CN106934633A - A kind of novel film coating two-dimension code anti-counterfeit traceability system and method - Google Patents
A kind of novel film coating two-dimension code anti-counterfeit traceability system and method Download PDFInfo
- Publication number
- CN106934633A CN106934633A CN201710051749.2A CN201710051749A CN106934633A CN 106934633 A CN106934633 A CN 106934633A CN 201710051749 A CN201710051749 A CN 201710051749A CN 106934633 A CN106934633 A CN 106934633A
- Authority
- CN
- China
- Prior art keywords
- commodity
- quick response
- response code
- overlay film
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
Abstract
The invention belongs to planar bar code technology field, disclose it is a kind of the false proof method and system traced to the source are carried out to commodity based on overlay film Quick Response Code, be attached to overlay film Quick Response Code on commodity by methods described(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics peel off, the unique sequence numbers and its corresponding cipher feature value of Quick Response Code commodity comprising associated by.The scheme low cost, safe, barcode scanning reads faster than manually entering speed, friendly with internet can access, the fast-developing trend of current mobile Internet is adapted to, adds the air brushing of intermediate transit point Quick Response Code to be traced to the source with realizing route, application prospect is widely.
Description
Technical field
The invention belongs to areas of information technology, and in particular to planar bar code technology field and password field, particularly Quick Response Code
Anti-counterfeit field.
Background technology
Current anti-counterfeiting technology, is mostly based on material, physical characteristic, technique, chemistry, numeral, material technology and chemistry
False proof, it is high to there is design and manufacture cost, the characteristics of differentiating difficult, and quickly cannot incorporate internet;Digital anti-counterfeiting is divided into high-grade
Chip, inferior grade chip, without hardware(Chip)Deng, wherein using the high-grade chip of high cost, due to that cannot replicate chip in
Data, can be good with off-line verification, antifalse effect, but high cost and cannot large-scale promotion;Using low without hardware anti-counterfeiting cost
But be easily replicated, can only online verification, online verification there is also two problems, one be can infinite copy, during online verification only
Can determine that first verifier is that true other are false, even if first is can only also judging by accident for vacation, and genuine piece will be mistaken for
False product;Two is if identifying code generating mode is very simple, even if it is true that the equally possible personation of identifying code is not seen after being obtained by others
Product are by checking.
Therefore, we devise one, that is, plus overlay film, can not be wanted due to verifying arbitrarily by people to the method for background authentication
Destruction, common people will not go arbitrarily checking, in addition, employing cryptographic technique realizes that security code is unpredictable.
The content of the invention
Commodity are carried out with the false proof method traced to the source the invention discloses a kind of use overlay film Quick Response Code, including:Set up one
On-line authentication center, sets up product database of tracing to the source, and the database comprises at least the unique sequence numbers of each commodity, Duo Gehuan
Section(Logistics website, multistage whole seller, consumer)Whether mark etc. was queried.
The product false proof to each needs, according to logistics terminal points, multistage wholesale quotient, consumer's number, if printing
Dry Quick Response Code.It is attached to after overlay film(Or be attached to using other modes)On commodity and cannot, physics complete with commodity peel off.
Quick Response Code comprises at least the unique sequence numbers of the commodity, and
1:The electronic signature of manufacturer or authoritative department to above- mentioned information;Or
2:The information that manufacturer or authoritative department are encrypted to above- mentioned information by symmetric cryptographic algorithm;Or
3:The Hash Value that manufacturer or authoritative department are calculated by the hash cryptographic algorithm with key(Cryptographic Hash);Or
4:Unpredictable random number R more long.
Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape covering for its correspondence Quick Response Code off
On-line authentication center applications system is sent to after film, the mobile phone or terminal scanning Quick Response Code, for 1, system is to digital A.L.S.
