Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

mobile identification system based on nfc

An identification system and mobile terminal technology, applied in the fields of identity authentication and information security, can solve the problems of unification, inconvenience for commodity manufacturers and consumers, inability to identify the authenticity of commodities or authenticity identification, etc., to prevent anti-counterfeiting behaviors, The effect of preventing copying and preventing reuse

Inactive Publication Date: 2011-12-28
龙冬阳 +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]The main problems of the existing anti-counterfeiting technology: 1) No matter how advanced and complicated the product carrier, packaging body and production process are, under today's manufacturing technology, counterfeiters will Can quickly imitate or reuse commodity carriers and packages; 2) Commodity anti-counterfeiting marks are also easy to be copied or reused by counterfeiting gangs; 3) Cannot identify merchants who are shoddy; 4) Cannot identify the authenticity of commodities in the process of commodity circulation Or authenticity identification is restricted by various conditions; 5) The control right of commodity anti-counterfeiting is controlled by anti-counterfeiting merchants, and there are a few anti-counterfeiting merchants or leakers anti-counterfeiting and counterfeiting phenomenon; 6) Commodity authenticity identification depends on human sensory experience or simple Tools, etc., the identification is cumbersome, and for most consumers, the authenticity of the product is ambiguous; 7) The identification of product authenticity requires the support of various network and database resources, which brings a lot of inconvenience to product manufacturers and consumers; 8 ) anti-counterfeiting costs and effects have also been questioned, and basically do not have anti-counterfeiting functions, such as the mainstream information network anti-counterfeiting, digital (code) anti-counterfeiting, laser holographic anti-counterfeiting, etc.
This project also does not solve the three key problems that non-contact IC cards cannot be promoted in the field of commodity anti-counterfeiting: 1) cannot prevent and identify the imitation, cloning, and replay attacks of anti-counterfeiting information in non-contact IC cards as anti-counterfeiting marks; ) cannot prevent the identification of anti-counterfeiting merchants or manufacturers' anti-counterfeiting behavior; 3) different manufacturers use different card readers, and cannot unify the commodity authenticity identifier, resulting in high anti-counterfeiting costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • mobile identification system based on nfc
  • mobile identification system based on nfc
  • mobile identification system based on nfc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1: Select Elliptic Curve Digital Signature Algorithm

[0053]1. Making anti-counterfeiting identification body

[0054] The anti-counterfeiting method of the invention uses the non-contact IC card as the carrier of the anti-counterfeiting identification information, and the anti-counterfeiting identification body is an integral body composed of the non-contact IC card and the anti-counterfeiting object. First of all, according to the needs of the anti-counterfeiting object, the non-contact IC card is made into a shape and size suitable for the anti-counterfeiting object, and then the non-contact IC card is integrated with the anti-counterfeiting object. Once the non-contact IC card leaves the anti-counterfeiting object, it will be Physical or technical methods damage the non-contact IC card, so that the digital signature in the non-contact IC card can no longer be read and utilized, preventing the non-contact IC card from being reused.

[0055] 2. Key combin...

Embodiment 2

[0119] Embodiment 2: Select RSA digital signature algorithm

[0120] 1. Making anti-counterfeiting identification body

[0121] The anti-counterfeit method of the invention uses the non-contact IC card as the carrier of the anti-counterfeit identification information, and the anti-counterfeit identification body is an integral body composed of the non-contact IC card and the anti-counterfeit object. First of all, according to the needs of the anti-counterfeiting object, the non-contact IC card is made into a shape and size suitable for the anti-counterfeiting object, and then the non-contact IC card is integrated with the anti-counterfeiting object. Once the non-contact IC card leaves the anti-counterfeiting object, it will be Physical or technical methods damage the non-contact IC card, so that the digital signature in the non-contact IC card can no longer be read and utilized, preventing the non-contact IC card from being reused.

[0122] 2. Key combination process

[0123...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an NFC-based mobile identification system, and relates to the fields of identity authentication, information anti-counterfeiting, RFID technology application, information security technology and the like. It includes at least one anti-counterfeiting identification body, a java-based NFC-based mobile terminal and authenticity identification jar software package, the anti-counterfeiting identification body includes a non-contact IC card and an anti-counterfeiting object, the non-contact IC card is fixed in the anti-counterfeiting object, and the mobile terminal based on NFC An authenticity identification jar software package is embedded in the terminal. The authenticity identification jar software package runs on the NFC-based mobile terminal to form an authenticity identifier. The authenticity identification jar software package is selected by the anti-counterfeiting center. keys, algebraic functions, and the public key of the anti-counterfeiting center and the cryptographic algorithm library BouncyCastle that supports asymmetric cryptographic algorithms are integrated and generated. De-signature and identification processing of the characteristic information in the non-contact IC card of the identifier.

Description

technical field [0001] The invention mainly relates to the technical fields of identity authentication, information anti-counterfeiting, RFID technology application, information security technology and the like. Background technique [0002] 1. Anti-counterfeiting technology [0003] With the development of the economy, the sales of counterfeit and shoddy goods have crossed national borders and become the second largest public hazard in the world after the drug trade. The anti-counterfeiting industry has become a popular and important industry today. However, at present, the anti-counterfeiting technologies used by wine manufacturing enterprises in my country can be roughly divided into: packaging anti-counterfeiting and electronic anti-counterfeiting. Each of these anti-counterfeiting technologies has its advantages and disadvantages, and reasonable selection and use of them can play a certain role in anti-counterfeiting. Since the 1990s, with the commercialization and po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00H04L9/30
Inventor 龙冬阳周靖植
Owner 龙冬阳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products