CN103745365B - A kind of register method based on near-field communication technology, false proof device and Antiforge system - Google Patents
A kind of register method based on near-field communication technology, false proof device and Antiforge system Download PDFInfo
- Publication number
- CN103745365B CN103745365B CN201410006029.0A CN201410006029A CN103745365B CN 103745365 B CN103745365 B CN 103745365B CN 201410006029 A CN201410006029 A CN 201410006029A CN 103745365 B CN103745365 B CN 103745365B
- Authority
- CN
- China
- Prior art keywords
- token
- tag
- false proof
- mobile phone
- counterfeiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 85
- 238000004891 communication Methods 0.000 title claims abstract description 53
- 238000005516 engineering process Methods 0.000 title claims abstract description 40
- 230000008569 process Effects 0.000 claims description 27
- 238000012795 verification Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 description 75
- 238000012546 transfer Methods 0.000 description 50
- 238000012797 qualification Methods 0.000 description 27
- 238000012545 processing Methods 0.000 description 9
- 238000000205 computational method Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000013500 data storage Methods 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 5
- 230000000977 initiatory effect Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 230000010365 information processing Effects 0.000 description 4
- 210000004027 cell Anatomy 0.000 description 3
- 230000003750 conditioning effect Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 210000000352 storage cell Anatomy 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of register method based on near-field communication technology, false proof device and Antiforge system.By the register method, it can realize that tag ID corresponds with anti-counterfeiting object ID, then it is associated with ID;And ID, tag ID, anti-counterfeiting object ID, works information, the first counterfeiting token, the second counterfeiting token are stored respectively in antifalsification label, false proof mobile phone and anti-counterfeit server.The Antiforge system includes three kinds of antifalsification label, false proof mobile phone and anti-counterfeit server false proof devices, it is the relation of mutual restriction and related association between three, data in antifalsification label, false proof mobile phone, anti-counterfeit server must be updated simultaneously, effective log-on message could be produced, therefore adds safety and reliability.
Description
Technical field
The present invention relates to near-field communication technology, more particularly to a kind of art work register method based on near-field communication technology,
False proof device and Antiforge system.
Background technology
Art work collection is fast-developing in recent years, and what it is with the art sales market boom is fakement great Dang Qi roads.
Therefore, how to establish conveniently, reliable, authority art work registration, identification, transfer system be always asking of facing of artwort market
Topic.
Existing electronic anti-fogery technology mainly includes two ways:Carried out using bar code or Quick Response Code as label false proof;With
It is false proof using task equipment reading label information progress that the modes such as RFID store digital anti-counterfeiting label.
The former the shortcomings that, is that the cost of reproduction of bar code or Quick Response Code is low, as long as this yard is replicated into the genuine piece that can disguise oneself as.
The latter equally exists limitation compared with the former advanced technology:First using proprietary instrument, it is necessary to be scanned, and generally including can
Carry out computer, label reader of network service etc., not portable and deployment.Second, data merely are carried out to anti-counterfeiting object
Read and verification, false proof instrument can not be excluded and faked this problem.The anti-counterfeiting object can not be identified in anti-counterfeiting object qualification process
The owner and anti-counterfeiting object all relations.
The content of the invention
It is an object of the invention to solve one of above-mentioned technical problem, according to one embodiment of present invention, there is provided one
Art work register method of the kind based on near-field communication technology, including:
S201, anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone (102) from
The tag ID read in antifalsification label (101) creates and stores the establishment token associated with the tag ID and anti-counterfeiting object
ID, it is sent to false proof mobile phone (102) (308-310);
S202, the false proof mobile phone (102) receive from the anti-counterfeit server (103) and store the establishment token and institute
State anti-counterfeiting object ID and sent to the antifalsification label (101) and write tag request;
S203, the antifalsification label (101) write tag request in the antifalsification label according to the false proof mobile phone (102)
(101) the anti-counterfeiting object ID and the ID are write in;
S204, the false proof mobile phone (102) by user interface input works information, and according to the anti-counterfeiting object ID,
The works information and the establishment token send registration request to the anti-counterfeit server (103);
S205, it is described with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive
Establishment token corresponding to anti-counterfeiting object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information,
Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone to
(102) the establishment token, is deleted;
S206, the false proof mobile phone (102) receive by the anti-counterfeiting object ID and from the anti-counterfeit server (103)
First counterfeiting token write-in smart card (104), and will second counterfeiting token write-in antifalsification label (101),
Delete the establishment token.
Wherein:S203, the antifalsification label (101) calculate the first tag security information according to tag ID and ID
(X1), and according to the first tag security information (X1) calculate the second tag security information (X2) be transmitted to it is described false proof
Mobile phone (102);
S204, the false proof mobile phone (102) sends to the anti-counterfeit server (103) carries the second tag security letter
Cease (X2), the anti-counterfeiting object ID, the works information and the registration request for creating token;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and store
Tag ID and ID in the anti-counterfeit server (103) calculate the to calculate X1 identicals method with the antifalsification label
Three tag security information (X3), the anti-counterfeit server (103) decrypt the second tag security information (X2) using asymmetric arithmetic
The 4th tag security information (X4) is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information
(X3), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.
Preferably:In methods described:
S201, the anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone from prevent
The tag ID read in pseudo label (101) creates and stores the establishment token time limit associated with the tag ID;And
S205, the anti-counterfeit server (103) judges that this establishment process is not above the establishment token time limit, and deletes
Except the establishment token time limit.
In addition:In the label corresponding with the tag ID that S201, anti-counterfeit server (103) inquiry are prestored
Key is write, transmitting the label with rivest, shamir, adelman writes key;
In S202, the false proof mobile phone (102) receives the label from the anti-counterfeit server (103) and writes key, described
False proof mobile phone (102) sends to write tag request and include the label to the antifalsification label (101) writes key;
In S203, the antifalsification label (101) examines the label to write key and mark preset in antifalsification label (101)
Whether label write key consistent, using the tag ID, ID and label local key are parameter with 3DES encryption if consistent
Algorithm calculate the first tag security information (X1), and by the first tag security information (X1) be parameter in terms of asymmetric arithmetic
The second tag security information (X2) is calculated, label local key is equally stored in anti-counterfeit server and and tag ID
Correspond;
In S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and deposit
Tag ID, ID and the label local key being stored in the anti-counterfeit server (103) are parameter in terms of 3DES encryption algorithm
Calculate the 3rd tag security information (X3);And first counterfeiting token and the second false proof order are transmitted with rivest, shamir, adelman
Board.
Wherein, works information includes described in S204:Author information, works content, works description, creative time, creation
Place.
In addition, before S201, in addition to:Associating for the tag ID and the ID is stored in anti-counterfeit server
Relation, and judge in step sl ID that false proof mobile phone (102) transmission comes whether with false proof mobile phone (102) from anti-counterfeiting label
Sign the tag ID association read in (101).
According to another embodiment of the invention, there is provided a kind of antifalsification label (101) based on near-field communication technology, use
In:Reception writes tag request and writes anti-counterfeiting object ID and ID;And receive and write tag request the second counterfeiting token of write-in.
The antifalsification label is additionally operable to:According to tag ID and the ID calculate the second tag security information (X2) for
Send.
In addition, the antifalsification label is additionally operable to:First tag security information is calculated according to tag ID and the ID
(X1), and according to the first tag security information (X1) the second tag security information (X2) is calculated for sending.
The antifalsification label is additionally operable to:Receive label write key, examine the label write key write with preset label it is close
Whether key is consistent, using tag ID, ID and label local key is parameter with 3DES encryption algorithm calculating the if consistent
One tag security information (X1), and be described in parameter is calculated with asymmetric arithmetic according to the first tag security information (X1)
Second tag security information (X2) is for transmission.
According to one more embodiment of the present invention, there is provided a kind of false proof mobile phone (102) based on near-field communication technology, it is described anti-
Pseudo- mobile phone is used for:Read the tag ID in antifalsification label;ID and tag ID are sent to anti-counterfeit server (103);From false proof
Server (103) receives and storage creation token and anti-counterfeiting object ID;Establishment writes tag request for sending;Pass through user interface
Works information is inputted, and sends to the anti-counterfeit server (103) and to carry the anti-counterfeiting object ID, the works information and described
Create the registration request of token;The first counterfeiting token and the second counterfeiting token are received, is prevented by the anti-counterfeiting object ID and from described
First counterfeiting token write-in smart card (104) received in pseudo server (103), and second counterfeiting token is write
Enter the antifalsification label (101);And delete the establishment token.
The mobile phone is additionally operable to:Receive the second tag security information (X2);And sent to the anti-counterfeit server (103)
Carry the second tag security information (X2) received, the anti-counterfeiting object ID, the works information and the note for creating token
Volume request.
The mobile phone is additionally operable to:The label, which is received, from the anti-counterfeit server (103) writes key;To the antifalsification label
(101) send carry that the label writes key write tag request.
Wherein, the works information includes:Author information, works content, works description, creative time, creative place.
According to still another embodiment of the invention, a kind of anti-counterfeit server (103) based on near-field communication technology, institute are also provided
Anti-counterfeit server is stated to be used for:According to the ID and tag ID received, create and store the wound associated with the tag ID
Token and anti-counterfeiting object ID are built, for sending;Receive and carry anti-counterfeiting object ID, works information and the registration request for creating token,
Confirm that the establishment token in the registration request of reception is consistent with the establishment token corresponding to the anti-counterfeiting object ID received, it is determined that
The tag ID is to register for the first time, then stores works information;The generation first false proof order associated with the anti-counterfeiting object ID
Board and the second counterfeiting token, for sending;Delete the establishment token.
