodity anti-counterfeiting marks are also easy to be imitated or reused by counterfeiting gangs; 3) Cannot identify merchants as shoddy; 4) Can not identify the authenticity of commodities in the process of commodity circulation or authenticity identification is restricted by various conditions; 5) Commodity anti-counterfeiting The control right is controlled by the anti-counterfeiting merchants, and there are a few anti-counterfeiting merchants or leakers to prevent counterfeiting; 6) The authenticity of commodities depends on human sensory experience or simple tools, which is cumbersome to identify. For most consumers, The authenticity of the product is unclear; 7) The identification of the authenticity of the product requires the support of various network and database resources, which brings a lot of inconvenience to product manufacturers and consumers; Functions, such as anti-counterfeiting in the mainstream information network, digital (code) anti-counterfeiting, laser holographic anti-counterfeiting, etc.
This project also does not solve the three key problems that non-contact IC cards cannot be promoted in the field of commodity anti-counterfeiting: 1) cannot prevent and identify the imitation, cloning, and replay attacks of anti-counterfeiting information in non-contact IC cards as anti-counterfeiting marks; ) cannot prevent the identification of anti-counterfeiting merchants or manufacturers' anti-counterfeiting behavior; 3) different manufacturers use different card readers, and cannot unify the commodity authenticity identifier, resulting in high anti-counterfeiting costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile identification method based on NFC
  • Mobile identification method based on NFC
  • Mobile identification method based on NFC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1: Select RSA digital signature algorithm

[0045] 1. Making anti-counterfeiting identification body

[0046] The anti-counterfeit method of the invention uses the non-contact IC card as the carrier of the anti-counterfeit identification information, and the anti-counterfeit identification body is an integral body composed of the non-contact IC card and the anti-counterfeit object. First of all, according to the needs of the anti-counterfeiting object, the non-contact IC card is made into a shape and size suitable for the anti-counterfeiting object, and then the non-contact IC card is integrated with the anti-counterfeiting object. Once the non-contact IC card leaves the anti-counterfeiting object, it will be Physical or technical methods damage the non-contact IC card, so that the digital signature in the non-contact IC card can no longer be read and utilized, preventing the non-contact IC card from being reused.

[0047] 2. Key combination process

[0048...

Embodiment 2

[0073] Embodiment 2: Select Elliptic Curve Digital Signature Algorithm

[0074] 1. Making anti-counterfeiting identification body

[0075] The anti-counterfeiting method of the invention uses the non-contact IC card as the carrier of the anti-counterfeiting identification information, and the anti-counterfeiting identification body is an integral body composed of the non-contact IC card and the anti-counterfeiting object. First of all, according to the needs of the anti-counterfeiting object, the non-contact IC card is made into a shape and size suitable for the anti-counterfeiting object, and then the non-contact IC card is integrated with the anti-counterfeiting object. Once the non-contact IC card leaves the anti-counterfeiting object, it will be Physical or technical methods damage the non-contact IC card, so that the digital signature in the non-contact IC card can no longer be read and utilized, preventing the non-contact IC card from being reused.

[0076] 2. Key combi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile identification method based on NFC, which is an anti-counterfeiting method based on a non-contact IC card, and relates to the fields of information anti-counterfeiting, FRID technology application, information safety technology, and the like. The method is as follows: 1) firstly, an anti-counterfeiting center carries out cascaded signature for a serial number of the non-contact IC card, a name of an anti-counterfeiting object manufacturer and a public key combination parameter of the anti-counterfeiting object manufacturer to write into the IC card; then the anti-counterfeiting object manufacturer carries out cascaded signature for digital signature information and anti-counterfeiting object characteristic information; next the signature, the name of the anti-counterfeiting object manufacturer and the public key combination parameter of the anti-counterfeiting object manufacturer override the prior content in the IC card; and finally the IC card and an anti-counterfeiting object are combined together to form a disposable anti-counterfeiting mark body; 2) the anti-counterfeiting center solidifies a seed public key of the anti-counterfeiting object manufacturer, an algebraic function and a public key of the anti-counterfeiting center into an intelligent card chip supporting asymmetric cryptographic algorithm, and the intelligent card chip is embedded into an NFC mobile phone to form an identifier; and 3) the identifier analyzes the signature and identifies the anti-counterfeiting mark body.

Description

technical field [0001] The technology of the invention mainly relates to the technical fields of information anti-counterfeiting, RFID technology application, information security technology and the like. Background technique [0002] 1. Anti-counterfeiting technology [0003] With the development of the economy, the sales of counterfeit and shoddy goods have crossed national borders and become the second largest public hazard in the world after the drug trade. The anti-counterfeiting industry has become a popular and important industry today. However, at present, the anti-counterfeiting technologies used by wine manufacturing enterprises in my country can be roughly divided into: packaging anti-counterfeiting and electronic anti-counterfeiting. Each of these anti-counterfeiting technologies has its advantages and disadvantages, and reasonable selection and use of them can play a certain role in anti-counterfeiting. Since the 1990s, with the commercialization and populariz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00H04L9/30
Inventor 龙冬阳唐跃文
Owner 龙冬阳
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More