Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips

A technology of RFID tags and two-dimensional code tags, applied in the carrier field of RFID electronic tags, can solve the problems of easy counterfeiting, poor anti-copy ability of ordinary barcode tags, and poor convenience of anti-counterfeiting verification

Active Publication Date: 2014-11-26
SHANGHAI QUANRAY ELECTRONICS
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional commonly used anti-counterfeiting technologies mainly include paper-based anti-counterfeiting, ink-based anti-counterfeiting, holographic anti-counterfeiting, gravure printing anti-counterfeiting, telephone code anti-counterfeiting, etc., which are mainly realized by adding physical characteristics to product packaging or querying through telephone passwords, which are easy to be cou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
  • Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
  • Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0115] like figure 1 What is shown is a preferred embodiment of the present invention, which will be explained emphatically now.

[0116] refer to figure 2 As shown, the anti-counterfeiting label needs to be initialized, and the password and initial data are printed into a two-dimensional code and written into the RFID chip. For an anti-counterfeiting system, the protection password must first be generated. Compared with a single application label, the generated password is the parent password. The parent password is not directly written into the label, but the unique dispersion factor for a single label must first be changed through a decentralized algorithm. into a unique sub-password. The generation of the master password can be realized by a hardware encryption machine supporting the SM1 algorithm. Once generated, the system will continue to use this master password until the system password version is upgraded. After the encryption machine generates the password, the ...

example 2

[0149] like Image 6 As shown, it is a modification of Example 1. The authorized PSAM card stores the password of the two-dimensional code security area. After unlocking the password of the two-dimensional code security area, read the password of the RFID user security area to unlock the RFID User confidential area, read the digital signature in it for signature verification.

example 3

[0151] like Figure 7 As shown, for the simplification of Example 1, the authorized PSAM card can directly unlock the RFID password security area and the RFID user security area, read the password of the QR code in the RFID password security area to access the QR code, and read the password of the RFID user security area. Digital signature for verification.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-counterfeit label based on the combination of two-dimension codes and RFID chips. The data area of the two-dimension codes and the data area of the RFID chips are respectively divided into a non-secrecy zone and a secrecy zone, each secrecy zone is divided into multiple secrecy zone bodies, two-dimension code label codes are stored in the non-secrecy zone of the two-dimension codes, and the secrecy zone of the two-dimension codes is divided into a first two-dimension code secrecy zone body for storing protected data needed by a user; RFID label codes are stored in the non-secrecy zone of the RFID chips, and the secrecy zone of the RFID chips is divided into the RFID user secrecy zone body and the RFID password secrecy zone body; in the verification process, access to the RFID password secrecy zone body is achieved firstly to obtain a decoding password of the two-dimension code secrecy zone body, the needed data are obtained from the two-dimension codes, the data, including a digital signature, of the RFID user secrecy zone body are read, the digital signature is regenerated, and two digital digests are verified to finally obtain a result whether to be true or counterfeit or a result whether to be legal or illegal. The defects of a traditional anti-counterfeit technology can be overcome well, and the anti-counterfeit label is difficult to counterfeit.

Description

technical field [0001] The invention belongs to the field of anti-counterfeiting technology solutions for articles, and is specifically an anti-counterfeiting technical solution based on data encryption (special secondary mask) two-dimensional code technology combined with RFID technology with confidentiality area (password protected data access). The carrier of the RFID electronic tag of the two-dimensional code. Background technique [0002] Articles and commodity counterfeiting are becoming more and more serious problems in the global economic field, disturbing the normal market economic order. Counterfeiting occurs not only in the field of high-value valuables, but also in food, daily consumer goods, means of production, securities, various certificates, and low-tech products to high-tech products. It can be said that the ubiquitous imitation has become a public hazard of human beings. [0003] The traditional commonly used anti-counterfeiting technologies mainly inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/08
Inventor 张乘风王天平
Owner SHANGHAI QUANRAY ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products