The anti-counterfeit server is used for:Receive carry the second tag security information (X2), anti-counterfeiting object ID, works information and
The registration request of token is created, corresponding to the establishment token in registration request and is stored in the anti-counterfeit server (103)
In tag ID and ID calculate the 3rd tag security information (X3) to calculate X1 identicals methods with antifalsification label, it is described anti-
Pseudo server (103) decrypts the second tag security information (X2) using asymmetric arithmetic and obtains the 4th tag security information (X4),
If the 4th tag security information (X4) is equal to the 3rd tag security information (X2), the anti-counterfeit server
(103) it is correct to verify the second tag security information (X2) described in the registration request.
The anti-counterfeit server is additionally operable to:ID and tag ID according to receiving are created and stored and the tag ID
The associated establishment token time limit;The anti-counterfeit server (103) judges that this registration process is not above the establishment token
Time limit;And delete and create the token time limit.
Preferably, the anti-counterfeit server is additionally operable to:The label corresponding with the tag ID prestored is inquired about to write
Key, the label is transmitted with rivest, shamir, adelman and writes key;Corresponding to the establishment token in registration request simultaneously
Tag ID, ID and the label local key being stored in the anti-counterfeit server (103) are parameter with 3DES encryption algorithm
Calculate the 3rd tag security information (X3);And first counterfeiting token and described second false proof is transmitted with rivest, shamir, adelman
Token.
The works information includes:Author information, works content, works description, creative time, creative place.
Finally, according to still another embodiment of the invention, there is provided a kind of Antiforge system (100) based on near-field communication technology,
Including foregoing antifalsification label (101), false proof mobile phone (102) and anti-counterfeit server (103).
For prior art, beneficial effects of the present invention are:
1. register method provided by the invention, can realize that tag ID is associated with anti-counterfeiting object ID, then with ID one
One correspondence;And ID, tag ID, anti-counterfeiting object ID, works information, the first counterfeiting token, the second counterfeiting token are deposited respectively
It is stored in antifalsification label, false proof mobile phone and anti-counterfeit server.Therefore, realize that antifalsification label, false proof mobile phone, anti-counterfeit server are formed
One system that is interrelated and mutually restricting, it is necessary to while data in antifalsification label, false proof mobile phone, anti-counterfeit server are updated,
Effective log-on message could be produced, therefore adds safety and reliability.
It is mutual between three 2. Antiforge system provided by the invention includes antifalsification label, false proof mobile phone, anti-counterfeit server
Restriction and the relation of related association, it is necessary to while data in antifalsification label, false proof mobile phone, anti-counterfeit server are updated, it could produce
Effective log-on message, therefore add safety and reliability.
Brief description of the drawings
Fig. 1 is the system block diagram of the present invention.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology.
Fig. 4 is antifalsification label, smart card, false proof hand after a kind of art work register method based on near-field communication technology is implemented
Data table memory in machine, anti-counterfeit server.
Fig. 5 is a kind of art owners' authentication method flow chart based on near-field communication technology.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.
Fig. 7 is that the owner identifies that false proof mobile phone intelligent card and false proof mobile phone calculate identification response schematic diagram in request link.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Figure 10 nonowners identify the false proof mobile phone intelligent card of nonowners and the false proof mobile phone of the owner and non-in request link
The false proof mobile phone of the owner calculates identification response schematic diagram.
Figure 11 is the structural representation of anti-counterfeit server of the present invention.
Figure 12 is the work-based logic schematic diagram of authentication processing unit
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.Figure 15 present invention
One of structural representation of false proof mobile phone.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.
Figure 17 is the structural representation of the false proof smart card of the present invention.
Figure 18 is the structural representation of antifalsification label of the present invention.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the specific of the present invention
Embodiment is described in further detail.Obviously, described embodiment is only the part of the embodiment of the present invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is paid
All embodiments obtained by putting belong to protection scope of the present invention.
Fig. 1 is the system block diagram of the present invention.As shown in figure 1, the system 100 of the present invention includes:It is antifalsification label 101, false proof
Mobile phone 102 and anti-counterfeit server 103, include smart card 104 in false proof mobile phone 102.Antifalsification label is preferably NFC label, is prevented
Pseudo- mobile phone 102 can read the information of antifalsification label 101, pass through the authentication module and smart card inside false proof mobile phone 102
104 chips carry out safe computations, and carrying out secondary safety in false proof mobile phone with reference to false proof ID calculates, in false proof service
Verified in device 103.Thereby increase the safety and reliability of Antiforge system.
Registration, identification and the transference of the reliable authority of the art work can be realized with the system.Wherein described antifalsification label
101 have globally unique antifalsification label ID, have ID in false proof mobile phone 102 and smart card 104.Carrying out anti-counterfeiting object
Registration before, antifalsification label 101 is built in the anti-counterfeiting object that will be registered, and especially, the anti-counterfeiting object can be with
For the art work that be registered, identify or transfer the possession of.Anti-counterfeit server 103 be each anti-counterfeiting object distribute and store one it is false proof
Object ID.
Illustrate herein:Due to register, identify and transference in have different false proof mobile phones and participate.Cause
This, in order to make it easy to understand, can register in Antiforge system, false proof mobile phone is added respectively in this manual in identification and transference
To limit.Such as:In registration process, because only main body of the owner (or referred to as creator), therefore, false proof mobile phone
Do not distinguish, be only expressed as false proof mobile phone 102.In qualification process, there is the difference of owner's identification and nonowners' identification, because
This, in qualification process, false proof mobile phone has point of the false proof mobile phone of the owner and the false proof mobile phone of nonowners.Make this differentiation be in order to
Be easy to describe in qualification process, the false proof mobile phone of the owner and the false proof mobile phone of nonowners accordingly functional relationship when do not cause table
The confusion stated.During identification 102, unless otherwise instructed, false proof mobile phone represents the false proof mobile phone of the owner.In transference
In, the false proof mobile phone of the owner will be related to and be transferred mobile phone and participated.Therefore, it will use using the false proof mobile phone of the owner and be turned
False proof mobile phone is allowed to make a distinction.Unless otherwise instructed, false proof mobile phone represents the false proof mobile phone of the owner.It is believed that the present invention protects
Shield false proof mobile phone be respectively provided with it is described registration, identification and transference in any different appellation main bodys (such as:Registrant, the owner,
Nonowners, it is transferred surrenderee) the part or all of function of mobile phone.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology of the present invention.Utilize this method skill
One new art work can be registered in server by the creator of art product, and assign the false proof of the unique mark art work
Label.Methods described includes:S201, anti-counterfeit server 103 according to false proof mobile phone 102 transmit come ID and false proof mobile phone
102 tag IDs read from antifalsification label 101 create and store the establishment token associated with the tag ID and false proof right
As ID.
Antifalsification label 101 has globally unique antifalsification label ID, in this step, has the false proof of tag reading function
Mobile phone 102 reads antifalsification label ID, and tag ID and ID are together sent to anti-counterfeit server 103, the false proof clothes
Business device 103 creates according to tag ID and ID and stores one and creates token while distribute a unique sign for the art work
The anti-counterfeiting object ID of the art work.
Alternatively, the establishment token can be the token with the time limit, i.e. the registration of the art work must definite time-lag in advance
Interior completion is just effective.Therefore, the anti-counterfeit server can create an establishment token simultaneously when creating the establishment token
Time limit.
In this step, server 103 is received after ID and antifalsification label ID directly by antifalsification label ID and user
ID is associated, that is, is given tacit consent to antifalsification label ID and belonged to the ID.Alternatively, can be before S201, in advance in false proof service
The incidence relation of tag ID and ID is stored in device 103, i.e., is just being taken when antifalsification label is actually allocated to some user
It is engaged in device by this corresponding relation record and store accordingly.Then when server receives ID and anti-counterfeiting label in S201
First judge whether the tag ID read with false proof mobile phone 102 from antifalsification label 101 associates the ID after label ID, if closed
Connection just creates token and continues subsequent step, and registration failure is returned if not associating.It is possible thereby to further prevent tag ID quilt
Situation about usurping, add the safety and reliability of system.
In addition, before this step, the step of can including establishing secure link between server and mobile phone.
S202, the false proof mobile phone 102 receive from the anti-counterfeit server 103 and store the establishment token and described anti-
Pseudo- object ID simultaneously writes tag request to the antifalsification label 101 transmission.
Antifalsification label 101 can write key with preset, just be needed when now equipment carries out write operation to antifalsification label 101
Whether preset to write key consistent with this for the key of writing for verifying in the write request of equipment.Therefore, the anti-of key is write for being prefixed
When pseudo label 101 carries out write operation, tag ID can be prestored in server 103 and writes key with corresponding label.By preventing
The label corresponding with the tag ID that pseudo server 103 prestores according to tag ID inquiry writes key;With asymmetric encryption
Algorithm, which transmits the label, writes key to mobile phone 102.
Then described false proof mobile phone 102 receives the label from the anti-counterfeit server 103 and writes key.The false proof mobile phone
102 write tag request to the antifalsification label (101) transmission, and the tag request of writing includes writing label key.
S203, the antifalsification label 101 write tag request in the antifalsification label 101 according to the false proof mobile phone 102
The middle write-in anti-counterfeiting object ID and the ID.Thus, the antifalsification label completes anti-counterfeiting object ID and ID
Record.
When antifalsification label is preset write key in the case of, antifalsification label verify first the label write key with anti-counterfeiting label
Whether consistent preset label writes key in label 101.
Preferably, in this step, antifalsification label 101 also calculates the second security information X2 and is transmitted to the false proof mobile phone
102.Specifically, the antifalsification label 101 calculates the second tag security information X2 according to the tag ID and the ID,
And the second tag security information X2 is transmitted to the false proof mobile phone 102.Preferably, can be calculated according to tag ID, ID
First tag security information X1, and the second tag security information X2 is calculated according to the first tag security information X1;
It is highly preferred that the antifalsification label 101 examine the label write key it is correct after, it is local according to tag ID, ID and label
Key is that parameter calculates the first tag security information X1 with 3DES encryption algorithm, and is according to the first tag security information X1
Parameter calculates the second tag security information X2 with asymmetric arithmetic.Label local key can be differently configured from label and write
Key, when label local key differs with writing key, tag ID and corresponding mark can be prestored in server 103
Sign local key.