Breath is verified that, for 2, system is decrypted to ciphertext, and for 3, system contains unique sequence code according to original rule to commodity bundle
Number essential information calculate Hash Value, for 4, system searches corresponding unpredictable random number R in database, if above-mentioned
Calculated value(Or random number R)To matching and should not being queried in the record of unique sequence numbers commodity, then return mobile phone or
The end of scan commodity are genuine pieces;Mistake in computation does not return to false product then in database this record;Calculate correctly or in number
According to storehouse, but it has been queried, has informed and be queried, has there will more than likely be personation risk.
Received the commodity of inquiry, and the commodity were marked in authentication center's database and has been queried.If inquiring about first
And issuer is certification user, and the user and commodity relation can be marked in database(For example certain user is as consumption
Person carried out inquiry), and generate correspondence signature value, be passed back to user, on commodity air brushing contain user and commodity relation and its
The Quick Response Code of signature value content, forms traceability mechanism, in case subsequent query.
Safe due to program low cost, barcode scanning is read than manually entering speed soon, can be connect with internet close friend
Enter, be adapted to the fast-developing trend of current mobile Internet, add the air brushing of intermediate transit point Quick Response Code to be traced back with realizing route
Source, application prospect is widely.
Brief description of the drawings
Fig. 1 is the FB(flow block) that the present invention carries out the false proof method traced to the source using overlay film Quick Response Code to commodity.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with drawings and Examples, to this hair
It is bright to be explained in further detail.It should be appreciated that specific embodiment described herein is used only for explaining of the invention, and without
It is of the invention in limiting.
Conversely, the present invention covers any replacement done in spirit and scope of the invention being defined by the claims, repaiies
Change, equivalent method and scheme.Further, in order that the public has a better understanding to the present invention, below to of the invention thin
It is detailed to describe some specific detail sections in section description.Part without these details for a person skilled in the art
Description can also completely understand the present invention.
A kind of use overlay film Quick Response Code carries out the false proof method traced to the source to commodity, and the method is based on overlay film, wherein will be unique
Characteristic value, unpredictable not reproducible Quick Response Code are attached on commodity, and the Quick Response Code cannot realize complete, physics with commodity
Peel off, the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, just visible Quick Response Code after only the overlay film is struck off should
Two-dimentional digital content includes the unique sequence numbers and its corresponding cipher feature value of associated commodity, and the wherein unique sequence numbers can be with
Prediction is disclosed, and the cipher feature value can be by the key that only has authentication center's system just to know to comprising unique sequence numbers
Multiple elements are encrypted(Or signature or hash)Calculate and obtain, or matching one is complete in authentication center's system database
Complete unpredictable random number R is obtained.
Referring to accompanying drawing 1, methods described following steps:
Step 1:Set up an on-line authentication centring system, the centring system is traced to the source product database, the data including foundation
Storehouse comprises at least:The unique sequence numbers of each commodity, and multiple links(Logistics transfer website, multistage whole seller, consumption
Person)Whether mark of the commodity etc. was inquired about.
Step 2:To each false proof commodity of needs, according to logistics terminal points, multistage wholesale quotient, consumer number
Mesh, prints several Quick Response Codes.It is attached to after overlay film(Or be attached to using other modes, for example can not after overlay film but opening commodity
See)On commodity and cannot, physics complete with commodity peel off.
The Quick Response Code is comprised at least:
1) unique sequence numbers of the commodity, and manufacturer or authoritative department are to commodity essential information(Date of manufacture, production firm,
The information such as production batch)Electronic signature or 2)The encryption information 3 of manufacturer or authoritative department to above- mentioned information)Or manufacturer or authority
Department calculates the Hash Value with key to above- mentioned information;Or unpredictable random number R more long.
