RFID electronic tag anti-counterfeiting methodTechnical Field
The invention relates to the technical field of electronic tag anti-counterfeiting, in particular to an RFID electronic tag anti-counterfeiting method.
Background
In the RFID (radio frequency identification technology), each RFID tag is unique, and thus, the RFID tag may be used in the anti-counterfeit field, such as anti-counterfeit of valuables such as wine and medicines, by establishing a one-to-one correspondence relationship between the RFID tag and the product.
The conventional RFID anti-counterfeiting method comprises the steps that fragile materials such as fragile paper and ceramic chips are used as a base material or a base antenna, a chip has a safety algorithm and supports identity authentication, and when RFID transfer is carried out, the antenna is damaged, so that a label cannot work continuously; however, only the antenna is damaged by the method, and the label can be reused by a counterfeiter by packaging the chip and the new antenna, so that the anti-counterfeiting effect is poor.
Disclosure of Invention
In view of the above, an object of the present invention is to provide an RFID electronic tag anti-counterfeit method, which supports identity authentication and can effectively prevent a chip from being transferred and reused.
In order to achieve the purpose, the technical scheme of the invention is as follows:
an anti-counterfeiting method for an RFID electronic tag comprises the following steps:
at least 3 electric connection convex points on a chip of the RFID electronic tag are connected with two ends of a radio frequency communication coil and a tamper-proof detection coil, and the radio frequency communication coil supplies energy to the RFID electronic tag through electromagnetic coupling; wherein, at least one of the two electric connection salient points connected with the two ends of the radio frequency communication coil and the two electric connection salient points connected with the two ends of the anti-tamper detection coil is different;
an encryption and decryption algorithm for identity authentication is built in a chip of the RFID electronic tag;
the RFID electronic tag is attached to a commodity seal, a tamper-proof detection coil is connected with the commodity seal, and the tamper-proof detection coil is disconnected when the RFID electronic tag is used for the first time;
sending a detection instruction to the RFID electronic tag, wherein the RFID electronic tag returns the state information of whether the tamper-proof detection coil is damaged.
Further, the method also comprises the following steps:
sending an identity authentication instruction to the RFID electronic tag through the intelligent terminal with the NFC, and returning a random number RT to the electronic tag chip;
the intelligent terminal sends an authentication and verification instruction, and the verification instruction carries a ciphertext Token1 containing RR and RT information;
the RFID electronic tag decrypts Token1, sends a response ciphertext Token2 after comparing the RT with the RT, and the intelligent terminal decrypts Token2 and completes identity authentication after comparing the RR with the RT.
Further, when the identity authentication fails, the RFID electronic tag is judged to be an unofficial tag, and the trusted traceability process is terminated;
if the identity authentication is successful, the RFID electronic tag is judged to be an official certified product, the complete traceability information can be obtained, and the commodity traceability information and the tamper-proof detection coil damage state are displayed.
Further, an encryption and decryption key matched with the encryption and decryption algorithm is generated through a multi-level decentralized strategy.
Further, the material of the electrical connection bumps of the RFID electronic tag is gold or copper.
Furthermore, the chip is provided with 4 electric connection salient points, wherein two electric connection salient points are connected with the radio frequency communication coil, and the other two salient points are connected with the tamper-proof detection coil.
Further, the 4 electrical connection bumps are distributed at four corners of the chip.
The invention has the beneficial effects that: the method comprises the steps that a chip with a security algorithm, a radio frequency communication coil and a tamper-proof detection coil are arranged, the chip supports security calculation and authentication functions, one-object one-code identity application can be realized, and bidirectional communication with NFC (near field communication) master control equipment can be realized in a high-frequency band by adopting a passive communication mode;
on the other hand, the radio frequency communication coil is connected with the chip salient point to achieve energy acquisition in an electromagnetic coupling mode, the tamper-proof detection coil is connected with the chip salient point, after the tamper-proof detection coil is broken due to commodity unsealing, the unsealed state can be identified by scanning again, and the unsealed state is transmitted to the NFC master control device according to a relevant protocol, so that the requirements of identity authentication, product anti-counterfeiting and the like are met;
in addition, in the method, the electronic tag can continue to work after being unsealed, whether the electronic tag is unsealed or not can be identified, the chip can be effectively prevented from being transferred and reused, the anti-counterfeiting function and the anti-transferring function are achieved, and the credible traceability of the commodity is really achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive exercise.
FIG. 1 is a block diagram of an RFID tag according to an embodiment of the present invention;
FIG. 2 is a structural assembly diagram of an RFID tag according to an embodiment of the present invention;
fig. 3 is a chip structure diagram of an RFID electronic tag according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The examples are given for the purpose of better illustration of the invention, but the invention is not limited to the examples. Therefore, those skilled in the art should make insubstantial modifications and adaptations to the embodiments of the present invention in light of the above teachings and remain within the scope of the invention.