S204, the false proof mobile phone 102 input works information by user interface, and according to the anti-counterfeiting object ID, institute
State works information and the establishment token sends registration request to the anti-counterfeit server 103;Preferably, works described in S204
Information includes:Author information, works content, works description, creative time, creative place.It is highly preferred that when false proof mobile phone receives
To after the second security information X2, the second security information X2 is carried in the registration request and is sent to server 103.
S205, it is described with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive
Establishment token corresponding to anti-counterfeiting object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information,
Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone to
(102) the establishment token, is deleted.
In the case of antifalsification label also calculates X2, the anti-counterfeit server 103 is according in the registration request
Create token it is corresponding and be stored in the anti-counterfeit server 103 tag ID, ID is with the antifalsification label to calculate
X1 identicals method calculates the 3rd tag security information X3, and the anti-counterfeit server (103) is received using asymmetric arithmetic decryption
The the second tag security information (X2) arrived obtains the 4th tag security information (X4), if described 4th tag security information X4 etc.
In the 3rd tag security information X3, then the anti-counterfeit server 103 verifies the peace of the second label described in the registration request
Full information X2 is correct.
Preferably, corresponding to the establishment token of the anti-counterfeit server 103 in the registration request and store
Tag ID, ID and label local key in the anti-counterfeit server 103 calculate for parameter with 3DES encryption algorithm
Three tag security information X3.
When it is the token with the time limit to create token, the anti-counterfeit server 103 also judges that this time establishment process is not super
The establishment token time limit is spent, and when deleting establishment token, deletes create the token time limit in the lump.
Preferably, first counterfeiting token and second counterfeiting token can be transmitted with rivest, shamir, adelman.
S206, described in the false proof mobile phone 102 receives by the anti-counterfeiting object ID and from the anti-counterfeit server 8
First counterfeiting token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.Then delete
Except the establishment token.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology of the present invention.Carrying out this hair
Before the register method of bright offer, it is preferable to carry out secure log, embody in 301-305 in figure 3:
In a preferred embodiment of the invention, tag ID and ID have been prestored in anti-counterfeit server associates pass
System, and the corresponding label of tag ID write key.
301:Secure connection is established between false proof mobile phone 102 and anti-counterfeit server 103.
302:False proof mobile phone 102 asks to log in token by ID to smart card 104.
303:Smart card is generated by computations logs in token, while by ID and logs in the false proof mobile phone of token return
102。
304:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
305:Anti-counterfeit server logins successfully to false proof mobile phone feedback security.
After secure log, step as shown in Figure 3 is carried out:
306:False proof mobile phone reads tag ID in antifalsification label, and the antifalsification label is built in anti-counterfeiting object.
307:Antifalsification label sends antifalsification label ID to the false proof mobile phone.
308:False proof mobile phone creates token according to antifalsification label ID and ID to anti-counterfeit server application.
309:After anti-counterfeit server receives establishment token request, whether the incidence relation of confirmation antifalsification label ID and ID
It coincide, then creates and store the establishment token associated with the tag ID, creates token time limit and anti-counterfeiting object ID.It is preferred that
Ground, the label for also needing to inquire about the antifalsification label according to tag ID write key.
310:Token will be created and anti-counterfeiting object ID, the key of writing of antifalsification label are sent to the false proof mobile phone;Wherein, it is excellent
Selection of land, the key of writing of antifalsification label are sent with rivest, shamir, adelman.
311:The false proof mobile phone, which receives, to be received and stores from the anti-counterfeit server 8 the establishment token and described prevent
Pseudo- object ID, it may be preferable that also include receiving antifalsification label and write key, and obtained after being decrypted using asymmetric arithmetic label write it is close
Key.
312:False proof mobile phone writes key by the label and writes tag request to antifalsification label initiation, and parameter includes:It is anti-
Pseudo- object ID, the ID, the label write key.
313:Whether the antifalsification label to write key correct if receiving verification label after request, by anti-counterfeiting object if correct
ID, the ID write the antifalsification label;And use 3DES encryption algorithm, it is preferable that with antifalsification label ID, user
ID, local key (may differ from label and write key) are that parameter calculates the first tag security information X1, reuse asymmetric calculation
Method calculates the second tag security information X2.
314:Second tag security information X2 is back to the false proof mobile phone by the antifalsification label.
315:Works information is inputted by false proof cell-phone user interface, including is not limited to author information, works content, works
Description, creative time, creative place, other creation characteristic information;Then registration request, parameter bag are initiated to anti-counterfeit server
Include:Anti-counterfeiting object ID, the second tag security information X2, the works information and the establishment token.
316:After anti-counterfeit server receives registration request, according to the anti-counterfeiting object ID, recalled in anti-counterfeit server with
Corresponding anti-counterfeiting object ID and the ID, it is preferable that with antifalsification label ID, ID and the anti-counterfeiting label deposited
The local key of label is that parameter calculates the 3rd tag security information X3 in a manner of calculating X1 identicals with antifalsification label, is reused
The 4th tag security information X4 is calculated with 313 step identical asymmetric arithmetics;If the 4th tag security information X4
Equal to the 3rd tag security information X2, then judge that the second tag security information X2 is correct;Meanwhile anti-counterfeit server is true
Recognize this time antifalsification label to be registered as registering for the first time, and confirm to receive creates token and the anti-counterfeiting object received
Establishment token corresponding to ID is consistent, then stores works information;And generate associated with the anti-counterfeiting object ID and works information
The first counterfeiting token and the second counterfeiting token.
317:Anti-counterfeit server sends first counterfeiting token and the second counterfeiting token to the false proof mobile phone;And delete
The establishment token.
318:The false proof mobile phone will receive the first counterfeiting token and anti-counterfeiting object ID writes the false proof cell phone intelligent
Card.
319:The false proof mobile phone intelligent card writes successfully to false proof confirm phone.
320:The false proof mobile phone, which by the label is write key and sent to the antifalsification label, writes tag request, parameter bag
Include:Write key and the second counterfeiting token.
321:Whether the antifalsification label to write key correct if receiving verification label after request, false proof by second if correct
Token writes the antifalsification label.
322:The antifalsification label writes successfully to false proof confirm phone.
Fig. 4 illustrates all steps by 301-322 in Fig. 3, in the antifalsification label, the false proof mobile phone and described
Formation one is interrelated in anti-counterfeit server and mutually restricts data.As can be seen from Figure 4:It has passed through above-mentioned steps:Institute
State in antifalsification label except natively existing antifalsification label ID, it is false proof to be also written into ID, anti-counterfeiting object ID and second
Token;And it is also written into anti-counterfeiting object ID except original ID in the false proof mobile phone;In false proof mobile phone intelligent card except
Existing subscriber ID, anti-counterfeiting object ID, the first counterfeiting token have been also written into it;And anti-counterfeit server, by above-mentioned register method, remove
Original tag ID, ID, have been written to anti-counterfeiting object ID, works information, the first counterfeiting token and the second counterfeiting token.
Wherein:The tag ID corresponds with anti-counterfeiting object ID, the first counterfeiting token, the second counterfeiting token and works information, and
It is associated with ID.The formation of above-mentioned data and between correlation, identification and transference after being lay the foundation.
For instance, it is preferred that in identification request, related data can be calculated by above-mentioned data, including:5th tag security information X5,
6th tag security information X6, the 7th tag security information X7, the 8th tag security information X8, the first result J1, the second result
J2, the 3rd result J3, the 4th result J4, the 5th result J5, the 6th result J6, the 7th result J7, the 8th result J8;The S1 owners
Identify search sequence number;S2 nonowners identify search sequence number.
The art work information registering stage is being realized using the system, is being additionally provided a kind of based on the false proof of near-field communication technology
System.The Antiforge system includes the label 101, the false proof mobile phone 102 and the anti-counterfeit server 103.
The antifalsification label 101 is used for:Reception writes tag request and writes anti-counterfeiting object ID and ID;And receive and write
Tag request writes the second counterfeiting token.
In addition, the label be additionally operable to according to the tag ID, the ID calculate the second tag security information X2 with
For sending.Preferably, the first tag security information X1 is calculated according to tag ID, ID, and according to first tag security
Information X1 calculates the second tag security information X2.
In addition, the label be additionally operable to receive label write key, examine the label write key write with preset label it is close
Whether key is consistent.Using tag ID, ID and label local key it is parameter with 3DES encryption algorithm calculating the if consistent
One tag security information X1, and be that parameter calculates described second with asymmetric arithmetic according to the first tag security information X1
Tag security information X2.
The false proof mobile phone 102 is used for:Simultaneously storage creation token and anti-counterfeiting object ID are received from anti-counterfeit server 103;Wound
Build include that label writes key write tag request, to feed to antifalsification label transmission.Works information, institute are inputted by user interface
Stating works information includes:Author information, works content, works description, creative time, creative place.And to the false proof service
Device 8, which is sent, carries the anti-counterfeiting object ID, the works information and the registration request for creating token.Receive the first false proof order
Board and the second counterfeiting token, receive the anti-counterfeiting object ID and from the anti-counterfeit server 103 described first false proof
Token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.And delete the establishment
Token.
The false proof mobile phone 102 is additionally operable to receive the second tag security information X2;And sent out to the anti-counterfeit server 103
Send and carry the second tag security information X2 received, the anti-counterfeiting object ID, the works information and the note for creating token
Volume request.