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding two dimension off
Code overlay film, it is described with the computation subsystem that on-line authentication centring system is sent to after mobile phone or the terminal scanning Quick Response Code
Subsystem is calculated(For above-mentioned to 1), 2), 3))Or search(To 4))Commodity comprising the unique sequence numbers and cipher feature value
Whether in database and it was not queried;
1. if so, then returning to genuine piece,
If 2. mistake in computation or not in database, false product are returned to,
3. if calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
Wherein, judge that the standard that the commodity were queried is:Unique sequence of the commodity is found in product database of tracing to the source
The encryption that signing messages is correct, manufacturer or authoritative department are to above- mentioned information of row number, manufacturer or authoritative department to above- mentioned information is believed
Breath is correct, manufacturer or authoritative department above- mentioned information is calculated the Hash Value with key it is correct or through search it is unpredictable compared with
Random number R long is matching.
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried.If first
Inquiry and issuer is certification user, can mark the user and commodity relation in database, and generate correspondence signature value,
User is passed back to, air brushing contains user and commodity relation and its Quick Response Code of signature value content on commodity, forms traceability mechanism,
In case subsequent query.
Quick Response Code signature value calculating method is specially wherein in step 2:
1)To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, using in computing subsystem
Private key is digitally signed(For example with cryptographic algorithms such as SM2 or RSA)
2)Quick Response Code encrypts value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem is using symmetrical close
Key carries out one-level or carries out multilevel symmetrical encryption(For example with cryptographic algorithms such as SM1, SM4, SM7 or AES).
Wherein one-level disperses computational methods:Using system root key to dispersion factor(Such as commodity unique sequence numbers)Added
It is close to obtain merchandise news encryption key;
Multistage dispersion computational methods(By taking level Four key as an example):
System root key is to one-level dispersion factor(Such as vendor code)It is encrypted and obtains two grades of root keys;
Two grades of root keys are to the secondary breakup factor(Such as production batch)It is encrypted and obtains three-level root key;
Three-level root key is to three-level dispersion factor(Such as commodity unique sequence numbers)It is encrypted and obtains level Four key(Merchandise news adds
Key);
3)Quick Response Code hash value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem uses root key
Carry out one-level(It is multistage)Distributed key carries out hash(For example with cryptographic algorithms such as SM3 or SHA)
Key Multistage dispersion method is ibid
4)Quick Response Code random value R acquisition methods:
Generation batch random number, distributes to each commodity, and recorded in database.
Claims (8)
1. a kind of that commodity are carried out with the false proof method traced to the source based on overlay film Quick Response Code, overlay film Quick Response Code is attached to business by methods described
On product, it is characterised in that the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics
Peel off, the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity.
2. method according to claim 1, it is characterised in that the unique sequence numbers can predict or open, the password
Characteristic value can be carried out by the key for only having authentication center's system just to know to the multiple information elements comprising unique sequence numbers
Encryption(Or signature or hash)Calculate obtain, or in the database of the system match one completely it is unpredictable with
Machine number R is obtained.
3. method according to claim 2, methods described is specifically included:
Step 1:An on-line authentication centring system is set up, the centring system includes a product database of tracing to the source, the data
Storehouse comprises at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
Step 2:Several are printed on the false proof commodity of each needs and scrapes just visible Quick Response Code off;The Quick Response Code is carried out
Encryption(Or signature or hash)Calculate, or a complete unpredictable random number R is matched in the database of the system
Obtain cipher feature value;And be attached on commodity after overlay film and cannot, physics complete with commodity peel off;Or not overlay film but nothing
Method is directly scanned out, for example, to take commodity packaging apart;
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding Quick Response Code off and cover
The computation subsystem of on-line authentication centring system, the subsystem are sent to after film, the mobile phone or terminal scanning Quick Response Code
It is computed or looked up whether the commodity comprising the unique sequence numbers and cipher feature value in database and were not queried;
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried;If inquiring about first
And issuer is certification user, the user and commodity relation can be marked in database, and generate correspondence signature value, loopback
To user, user's air brushing on commodity contains user and commodity relation and its Quick Response Code of signature value content, forms traceability mechanism,
In case subsequent query.