Example 1
In the present embodiment, an RFID electronic tag for anti-counterfeiting and anti-tampering is provided, and referring to fig. 1, fig. 2 and fig. 3, the RFID electronic tag includes achip 1, a radiofrequency communication coil 2, ananti-tampering detection coil 3, and anantenna substrate 4; in a specific embodiment, the structure diagram of thechip 1 can refer to fig. 3, thechip 1 is provided with 4 bumps distributed at four corners of the chip, wherein LA and LB are two radio frequency antenna bumps of the chip, and are connected with two ends of the radiofrequency communication coil 2 and used for receiving radio frequency signals and collecting energy; TD1 and TD2 are two detection bumps connected to both ends of the tamper-proof coil 3, and the chip determines the opening state of the product by detecting whether the TD1 and TD2 bumps are conductive, that is, whether the tamper-proof coil 3 is conductive, and prevents thechip 1 from being transferred and reused by detecting and recording the state; of course, in other embodiments, only one of the two electrical connection bumps connected to both ends of the radio-frequency communication coil 2 and the two electrical connection bumps connected to both ends of the tamper-resistant coil 3 may be the same.
In this embodiment, thechip 1 is provided with an encryption/decryption algorithm therein, supports the identity authentication process, and realizes the authenticity identification of the commodity, and the tamper-proof detection coil 3 is longer in shape, and thechip 1 and theantenna base material 4 are packaged together to form an RFID electronic tag for anti-counterfeiting and tamper-proof.
Based on the above anti-counterfeit and tamper-proof RFID electronic tag, this embodiment further provides an anti-counterfeit method for an RFID electronic tag, including the following steps:
s1: at least 3 electric connection salient points on a chip of the RFID electronic tag are connected with a radio frequency communication coil and a tamper-proof detection coil, and the radio frequency communication coil supplies energy to the RFID electronic tag through electromagnetic coupling;
in the step, the radiofrequency communication coil 2 acquires energy in an electromagnetic coupling mode to provide energy support for data communication between the passive chip and the NFC equipment; the on-off of the tamper-proof detection coil 3 determines the unsealing state of the commodity, and the chip is prevented from being transferred and reused by detecting and recording the state;
s2: an encryption and decryption algorithm for identity authentication is built in a chip of the RFID electronic tag;
in the embodiment, an encryption and decryption algorithm is built in achip 1 of an RFID electronic tag, an identity authentication process is supported, and authenticity identification of a commodity is realized, specifically, when the RFID electronic tag is initialized, a unique key is generated based on a multistage dispersion strategy and written into the chip before the tag is attached to a commodity object, and the encryption and decryption algorithm is used for an identity authentication process based on a security algorithm;
preferably, the encryption and decryption algorithm set in this step is used in the identity process: the NFC terminal equipment or the NFC mobile phone sends an identification request instruction, and the electronic tag chip returns a random number RT; and then, the intelligent terminal sends an authentication verification instruction, the instruction carries a ciphertext Token1 containing RR and RT information, the electronic tag chip decrypts Token1, sends a response ciphertext Token2 after comparing the RT information with the RT information, the intelligent terminal decrypts Token2, and the authentication process is completed after comparing the RR information with the RR information.
S3: the RFID electronic label is attached to the commodity seal, the anti-tamper detection coil is connected with the commodity seal, and the anti-tamper detection coil is disconnected when the RFID electronic label is used for the first time;
in this embodiment, the RFID tag is attached to the product closure during use, and the long tamper-proof coil 3 is attached to the product closure, and when the product is used, the closure is torn, and the tamper-proof coil 3 attached to the closure is also destroyed.
S4: and sending a detection instruction to the RFID electronic tag, and returning the state information of whether the tamper-proof detection coil is damaged or not to the RFID electronic tag.
In the step, whether the RFID electronic tag is tampered and reused is detected, specifically, an NFC terminal device or an NFC mobile phone sends a bottle opening detection instruction, and the electronic tag returns state information whether the secondary coil is damaged or not;
specifically, the radiofrequency communication coil 2 in this embodiment obtains energy based on the electromagnetic coupling principle to provide the energy to thechip 1, activates thechip 1 to start working, and automatically detects the connection state of TD1 and TD2, that is, the connection state of the tamper-proof detection coil 3 after thechip 1 is activated, the state is set as an un-disconnected state, and when the tamper-proof detection coil 3 is disconnected, thechip 1 permanently modifies the state value to be disconnected; when the tamper-proof coil 3 is reconnected or thechip 1 is transferred for reuse, the state of the tamper-proof coil 3 can be checked in thechip 1 and it can be detected whether thechip 1 has been tampered with.
Preferably, in this step, the commodity can be traced, an identity authentication process is initiated through the NFC terminal device or the NFC mobile phone, the authentication process may refer to step S2, and if the authentication fails, it is determined as an unofficial label and the trusted tracing process is terminated; if the identity authentication is successful, the genuine product is confirmed, then the complete traceability information is retrieved from the background, the tampering detection process in the step S4 is executed, and finally the commodity traceability information and the unsealing state are displayed.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.