Anti-counterfeit server 103 is used for:According to the ID and tag ID received, create and store and the tag ID phase
The establishment token of association, token time limit and anti-counterfeiting object ID are created, for sending;And the tag ID that inquiry prestores
Accordingly label writes key;The label is transmitted with rivest, shamir, adelman and writes key.Receive and carry the second tag security letter
Cease (X2), anti-counterfeiting object ID, works information and the registration request for creating token.Corresponding to establishment token in registration request
And the tag ID in the anti-counterfeit server (103) and ID are stored in calculate X1 identical methods with the antifalsification label
The 3rd tag security information X3 is calculated, the anti-counterfeit server 103 decrypts the second tag security information X2 using asymmetric arithmetic
The 4th tag security information X4 is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information
(X2), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.Confirm
Establishment token in the registration request of reception is consistent with the establishment token corresponding to the anti-counterfeiting object ID received, it is determined that described
Tag ID is to register for the first time, and this registration process is not above the establishment token time limit;Then store works information.Generation
First counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, for sending.And delete the establishment
Token and establishment token time.
Preferably, corresponding to the establishment token in registration request and it is stored in the anti-counterfeit server 103
Tag ID, ID and label local key for parameter with 3DES encryption algorithm calculate the 3rd tag security information X3.
The works information includes:Author information, works content, works description, creative time, creative place.
Preferably, and with rivest, shamir, adelman first counterfeiting token and second counterfeiting token are transmitted.
The art work register method based on near-field communication technology of the present invention is described with reference to the accompanying drawings above.This method
Form the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including ID,
Tag ID, anti-counterfeiting object ID, key, local key, the first counterfeiting token and second counterfeiting token etc. are write, so that it is guaranteed that each ring
Section can be completed by the verifications of multiple data, so as to realize the art work turn into art sales behavior safety anti-fake (registration,
Identification, transfer the possession of).Creator can record works information in the server simultaneously, facilitate displaying, the record of art sales behavior
And management.
Describe to realize art work qualification process using Antiforge system of the invention below.
Qualification process can be divided into owner's identity process and nonowners' identity process according to the difference for initiating main body.Cause
This, is divided into the false proof mobile phone of the owner and the false proof mobile phone of nonowners in qualification process.In qualification process, such as nothing is especially said
Bright, false proof mobile phone represents the false proof mobile phone of the owner.
Art owners' authentication method flow chart based on near-field communication technology is described referring to Fig. 5.Including as follows
Step:
S501, anti-counterfeit server, which is received and stored, carries the false proof mobile phone of the owner from false proof mobile phone intelligent card described in the owner
In the owner of the first counterfeiting token that transfers identify request, create and store the owner and identify token, send to described all
The false proof mobile phone of person.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores owner's writ of appraisement simultaneously
The board time limit;
S502, antifalsification label receives the owner that the false proof mobile phone of the owner is sent and identifies request, by the second false proof order
Board is sent safely to the false proof mobile phone of the owner.
Especially, read operation that can be to the antifalsification label sets verification step, that is, being verified can just be read
Operation.In this case, antifalsification label receives can wrap in owner's identification request that the false proof mobile phone of the owner is sent
Containing public key, antifalsification label verifies the public key, and verification to the false proof mobile phone of the owner by just sending the second counterfeiting token.
Wherein described safety, which is sent, to be referred to send data in a manner of external equipment is not stolen and distorted.It is being preferable to carry out
In example, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token, and the 5th tag security is believed
Cease (Y5) to send to the false proof mobile phone of the owner).
S503, the false proof mobile phone of the owner identify token according to the first counterfeiting token, the second counterfeiting token and the owner
Calculate first identification response (RES1), to anti-counterfeit server send carry it is described first identification response (RES1), anti-counterfeiting object ID,
The identification request of owner's ID.
In a preferred embodiment, the false proof mobile phone intelligent card of the owner is ginseng with the 5th tag security information (Y5)
Number calculates the first result (J1), and the false proof mobile phone of the owner is with first result (J1) and the false proof cell phone intelligent of the owner
The first counterfeiting token is that parameter calculates the second result (J2) in card, then identifies token with second result (J2) and the owner
The first identification response (RES1) is calculated for parameter;
Especially, can also be connect in the identification request that the false proof mobile phone of the owner is sent to anti-counterfeit server including needs
Receive the identification request of other false proof phone numbers of qualification result.
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof
The second counterfeiting token, the first counterfeiting token and the owner of server identify the identification response of token computation second
(RES2), if the second identification response (RES2), which is equal to the described first identification, responds (RES1), correct judgment, inspection institute
Whether consistent with ID associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request,
The correct judgment if consistent, creates and preserves owner's search sequence number (S1), while by owner's search sequence number
(S1) send to the false proof mobile phone of the owner, delete the owner and identify token.
In a preferred embodiment, the anti-counterfeit server according to corresponding to anti-counterfeiting object ID in the identification request and stores
The second counterfeiting token in the anti-counterfeit server calculates the 6th tag security with the same computational methods of the antifalsification label
Information (Y6), and the 6th tag security information (Y6) is passed through into computational methods meter same with the false proof mobile phone intelligent card of the owner
The 3rd result (J3) is calculated, further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server
The 4th result (J4) is calculated by computational methods same with the false proof mobile phone of the owner, further according to the 4th result (J4)
Identify that token calculates the second identification response (RES2) with computational methods same with the false proof mobile phone of the owner with the owner.
When including other phone numbers during identification is asked, the anti-counterfeit server is by owner's search sequence number
(S1) sending into the identification request needs to receive other false proof phone numbers of qualification result.
In addition, the anti-counterfeit server can also store qualification time and qualification time is related to owner's ID
Connection;And the false proof mobile phone of the owner or the other false proof mobile phones logins false proof clothes for needing to receive qualification result
Business device inputs owner's search sequence number (S1), and qualification time is included in this false proof result of inquiry.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this owner's qualification process is not above
The owner identifies the token time limit, and deletes the owner and identify the token time limit.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.Especially say herein
It is bright:False proof mobile phone in Fig. 6 is the false proof mobile phone of the owner in owner's authentication method.
Secure log is carried out first, is embodied in 601-605 in figure 6:
601:Secure connection is established between false proof mobile phone 102 and anti-counterfeit server 103.
602:False proof mobile phone 102 asks to log in token by ID to smart card 104.
603:Smart card is generated by computations logs in token, while by ID and logs in the false proof mobile phone of token return
102。
604:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
605:Anti-counterfeit server logins successfully to false proof mobile phone feedback security.
Then, owner's identity process is carried out.
606:False proof mobile phone initiates the owner to false proof mobile phone intelligent card with ID, login token and identifies request, Xiang Fang
Pseudo- mobile phone intelligent card asks the first counterfeiting token.
607:False proof mobile phone intelligent card sends first counterfeiting token to the false proof mobile phone.
608:False proof mobile phone initiates the owner to anti-counterfeit server and identifies request, the first counterfeiting token described in parameter.
609:Anti-counterfeit server, which creates according to the first counterfeiting token and stores the owner, identifies token and owner's writ of appraisement
The board time limit;Sending the owner simultaneously identifies token to the false proof mobile phone of the owner.
610:False proof mobile phone lifts the owner to antifalsification label as parameter using public key and identifies request;Public key is used for asymmetric calculation
Method is encrypted.
611:Antifalsification label examines public key, is encrypted using the second counterfeiting token as parameter and calculates the 5th tag security information
Y5。
612:Antifalsification label sends the 5th tag security information Y5 to the false proof mobile phone.
613:The false proof mobile phone intelligent card goes out the first result J1 with the 5th tag security information Y5 computations.
614:The false proof mobile phone intelligent card is sent the first result J1 is calculated to the false proof mobile phone.
615:Preferably, the false proof mobile phone goes out the second result according to the first result J1 and the first counterfeiting token computations
J2;Identify that token computations go out the first identification response RES1 further according to the second result J2 and the owner.
616:False proof mobile phone connects further according to the described first identification response RES1, anti-counterfeiting object ID, owner's ID, needs
The other false proof phone numbers for receiving qualification result send identification request to the anti-counterfeit server.
617:After anti-counterfeit server receives owner's identification request, the anti-counterfeit server is prevented according in the identification request
The second related counterfeiting token of pseudo- object ID calculates the 6th tag security information Y6;And by the 6th tag security information Y6 by with
The same computational methods of the false proof mobile phone intelligent card of the owner calculate the 3rd result J3;Further according to the 3rd result J3,
One counterfeiting token calculates the 4th result J4 by computational methods same with the false proof mobile phone of the owner;Further according to the described 4th
As a result J4, the owner identify the identification response RES2 of token computation second, if the second identification response RES2 is equal to institute
The first identification response RES1 is stated, then correct judgment;And examine it is described identification request in owner's ID whether with the identification
Ask the associated IDs of anti-counterfeiting object ID consistent, the correct judgment if consistent;And examine institute in the identification request
Whether associated with the identification request anti-counterfeiting object ID person's of having ID ID be consistent, judges just if consistent
Really;It is associated with owner's ID to store qualification time simultaneously;Create and preserve owner's search sequence S1;Described in deletion
The owner identifies that token and the owner identify the token time limit.
618:Anti-counterfeit server sends owner's search sequence S1 to false proof mobile phone.
619:Anti-counterfeit server, which sends owner's search sequence S1 into the identification request, to be needed to receive identification knot
Other phone numbers of fruit;Delete the owner and identify token.
620:Other the false proof mobile phones for receiving owner's search sequence S1 can be according to owner's search sequence S1
Inquire about the result of this authentication.
Fig. 7 shows that preferred embodiment antifalsification label and owner's mobile phone calculate RES1 flow chart.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.Including:
S801, anti-counterfeit server receive and store carry nonowners false proof cellphone subscriber ID nonowners' identification please
Ask, create and store nonowners and identify token, send to the false proof mobile phone of the nonowners.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores nonowners' identification simultaneously
The token time limit.
S802, antifalsification label receive the nonowners that the false proof mobile phone of the nonowners is sent and identify request, second is prevented
Pseudo- token is sent safely to the false proof mobile phone of the nonowners with anti-counterfeiting object ID.