4. method according to claim 3, it is characterised in that the Quick Response Code is comprised at least:The unique sequence code of the commodity
Number and the electronic signature of merchandise news including sequence number or the encryption information of the merchandise news or the merchandise news
Key Hash Value;Or unpredictable random number more long.
5. method according to claim 3, it is characterised in that the specific judgement wherein in step 3 is:
1)If in database and not being queried, then genuine piece is returned to,
2)It is middle to return to false product if calculate there is mistake or not in database,
3)If calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
6. method according to claim 3, it is characterised in that Quick Response Code encryption value calculating method wherein in step 2:
To Quick Response Code merchandise news(The information such as unique sequence numbers, date of manufacture, production firm, production batch)Using symmetric key
Carry out one or more levels symmetric cryptography;
Wherein one-level computational methods:System symmetric key is encrypted to dispersion factor and obtains merchandise news encryption key;
Multistage dispersion computational methods:
This grade of root key of system is encrypted subordinate's dispersion factor and obtains subordinate(Root)Key;
Wherein Quick Response Code hash value calculating method is:
To Quick Response Code merchandise news, using root key, one or more levels dispersion carries out hash;
The random value-acquiring method of Quick Response Code:
Generation batch random number, distributes to each commodity, and recorded in database.
7. method according to claim 1, it is characterised in that methods described can be replaced with and for Quick Response Code be attached to commodity
On, Quick Response Code top not overlay film, but Quick Response Code cannot be directly scanned out and arrived, it is necessary to take commodity packaging apart and could scan, and it is described
Quick Response Code and commodity cannot completely, physics peel off, Quick Response Code unique sequence numbers of commodity and its corresponding close comprising associated by
Code characteristic value.
8. it is a kind of that the false proof system traced to the source is carried out to commodity based on overlay film Quick Response Code, it is characterised in that the overlay film Quick Response Code is attached
On commodity(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code include one
Layer and can scan Quick Response Code at overlay film, and the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity;
The system includes online authentication center's system, and the on-line authentication centring system includes a product database of tracing to the source,
The database is comprised at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
On-line authentication centring system also includes a computation subsystem, wherein the subsystem is computed or looked up comprising this only
Whether the commodity of one sequence number and cipher feature value in database and were not queried;Received inquiry, in the data
The commodity are marked in storehouse to be queried;If inquiry first and issuer is certification user, can be marked in database
The user and commodity relation, and correspondence signature value is generated, user is passed back to, and air brushing contains user and commodity relation on commodity
And its Quick Response Code of signature value content, traceability mechanism is formed, in case subsequent query.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710051749.2A CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710051749.2A CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106934633A true CN106934633A (en) | 2017-07-07 |
Family
ID=59423502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710051749.2A Pending CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106934633A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977434A (en) * | 2017-12-01 | 2018-05-01 | 珠海市魅族科技有限公司 | Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code |
CN108694429A (en) * | 2018-05-11 | 2018-10-23 | 张玉 | A kind of generation method of Quick Response Code and recognition methods |
CN109461010A (en) * | 2018-11-16 | 2019-03-12 | 重庆工商职业学院 | Fake products tracking based on big data |
CN110210877A (en) * | 2019-06-06 | 2019-09-06 | 大族激光科技产业集团股份有限公司 | A kind of anti-fake management method and anti-fake data entry method |
CN111127046A (en) * | 2019-12-26 | 2020-05-08 | 赵建林 | Method and system for realizing digital multi-dimensional anti-counterfeiting tracing by adopting artificial intelligence |
