Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Closed-loop anti-counterfeiting verification system based on Merkle trusted tree

A verification system and trusted tree technology, applied in the direction of collaborative devices, businesses, instruments, etc., can solve problems such as counterfeiting, illegally obtaining encrypted authentication data of electronic tags, counterfeiting electronic tags, etc.

Inactive Publication Date: 2020-01-03
江峰
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the technical level of counterfeiting is also improving accordingly. The counterfeiters illegally obtain the encrypted authentication data in the electronic label and illegally copy it through various means such as decrypting the electronic label, so as to counterfeit the electronic label to achieve the purpose of counterfeiting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] A closed-loop anti-counterfeiting verification system based on a Merkle trusted tree, including a system server, an RFID electronic tag set on each commodity, and a mobile terminal device capable of reading and writing the RFID electronic tag.

[0041] Commodity anti-counterfeiting is achieved through the following steps:

[0042] 1) In the RFID electronic tag on any commodity, the message MB is written i,j . The message MB i,j It is the digital identity certificate of the commodity. Wherein, i is the serial number of the product, i=1, 2, ... n, j is the number of times the RFID electronic tag writes the message, that is, the number of times the RFID electronic tag is updated and written into the message, j=1, 2, ... m . The system server stores the message set S={CB i,1 、CB i,2 ...CB i,j}. The message CB i,j with message MB i,j Correspondence, for and message MB i,j Perform a comparison operation to verify the authenticity of the product. When any product l...

Embodiment 2

[0063] This embodiment is a preferred mode of Embodiment 1, and also includes a random number generator to realize combined encryption authentication of commodities.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a closed-loop anti-counterfeiting verification system based on a Merkle trusted tree. From the aspect of system architecture, a closed-loop authentication system is adopted; in the system security architecture, the method can be realized by changing one leaf node of a Merkle tree, the operation efficiency is high, and the updating time is short. In addition, due to the fact that the multiple leaf nodes are arranged, compared with the prior art, a counterfeiter has high difficulty in cracking the authentication system through a collision means. Preferably, in the framework, any node can be updated to realize the function, and the expansion performance is good.

Description

technical field [0001] The invention relates to the technical field of commodity anti-counterfeiting. Background technique [0002] With the development of mobile communication technology, especially the development of 2.45GHz radio frequency identification technology and mobile phone short-range wireless communication technology (NFC 13.56MHz), the short-range identification function of mobile phones and mobile terminals has become increasingly powerful. The mobile Internet and the Internet of Things are penetrating into people's daily life. Anti-counterfeiting identification technologies based on this technology emerge in endlessly. For example, the Chinese patent "A product anti-counterfeiting system based on mobile terminals and RFID electronic tags" is the successful expansion and application of the Internet of Things in product information tracing and verification through mobile interconnection. This technology prevents counterfeiting to a large extent and has been s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06K17/00
CPCG06K17/0029G06Q30/0185
Inventor 江峰
Owner 江峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products