Especially, read operation that can be to the antifalsification label sets verification step, that is, being verified can just be read
Operation.In this case, the nonowners that the false proof mobile phone of the antifalsification label reception nonowners is sent identify can in request
So that comprising public key, antifalsification label verifies the public key, and verification to the false proof mobile phone of nonowners by just sending the second counterfeiting token.
Wherein described safety, which is sent, to be referred to send data in a manner of external equipment is not stolen and distorted.It is being preferable to carry out
In example, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And the 7th tag security is believed
Breath (Y7) and anti-counterfeiting object ID are sent to the false proof mobile phone of the nonowners.
S803, the false proof mobile phone of nonowners initiate to carry the anti-counterfeiting object ID, second to the false proof mobile phone of the owner
Counterfeiting token and the nonowners identify the identification request of token.
In a preferred embodiment, the false proof mobile phone of the nonowners carries described false proof right to the false proof mobile phone initiation of the owner
As ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
S804, the false proof mobile phone of the owner receive identification request, and the false proof mobile phone of the owner is according to the second false proof order
The first counterfeiting token calculates safe result in board and the false proof mobile phone intelligent card of the owner, and by safe result and owner's ID
It is sent to the false proof mobile phone of the nonowners.
In a preferred embodiment, the false proof mobile phone of the owner receives nonowners' identification request, and the owner is false proof
Mobile phone intelligent card is that parameter calculates the 5th result (J5) with the 7th tag security information (Y7);The false proof hand of the owner
Machine is using the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token and calculates the 6th as parameter
As a result (J6) is used as safe result.
S805, the false proof mobile phone of nonowners identify token computation the according to the safe result and the nonowners
Three identification responses (RES3), sent to anti-counterfeit server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the owner
The nonowners of ID identify request;
S806, the anti-counterfeit server is according to corresponding to the nonowners identify anti-counterfeiting object ID in request and is stored in
Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th
Identification response (RES4) is equal to the described 3rd identification and responds (RES3), then correct judgment, examines the owner in the identification request
Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound
Build and preserve nonowners' search sequence number (S2), while nonowners' search sequence number (S2) is sent to the non-institute
The false proof mobile phone of the person of having (916), delete the nonowners and identify token.
In a preferred embodiment, the anti-counterfeit server identifies that anti-counterfeiting object ID institutes are right in request according to the nonowners
The second related counterfeiting token of the anti-counterfeit server and should be stored in and calculate the 8th tag security information (Y8) for parameter;Again with
8th tag security information (Y8) is that parameter calculates the 7th result with the same computational methods of owner's mobile phone intelligent card
(J7);Again anti-counterfeiting object ID associated storages and the false proof service in request are identified with the 7th result (J7) and the nonowners
The first counterfeiting token in device is to calculate the 8th result (J8) by parameter with mobile phone identical computational methods false proof with the owner;
Further according to using the 8th result (J8) and the nonowners identify token as parameter with the false proof mobile phone identical of nonowners
Method calculates the 4th identification response (RES4).
In addition, the anti-counterfeit server also stores qualification time and qualification time is associated with owner's ID;With
And the false proof mobile phone of nonowners logs in the anti-counterfeit server and inputs nonowners' search sequence number (S2), inquires about this
Secondary false proof result, the false proof result include qualification time.
When the identification token with when prescribe a time limit, the anti-counterfeit server confirms that this nonowners' qualification process is not super
Cross nonowners and identify the token time limit, and delete nonowners and identify the token time limit.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Secure log is carried out first, is embodied in 901-902 in fig.9:
901:The false proof mobile phone of nonowners is with nonowners' ID and logs in token login anti-counterfeit server.
902:Anti-counterfeit server logins successfully to the false proof mobile phone feedback security of nonowners.
Then, nonowners' identity process is carried out.
903:The false proof mobile phone of nonowners identifies token with the false proof cellphone subscriber ID requests nonowners of nonowners.
904:Anti-counterfeit server identifies that request creates and stores nonowners according to nonowners and identifies token and not all
Person identifies the token time limit.
905:The false proof mobile phone of nonowners lifts nonowners to antifalsification label as parameter using public key and identifies request;Public key is used
Encrypted in asymmetric arithmetic.
906:Antifalsification label examines public key, is encrypted using the second counterfeiting token as parameter and calculates the 7th tag security information
Y7。
907:7th tag security information Y7 and anti-counterfeiting object ID are sent to the false proof mobile phone of the nonowners.
908:The false proof mobile phone of nonowners is according to the anti-counterfeiting object ID, the 7th tag security information Y7 and described non-
The owner identifies that request token initiates identification request to the false proof mobile phone of the owner.
909:The 7th tag security information Y7 that the false proof mobile phone intelligent card of the owner is sent according to the false proof mobile phone of the owner adds
The 5th result J5 of close calculating.
910:The false proof mobile phone intelligent card of the owner and by the 5th result J5 to the false proof mobile phone of the owner.
911:The false proof mobile phone of the owner is encrypted according to the 5th result J5 and the false proof counterfeiting token of mobile phone first of the owner
Calculate the 6th result J6.
912:Owner's ID and the 6th result J6 are sent to the nonowners by the false proof mobile phone of the owner to be prevented
Pseudo- mobile phone.
913:The false proof mobile phone of nonowners identifies token encryption further according to the 6th result J6, the nonowners
Calculate the 3rd identification response RES3;According to anti-counterfeiting object ID.
914:The false proof mobile phone owner ID of the nonowners, the 3rd identification response RES3 are to the server
Initiate nonowners and identify request.
915:The anti-counterfeit server is false proof according to anti-counterfeiting object ID is related in nonowners identification request second
The security information Y8 of token computations label the 8th, and go out the 7th result J7 according to the 8th security information Y8 computations;
Go out the 8th result J8 further according to the 7th result J7, the first counterfeiting token computations;Further according to the 8th result,
Nonowners identify that token computations the 4th identify response RES4;If the 4th identification response RES4 is equal to the described 3rd
Identification responds RES3, then correct judgment;Examine owner's ID in the identification request whether false proof with the identification request
The associated ID of object ID is consistent, the correct judgment if consistent;Confirm that this nonowners' qualification process is not super
Cross nonowners and identify the token time limit;It is associated with owner's ID to store qualification time simultaneously;Create and preserve not all
Person's search sequence S2.
916:Nonowners' search sequence S2 is sent to the false proof mobile phone of the nonowners;Delete the non-institute
The person of having identifies that token and nonowners identify token.
Figure 10 shows that preferred embodiment antifalsification label and owner's mobile phone and nonowners' mobile phone calculate RES3 flow
Figure.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work identifies function.Institute
Stating Antiforge system includes antifalsification label 101, false proof mobile phone 102 and anti-counterfeit server 103.Main body difference is initiated according to identification, prevented
Pseudo- mobile phone includes the false proof mobile phone 102-1 of the owner and false proof mobile phone 102-2 of nonowners.
The antifalsification label 101 is used for:Receiving the owner and identify request, the owner, which is identified in request, includes public key,
Antifalsification label verifies the public key;And/or receive nonowners and identify request, the nonowners are identified in request comprising public affairs
Key, antifalsification label verify the public key.
The reception identifies request as that can be that the owner identifies request, and the 5th is calculated by parameter of the second counterfeiting token
Tag security information (Y5) is for transmission;It is anti-with second and/or identifying for the reception asks to identify request for nonowners
Pseudo- token is that parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID.
The antifalsification label is used to store ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
The false proof mobile phone 102-1 of the owner, is used for:The owner, which is initiated, to server identifies request, the identification request
It is middle to carry the first counterfeiting token to prestore, and receive the owner and identify token.The owner, which is initiated, to antifalsification label identifies request, and
The second counterfeiting token is received safely from antifalsification label, is reflected according to the first counterfeiting token, the second counterfeiting token and the owner to prestore
Surely the identification response of token computation first (RES1) is asked;Sent to server and carry the first identification response (RES1), prestore
Anti-counterfeiting object ID and, the identification of owner's ID request (616).
Receive the second counterfeiting token safely from antifalsification label and the obtain the 5th mark is calculated by the second counterfeiting token to receive
Security information (Y5) is signed, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) for parameter
First result (J1), the false proof mobile phone of the owner are false proof with the first result (J1) and the false proof mobile phone intelligent card of the owner first
Token is that parameter calculates the second result (J2);Identify that token calculates the as parameter using second result (J2) and the owner again
One identification response (RES1).
In addition, also carrying needs its of reception qualification result in the identification request (616) that the mobile phone is sent to server
His false proof phone number.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and inputs owner's inquiry sequence
Row number (S1), inquires about false proof result.
Preferably, the mobile phone also has the function of coordinating nonowners' identification, that is, receiving the identification of nonowners' mobile phone please
Ask, the first counterfeiting token calculates safety knot in the second counterfeiting token, the false proof mobile phone intelligent card of the owner in being asked according to identification
Fruit, and safety result and owner's ID are transmitted.
Wherein:The second counterfeiting token in nonowners' mobile phone identification request is replaced with according to the second counterfeiting token meter
The 7th tag security information (Y7) calculated.
The false proof mobile phone intelligent card of the owner is that parameter calculates the 5th result with the 7th tag security information (Y7)
(J5);The false proof mobile phone of the owner is with the 5th result (J5) and to be stored in the false proof mobile phone intelligent card of the owner first anti-
Pseudo- token is that parameter the 6th result (J6) of calculating is used as safe result.
The false proof mobile phone 102-2 of nonowners, request is identified for initiating nonowners to server, the identification please
Middle carrying nonowners' ID is sought, and receives nonowners from server and identifies token.Nonowners are initiated to antifalsification label
Identification request, and the second counterfeiting token and anti-counterfeiting object ID are received safely from antifalsification label.Initiate to carry institute to owner's mobile phone
State the identification request that anti-counterfeiting object ID, the second counterfeiting token and the nonowners identify token.Receive and pacify from owner's mobile phone
Full result and owner's ID, the identification response of token computation the 3rd is identified according to the safe result, the nonowners
(RES3).To server send carry it is described 3rd identification response (RES3), anti-counterfeiting object ID, owner's ID it is not all
Person identifies request.