CN111415173A (en) * | 2020-03-16 | 2020-07-14 | 可可奇货(深圳)科技有限公司 | Method for encrypting and verifying commodity integrity |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496114A (en) * | 2011-11-22 | 2012-06-13 | 成都天钥科技有限公司 | Method and system for product counterfeiting prevention and method and device for identity information generation |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN104574119A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Commodity identifying and tracing method |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
-
2017
- 2017-01-20 CN CN201710051749.2A patent/CN106934633A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496114A (en) * | 2011-11-22 | 2012-06-13 | 成都天钥科技有限公司 | Method and system for product counterfeiting prevention and method and device for identity information generation |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
CN104574119A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Commodity identifying and tracing method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977434A (en) * | 2017-12-01 | 2018-05-01 | 珠海市魅族科技有限公司 | Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code |
CN108694429A (en) * | 2018-05-11 | 2018-10-23 | 张玉 | A kind of generation method of Quick Response Code and recognition methods |
CN108694429B (en) * | 2018-05-11 | 2021-03-02 | 张玉 | Two-dimensional code generation method and identification method |
CN109461010A (en) * | 2018-11-16 | 2019-03-12 | 重庆工商职业学院 | Fake products tracking based on big data |
CN109461010B (en) * | 2018-11-16 | 2021-06-08 | 重庆工商职业学院 | Big data-based counterfeit product tracking method |
CN110210877A (en) * | 2019-06-06 | 2019-09-06 | 大族激光科技产业集团股份有限公司 | A kind of anti-fake management method and anti-fake data entry method |
CN110210877B (en) * | 2019-06-06 | 2024-01-23 | 大族激光科技产业集团股份有限公司 | Anti-counterfeiting management method and anti-counterfeiting data input method |
CN111127046A (en) * | 2019-12-26 | 2020-05-08 | 赵建林 | Method and system for realizing digital multi-dimensional anti-counterfeiting tracing by adopting artificial intelligence |
CN111127046B (en) * | 2019-12-26 | 2023-09-05 | 赵建林 | Method and system for realizing digital multidimensional anti-counterfeiting tracing by adopting artificial intelligence |
CN111415173A (en) * | 2020-03-16 | 2020-07-14 | 可可奇货(深圳)科技有限公司 | Method for encrypting and verifying commodity integrity |
CN111415173B (en) * | 2020-03-16 | 2023-05-02 | 可可奇货(深圳)科技有限公司 | Commodity integrity encryption and verification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106934633A (en) | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method | |
US10547446B2 (en) | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items | |
US20190013950A1 (en) | Method And System For Privacy-Preserving Social Media Advertising | |
US7673144B2 (en) | Cryptographic system for group signature | |
US8112626B1 (en) | Method and apparatus to provide public key authentication with low complexity devices | |
CN102004965B (en) | Double ant-counterfeiting method and system of product | |
CN107431622A (en) | The blocking tracking in supply chain occurs | |
CN106452756A (en) | Construction verification method and device capable of verifying security two-dimensional code offline | |
US20050169461A1 (en) | Method and device for anonymous signature with a shared private key | |
JP2009508430A (en) | Device, system and method for determining authenticity of items | |
CN106548353B (en) | Commodity anti-counterfeiting code generation and verification method | |
CN104299140A (en) | Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce | |
JP2007507120A (en) | Product protection gateway and method for checking product authenticity | |
CN110597836B (en) | Information inquiry request response method and device based on block chain network | |
CN113034128B (en) | Block chain-based data transaction and right confirmation method | |
Rührmair | Simpl systems: On a public key variant of physical unclonable functions | |
US10484182B2 (en) | Encrypted text verification system, method, and recording medium | |
CN106209730B (en) | Method and device for managing application identifier | |
CN104424568A (en) | Authentication false-proof traceability system employing circuit core chip ID number as identification | |
CN110321734A (en) | A kind of file verification method and device | |
García-Rodríguez et al. | To pass or not to pass: Privacy-preserving physical access control | |
CN116611851A (en) | Hotpot condiment product tracing method and system based on blockchain | |
CN110245965B (en) | Safety method for ice cream stick data processing system and ice cream stick with two-dimensional code | |
Hamian et al. | Blockchain-based User Re-enrollment for Biometric Authentication Systems | |
Itakura et al. | Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170707 |
|
RJ01 | Rejection of invention patent application after publication |