Wherein, it is that reception is logical safely from antifalsification label to receive the second counterfeiting token and anti-counterfeiting object ID safely from antifalsification label
Cross the second counterfeiting token and calculate the 7th tag security information (Y7) obtained;And carried to the initiation of owner's mobile phone described false proof
Object ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, logs in anti-counterfeit server input nonowners
Search sequence number of reflecting (S2), inquires about false proof result.
Wherein:The nonowners sent to antifalsification label, which are identified in request (905), includes public key.
The anti-counterfeit server 103, is used for:Identification request is received from mobile phone, creates and stores identification token for sending;
Receive identification request again from mobile phone, it is described to identify request bag ID containing the owner, anti-counterfeiting object ID and by mobile phone calculating
Identification response (RES1, RES3), according in the identification request corresponding to anti-counterfeiting object ID and be stored in server first
Counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4), if the mirror that server calculates
Provisioning response is equal to the identification response that mobile phone calculates, then correct judgment;Examine it is described identification request in owner's ID whether with
Anti-counterfeiting object ID is corresponding in identification request and consistent, the correct judgment if consistent that is stored in the ID in server;
Create, preserve and send search sequence number;Delete identification token.
Wherein:Identify that request identifies request for the owner from what mobile phone received, it is false proof comprising first in the identification request
Token;Or identify that request identifies request for nonowners from what mobile phone received, used in the identification request comprising nonowners
Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete
Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated with owner's ID by qualification time.
The system architecture diagram of the present invention is described below:Figure 11 is the structural representation of anti-counterfeit server of the present invention.Such as figure
Shown in 11, the anti-counterfeit server includes:Authentication processing unit 1101, communication unit 1102, Antiforge system user management list
Member 1103, anti-counterfeiting object database 1104, authentication result queries processing unit 1105, short message sending unit 1106.Wherein:
Authentication processing unit 1101 be used for from communication unit receive authentication request (including the owner identify request
Identify and ask with nonowners) and relevant information, anti-counterfeiting object information is inquired about from anti-counterfeiting object database, is used from Antiforge system
Family administrative unit inquires about false proof user profile, identifies false proof user, counterfeiting token is issued to false proof user, by calculating mould safely
Block calculate the first identification that the second identification identifications of response RES2 or the 4th response RES4 is sent with false proof mobile phone and responded
The identification responses of RES1 or the 3rd RES3 is compared, if being true unanimously, otherwise is false.
Communication unit 110 is used to handle the authentication request sent from false proof mobile phone, including the owner identifies request
Identify and ask with nonowners.
Antiforge system administrative unit 1103 is used for the mark and security information for inquiring about false proof user, logs in token.
Anti-counterfeiting object database 1104 is anti-for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second
Pseudo- token.
Authentication result queries processing unit 1105 is used to receive the result from false proof mobile phone and other ordinary terminals
Inquiry request, inquired about according to the identifying code reported.
Short message sending unit 1106 is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
Figure 12 is the work-based logic schematic diagram of authentication processing unit 1101.Wherein:
Step 1201 communication unit receives identification request.
Step 1202 judges whether user is legal, if it is otherwise, it returns to user is illegal.
Step 1203 checks that user identifies whether token is legal, turns 1004 if not, if turning 1005.
The request of step 1204 authentication is illegal.
Step 1205 is identified in the owner in request:Calculate the second identification response RES2 is sent with false proof mobile phone first
Identification response RES1 is compared, and algorithm is referring to Fig. 7 and correlation step;In nonowners identify request:Calculate the 4th identification
Response RES4 is compared with the 3rd identification response RES3 that false proof mobile phone is sent, and algorithm is referring to Figure 10 and correlation step.
Step 1206 checks whether RES and RES1 is consistent, if inconsistent turn 1207;It is consistent then turn 1208.
The request of step 1207 authentication is false.
The request of step 1208 authentication is true.
The art work authentication method and device based on near-field communication technology of the present invention is described with reference to the accompanying drawings above.
This method forms the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including with
Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, various tag security information Y5, Y7, it is various
Intermediate result etc., intermediate data is calculated between server and mobile phone and label respectively, and verified, so that it is guaranteed that links
It can be completed by the verification of multiple data, so as to realize that the art work turns into safety anti-fake (registration, the mirror of art sales behavior
Fixed, transfer).Simultaneously creator can record works information in the server, facilitate art sales behavior displaying, record and
Management.
Describe to realize art work transference using Antiforge system of the invention below.
When transferring the possession of function, understand the false proof mobile phone of the owner and be transferred mobile phone and participate.Therefore, function introduction is being carried out
When, the false proof mobile phone of the owner can be used and be transferred false proof mobile phone and be accordingly introduced.Unless otherwise instructed, false proof mobile phone
Represent the false proof mobile phone of the owner.
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention, including:
S1301, anti-counterfeit server receive the transfer request sent from false proof mobile phone, and described transfer the possession of asks to include being transferred use
Family ID and anti-counterfeiting object ID, generate and store the transfer token associated with anti-counterfeiting object ID, send to include and transfer the possession of token
Confirm to transfer the possession of request to the false proof mobile phone of the owner and be transferred false proof mobile phone.
In order to ensure assigning security, it is preferable that also include the false proof mobile phone of the owner before the step S1301 to false proof
The step of object is identified;And/or also anti-counterfeiting object is entered including the false proof mobile phone in the side of being transferred after the step 1301
The step of row identification, Fig. 5 and Fig. 6 owner's identity process, institute are may be referred to the step of the owner false proof mobile phone identification
State nonowners' identity process that the step of being transferred false proof mobile phone identification may be referred to Fig. 8 and Fig. 9.
Wherein, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and the false proof mobile phone is that the owner is false proof
Mobile phone is the false proof mobile phone in the side of being transferred.
S1302, the false proof mobile phone of the owner receive and store the transfer token, judge whether to confirm that the transfer please
Ask, if it is confirmed that then in the false proof mobile phone intelligent card of the owner with anti-counterfeiting object ID is associated in the transfer token the
One counterfeiting token carries out invalid setting, and the second counterfeiting token in pair antifalsification label associated with the transfer token carries out nothing
Effect is set;Delete first counterfeiting token and second counterfeiting token simultaneously;
S1303, the server is according to the associated tag ID of the transfer token and is transferred false proof cellphone subscriber ID
Generate and store new the first counterfeiting token and the second counterfeiting token, send the first new counterfeiting token and the second false proof order
Board is transferred false proof mobile phone to described.
S1304, it is described to be transferred false proof mobile phone and receive new first counterfeiting token and the second counterfeiting token, with institute
State new the first counterfeiting token write-in transferred the possession of the associated anti-counterfeiting object ID of token and received from the anti-counterfeit server
It is described to be transferred false proof mobile phone intelligent card.And by the second new counterfeiting token received from the anti-counterfeit server and turned
ID is allowed to write the antifalsification label associated with the transfer token.
S1305, the anti-counterfeit server include transferring the possession of the setting successful request of token from false proof mobile phone reception is transferred, will
The owner that false proof mobile phone is arranged to the anti-counterfeiting object ID related to transferring the possession of token is transferred, records Transaction Information;Delete and transfer the possession of
Token.
S1306, the anti-counterfeit server to the false proof mobile phone of the former owner and it is described be transferred false proof mobile phone send transfer the possession of into
Work(firmly believes request, and the former false proof mobile phone of the owner, which is deleted, transfers the possession of token, the first counterfeiting token and the second counterfeiting token;The quilt
Transfer the possession of false proof mobile phone and delete transfer token.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
1401:The owner initiates identity process.
1402:The anti-counterfeiting object ID being transferred in mobile phone reading antifalsification label.
1403:It is transferred mobile phone and will be transferred ID, anti-counterfeiting object ID is sent to the false proof mobile phone of the owner.
1404:The false proof mobile phone of the owner is to be transferred ID, anti-counterfeiting object ID turns as parameter to anti-counterfeit server request
Allow.
1405:Anti-counterfeit server, which is sent, transfers the possession of token to the false proof mobile phone of the owner.
1406:Anti-counterfeit server sends the message for confirming to receive to being transferred mobile phone.
1407:Anti-counterfeit server sends identification request and is transferred mobile phone.
1408:It is transferred mobile phone and initiates identity process.
1409:Being transferred mobile phone and sending confirms the message that accepts a delivery acceptance of delivery to server.
1410:Anti-counterfeit server sends the confirmation transfer request for including transferring the possession of token.
1411:The false proof mobile phone of the owner confirms to start to transfer the possession of to anti-counterfeit server.
1412:The false proof mobile phone of the owner sets the first counterfeiting token in the false proof mobile phone intelligent card of the owner invalid.
1413:The false proof mobile phone intelligent card feedback of the owner sets the invalid success of the first counterfeiting token.
1414:The false proof mobile phone of the owner sets the second counterfeiting token in antifalsification label invalid.
1415:Antifalsification label feedback sets the invalid success of the second counterfeiting token.
1416:The false proof mobile phone of the owner to anti-counterfeit server feed back the first counterfeiting token and the second counterfeiting token it is invalid into
Work(.
1417:The server is associated with transferring the possession of token in the setting invalid successful request of counterfeiting token according to receiving
Tag ID, be transferred false proof cellphone subscriber ID and generate and store the first new counterfeiting token and the second new counterfeiting token.
1418:The anti-counterfeit server sends the first new counterfeiting token and the second new counterfeiting token to described
It is transferred false proof mobile phone.
1419:It is described to be transferred false proof mobile phone by with the associated anti-counterfeiting object ID of the transfer token and from described false proof
False proof mobile phone intelligent card is transferred described in new the first counterfeiting token write-in that server receives.
1420:The mobile phone intelligent card that is transferred writes successfully to the mobile phone feedback that is transferred.
1421:It is described to be transferred mobile phone by the second new counterfeiting token received from the anti-counterfeit server and turned
ID is allowed to write the antifalsification label associated with the transfer token.
1422:The antifalsification label writes successfully to the mobile phone feedback that is transferred.
1423:The anti-counterfeit server reception is transferred the setting for including transferring the possession of token that false proof mobile phone is sent and successfully asked
Ask.
1424:The anti-counterfeit server is arranged to the anti-counterfeiting object ID's related to transferring the possession of token by false proof mobile phone is transferred
The owner;And record Transaction Information;Delete and transfer the possession of token.
1425:The anti-counterfeit server sends to transfer the possession of to the false proof mobile phone of the former owner successfully firmly believes request.
1426:The false proof mobile phone of the former owner, which is deleted, transfers the possession of token and the first counterfeiting token and the second counterfeiting token.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work transfers the possession of function.Institute
Stating Antiforge system includes antifalsification label 101, the false proof mobile phone 102-1 of the owner, is transferred false proof mobile phone 102-3 and the false proof clothes
Business device 103.
The antifalsification label 101 is used for:Receive and transfer the possession of token, set the second counterfeiting token invalid according to token is transferred the possession of, with
And send and the successful message of token valid is set;Write request is received, the second new counterfeiting token is write according to write request, with
And send and write successful message.
Preferably, the antifalsification label:Receive and transfer the possession of token, public key, antifalsification label verification are included in the transfer token
The public key.
Preferably, the antifalsification label (101) receives write request, and said write request includes writing key, anti-counterfeiting label
Key is write described in label verification.
The false proof mobile phone 102-1 of the owner, is used for:Antifalsification label is read, obtains antifalsification label ID and anti-counterfeiting object ID;
Sent to anti-counterfeit server and transfer the possession of request, the request includes being transferred ID and anti-counterfeiting object ID;Receive and wrap from server
The confirmation transfer request for transferring the possession of token is included, judges whether to confirm that described transfer the possession of is asked, if it is confirmed that then preventing the owner
Carry out invalid setting with associated the first counterfeiting tokens of anti-counterfeiting object ID in the transfer token in pseudo- mobile phone intelligent card, pair and
Second counterfeiting token transferred the possession of in the associated antifalsification label of token carries out invalid setting;It is false proof to delete described first simultaneously
Token and second counterfeiting token.
Wherein, receive and store the transfer request for being transferred mobile phone transmission including being transferred ID and anti-counterfeiting object ID.
In addition, the mobile phone also sends the invalid successfully request of the setting counterfeiting token for including transferring the possession of token to server.
The mobile phone is additionally operable to:Delete and transfer the possession of token, the first counterfeiting token and the second counterfeiting token.
It is described to be transferred false proof mobile phone 102-3, it is used for:Antifalsification label is read, obtains antifalsification label ID and anti-counterfeiting object ID;
Sent to owner's mobile phone and transfer the possession of request, described transfer the possession of asks to include being transferred ID and anti-counterfeiting object ID;Connect from server
The transfer confirmation request for including and transferring the possession of token is received, judgement is confirmed whether to accept a delivery acceptance of delivery, and receives the first new counterfeiting token and new
The second counterfeiting token;False proof cell phone intelligent will be transferred described in anti-counterfeiting object ID and new the first counterfeiting token write-in
Card, and by the second new counterfeiting token and it is transferred the ID write-in anti-counterfeiting label associated with the transfer token
Label;Delete and transfer the possession of token.
The anti-counterfeit server 103, is used for:Receive anti-counterfeiting object ID and be transferred false proof cellphone subscriber ID, generate and deposit
The storage transfer token associated with anti-counterfeiting object ID, the confirmation transfer that sending has transfer token ask to the false proof mobile phone of the owner with
It is transferred false proof mobile phone;According to the associated tag ID of the transfer token and it is transferred false proof cellphone subscriber ID and generates and store
New the first counterfeiting token and the second counterfeiting token, for sending;Include transferring the possession of setting for token from being transferred false proof mobile phone and receiving
Successful request is put, false proof mobile phone will be transferred and be arranged to the owner to transferring the possession of the related anti-counterfeiting object ID of token;And record friendship
Easy information;Delete and transfer the possession of token.
Figure 15 is one of structural representation of the false proof mobile phone of the present invention.As shown in figure 15, the false proof mobile phone includes:NFC
Control unit 1501, anti-counterfeiting information processing and control element (PCE) 1502, encrypting module 1503, safe data storage unit 1504, communication
Unit 1505.
Wherein:NFC control units 1501 are used to be communicated with anti-counterfeiting object, read the mark and safety letter of anti-counterfeiting object
Breath, packet ID containing antifalsification label.Anti-counterfeiting information control unit 1502 is used to handle false proof request, using counterfeiting token as defeated
Enter to call encrypting module to obtain accordingly result.Communication unit 1505 is used for and all false proof mobile phones of the communications of anti-counterfeit server
Message between anti-counterfeit server.Safe data storage unit 1504 is used to store ID, identification request token (including institute
The person of having identifies that token and nonowners identify token).Encrypting module 1503, which is used to handle, comes from anti-counterfeiting information processing and control element (PCE)
CIPHERING REQUEST, if the owner identify ask, flow such as Fig. 7;Identify and ask if nonowners, flow such as Figure 10.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.As shown in figure 16, on the basis of Figure 15, false proof mobile phone
Also include:NFC antenna 1607, telecom intelligent card 1606, short message receiving unit 1608.Wherein:NFC antenna 1607, for preventing
Antifalsification label carries out radio communication in pseudo- object;Telecom intelligent card 1606, for storing the ID of false proof user, log-on message;It is short
Receiving unit 1608 is believed, for receiving Antiforge inquiry result, and dependent authentication information.
Figure 17 is the structural representation of the false proof smart card of the present invention.As shown in figure 17, the smart card includes, and NFC-SWP leads to
Believe unit 1701, be responsible for communicating with false proof mobile phone NFC communication module;Machine cartoon letters unit 1702, it is responsible for false proof mobile phone and intelligence
The communication of card;Control unit 1703, it is responsible for the processing of all anti-counterfeiting information, the communication of unit;Encrypting module 1704 is responsible for
Calculating is encrypted;Data storage cell 1705 is responsible for storage security information data.
Figure 18 is the structural representation of antifalsification label of the present invention.As shown in figure 18, the antifalsification label includes, communication unit
1812, it is responsible for carrying out near-field communication with false proof mobile phone;Anti-counterfeiting information processing and control element (PCE) 1811, it is responsible for all false proof letters in label
The processing of breath, the communication between unit;Encrypting module 1813 is responsible for that calculating is encrypted, as anti-counterfeiting object is believed safely in Figure 10
Cease Y7 calculating or Fig. 7 in anti-counterfeiting object security information Y5;Data storage cell 1814 is responsible for data storage.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.As shown in figure 19, the system of the present embodiment is to Fig. 1
Shown system is refined, and the Antiforge system of the present embodiment specifically includes:
Antiforge system server 1920 is identical with foregoing Antiforge system server Figure 15.Wherein communication unit, authentication
Processing unit, anti-counterfeiting object database, Antiforge system service management unit, access qualification result query unit, short message sending list
Member is corresponding with each module in Figure 15, and its working method is identical.
False proof mobile phone 1910 is identical with the false proof mobile phone in foregoing false proof mobile phone Figure 16, Figure 17, wherein NFC antenna, NFC controls
Unit processed, communication unit, short message receiving unit, anti-counterfeiting information processing and control element (PCE), encrypting module, safe data storage unit with
Each module is corresponding in Figure 16, Figure 17, and its working method is identical.
Smart card 1900 is corresponding with telecom intelligent card in Figure 18, and working method is identical.
Anti-counterfeiting object 1940 is corresponding with anti-counterfeiting object in Fig. 1, and working method is identical.
The art work assignment method and device based on near-field communication technology of the present invention is described with reference to the accompanying drawings above.
This method forms the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including with
Between family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, server and mobile phone and label respectively
Respective data are updated in transference and are verified, so that it is guaranteed that links can be complete by the verification of multiple data
Into so as to realize that the art work turns into the safety anti-fake (registration, identification, transferring the possession of) of art sales behavior.Creator can be with simultaneously
Works information is recorded in the server, facilitates displaying, record and the management of art sales behavior.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.
Claims (16)
1. a kind of art work register method based on near-field communication technology, it is characterised in that comprise the following steps:
S201, anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone (102) from false proof
The tag ID read in label (101) creates and stores the establishment token and anti-counterfeiting object ID associated with the tag ID, sends out
Give false proof mobile phone (102) (308-310);
S202, the false proof mobile phone (102) receive from the anti-counterfeit server (103) and store the establishment token and described anti-
Pseudo- object ID simultaneously writes tag request to the antifalsification label (101) transmission;
S203, the antifalsification label (101) write tag request in the antifalsification label according to the false proof mobile phone (102)
(101) the anti-counterfeiting object ID and the ID are write in;
S204, the false proof mobile phone (102) input works information by user interface, and according to the anti-counterfeiting object ID, described
Works information and the establishment token send registration request to the anti-counterfeit server (103);
S205, it is described false proof with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive
Establishment token corresponding to object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information, generate
First counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone (102) to, delete
Except the establishment token;
S206, the false proof mobile phone (102) is by the anti-counterfeiting object ID and the institute received from the anti-counterfeit server (103)
The first counterfeiting token write-in smart card (104) is stated, and second counterfeiting token is write into the antifalsification label (101), is deleted
The establishment token.
2. method as claimed in claim 1, it is characterised in that methods described also includes:
S203, the antifalsification label (101) calculate the first tag security information (X1) according to tag ID and ID, and according to institute
State the first tag security information (X1) and calculate the second tag security information (X2) and be transmitted to the false proof mobile phone (102);
S204, the false proof mobile phone (102) send to the anti-counterfeit server (103) and carry the second tag security information
(X2), the anti-counterfeiting object ID, the works information and the registration request for creating token;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and it is stored in institute
The tag ID in anti-counterfeit server (103) and ID are stated to calculate the first tag security information phase with the antifalsification label
Same method calculates the 3rd tag security information (X3), and the anti-counterfeit server (103) uses the mark of asymmetric arithmetic decryption second
Sign security information (X2) and obtain the 4th tag security information (X4), if the 4th tag security information (X4) is equal to described the
Three tag security information (X3), then the second tag security is believed described in anti-counterfeit server (103) verification registration request
It is correct to cease (X2).
3. method as claimed in claim 1 or 2, it is characterised in that methods described also includes:
S201, the anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone from anti-counterfeiting label
The tag ID read in label (101) creates and stores the establishment token time limit associated with the tag ID;
S205, the anti-counterfeit server (103) judges that this establishment process is not above the establishment token time limit, and deletes wound
Build the token time limit.
4. method as claimed in claim 2, it is characterised in that methods described also includes:
S201, the label corresponding with the tag ID that anti-counterfeit server (103) inquiry prestores writes key, with non-
Symmetric encipherment algorithm, which transmits the label, writes key;
S202, the false proof mobile phone (102) receive the label from the anti-counterfeit server (103) and write key, the false proof hand
Machine (102) sends to write tag request and include the label to the antifalsification label (101) writes key;
S203, the antifalsification label (101) examine the label write key write with label preset in antifalsification label (101) it is close
Whether key is consistent, using the tag ID, ID and label local key is parameter in terms of 3DES encryption algorithm if consistent
The first tag security information (X1) is calculated, and institute is calculated with asymmetric arithmetic for parameter with the first tag security information (X1)
State the second tag security information (X2), label local key be equally stored in anti-counterfeit server and with a pair of tag ID 1
Should;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and it is stored in institute
Tag ID, ID and the label local key stated in anti-counterfeit server (103) calculate the 3rd for parameter with 3DES encryption algorithm
Tag security information (X3);And first counterfeiting token and second counterfeiting token are transmitted with rivest, shamir, adelman.
5. method as claimed in claim 1 or 2, it is characterised in that:
Works information includes described in S204:Author information, works content, works description, creative time, creative place.
6. method as claimed in claim 1 or 2, it is characterised in that:
Before S201, in addition to:The incidence relation of the tag ID and the ID is stored in anti-counterfeit server, and
Judge in step sl false proof mobile phone (102) transmission come ID whether with false proof mobile phone (102) from antifalsification label (101)
The tag ID association of reading.
A kind of 7. art work register method based on near-field communication technology performed as described in any one in claim 1-6
False proof mobile phone (102), it is characterised in that the false proof mobile phone is used for:
Read the tag ID in antifalsification label;
ID and tag ID are sent to anti-counterfeit server (103);
Simultaneously storage creation token and anti-counterfeiting object ID are received from anti-counterfeit server (103);
Establishment writes tag request for sending;
Works information is inputted by user interface, and is sent to the anti-counterfeit server (103) and carries the anti-counterfeiting object ID, institute
State works information and the registration request for creating token;
The first counterfeiting token and the second counterfeiting token are received, by the anti-counterfeiting object ID and from the anti-counterfeit server (103)
First counterfeiting token write-in smart card (104) received, and second counterfeiting token is write into the antifalsification label
(101);
And delete the establishment token.
8. mobile phone (102) as claimed in claim 7, it is characterised in that the mobile phone is additionally operable to:
Receive the second tag security information (X2);And the second label for carrying and receiving is sent to the anti-counterfeit server (103)
Security information (X2), the anti-counterfeiting object ID, the works information and the registration request for creating token.
9. mobile phone (102) as described in claim 7 or 8, it is characterised in that the mobile phone is additionally operable to:
The label, which is received, from the anti-counterfeit server (103) writes key;Sent to the antifalsification label (101) and carry the mark
What label write key writes tag request.
10. mobile phone (102) as described in claim 7 or 8, it is characterised in that:
The works information includes:Author information, works content, works description, creative time, creative place.
A kind of 11. art work registration side based on near-field communication technology performed as described in any one in claim 1-6
The anti-counterfeit server (103) of method, it is characterised in that the anti-counterfeit server is used for:
According to the ID and tag ID received, create and store the establishment token associated with the tag ID and false proof right
As ID, for sending;
Receive and carry anti-counterfeiting object ID, works information and the registration request for creating token, confirm the wound in the registration request of reception
It is consistent with the establishment token corresponding to the anti-counterfeiting object ID received to build token, it is to register for the first time to determine the tag ID,
Then store works information;
Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, for sending;
Delete the establishment token.
12. server as claimed in claim 11, it is characterised in that the anti-counterfeit server is used for:
Receive and carry the second tag security information (X2), anti-counterfeiting object ID, works information and the registration request for creating token, according to
Establishment token in registration request is corresponding and the tag ID that is stored in the anti-counterfeit server (103) and ID with it is anti-
Pseudo label calculates X1 identicals method and calculates the 3rd tag security information (X3), and the anti-counterfeit server (103) uses asymmetric
Algorithm decrypts the second tag security information (X2) and obtains the 4th tag security information (X4), if the 4th tag security information
(X4) it is equal to the 3rd tag security information (X2), then the anti-counterfeit server (103) is verified described in the registration request
Second tag security information (X2) is correct.
13. the server as described in claim 11 or 12, it is characterised in that the anti-counterfeit server is additionally operable to:
ID and tag ID according to receiving create and store the establishment token time limit associated with the tag ID;
The anti-counterfeit server (103) judges that this registration process is not above the establishment token time limit;
And delete and create the token time limit.
14. the server as described in claim 11 or 12, it is characterised in that the anti-counterfeit server is additionally operable to:
Inquire about the label corresponding with the tag ID prestored and write key, the label is transmitted with rivest, shamir, adelman
Write key;
Corresponding to the establishment token in registration request and be stored in the anti-counterfeit server (103) tag ID,
ID and label local key are that parameter calculates the 3rd tag security information (X3) with 3DES encryption algorithm;And added with asymmetric
Close algorithm transmits first counterfeiting token and second counterfeiting token.
15. the server as described in claim 11 or 12, it is characterised in that:
The works information includes:Author information, works content, works description, creative time, creative place.
A kind of 16. Antiforge system (100) based on near-field communication technology, it is characterised in that:
Including the false proof mobile phone (102) described in antifalsification label (101), claim 7 and the false proof service described in claim 11
Device (103).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410006029.0A CN103745365B (en) | 2014-01-07 | 2014-01-07 | A kind of register method based on near-field communication technology, false proof device and Antiforge system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410006029.0A CN103745365B (en) | 2014-01-07 | 2014-01-07 | A kind of register method based on near-field communication technology, false proof device and Antiforge system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103745365A CN103745365A (en) | 2014-04-23 |
CN103745365B true CN103745365B (en) | 2017-12-19 |
Family
ID=50502381
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410006029.0A Expired - Fee Related CN103745365B (en) | 2014-01-07 | 2014-01-07 | A kind of register method based on near-field communication technology, false proof device and Antiforge system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103745365B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105871A (en) * | 1992-07-16 | 2000-08-22 | Telxon Corporation | Portable bar code scanner apparatus |
CN100410958C (en) * | 2003-12-04 | 2008-08-13 | 武汉矽感科技有限公司 | Antifalse antipirated edition terninal equipment and method |
US7677461B2 (en) * | 2005-03-10 | 2010-03-16 | Mil. Digital Labeling Inc. | Digital labels for product authentication |
JP5728975B2 (en) * | 2011-01-31 | 2015-06-03 | ソニー株式会社 | Information processing apparatus and method, and program |
CN102779284B (en) * | 2012-01-30 | 2015-05-20 | 张楠 | RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like |
-
2014
- 2014-01-07 CN CN201410006029.0A patent/CN103745365B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Also Published As
Publication number | Publication date |
---|---|
CN103745365A (en) | 2014-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12014338B2 (en) | Device for directly transmitting electronic coin data records to another device, and payment system | |
US20230093581A1 (en) | Method for directly transferring electronic coin data sets between terminals, payment system, currency system and monitoring unit | |
CN101098225B (en) | Safety data transmission method and paying method, paying terminal and paying server | |
CN109034793A (en) | Digital cash method of commerce and digital cash wallet hardware based on block chain | |
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
CN105684346B (en) | Ensure the method for air communication safety between mobile application and gateway | |
CN1588386B (en) | System and method for realizing article information detection by radio frequency identification and mobile communication combination | |
CN104994114B (en) | A kind of identity authorization system and method based on electronic ID card | |
CN104412536B (en) | Credential management method | |
CN107771383A (en) | At least two authenticating devices are mapped to the method for user account using certificate server | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets | |
CN101300808A (en) | Method and arrangement for secure autentication | |
EP1451786A1 (en) | A method of distributing a public key | |
AU7560298A (en) | Electronic transaction | |
KR20190132159A (en) | Method for Providing Cryptocurrency Trading Platform based on Blockchain by using Smart Contract | |
KR20190132054A (en) | Method for Providing Cryptocurrency Trading Platform by using Smart Contract based on Blockchain | |
CN104125230A (en) | Short message authentication service system and authentication method | |
US20230091509A1 (en) | Method for directly transmitting electronic coin datasets between terminals, payment system, protection system and monitoring entity | |
CN103763007B (en) | Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology | |
CN103186805A (en) | Smart card and signature authentication method based on smart card | |
CN109088729A (en) | Key storage method and device | |
CN103761655B (en) | A kind of assignment method based on near-field communication technology, false proof device and Antiforge system | |
CN105072084B (en) | Method for establishing data connection between mobile terminal and external device | |
CN103745365B (en) | A kind of register method based on near-field communication technology, false proof device and Antiforge system | |
KR20190115551A (en) | Method for Providing Cryptocurrency Trade by using Smart Contract based on Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171219 |