CN106934633A - A kind of novel film coating two-dimension code anti-counterfeit traceability system and method - Google Patents

A kind of novel film coating two-dimension code anti-counterfeit traceability system and method Download PDF

Info

Publication number
CN106934633A
CN106934633A CN201710051749.2A CN201710051749A CN106934633A CN 106934633 A CN106934633 A CN 106934633A CN 201710051749 A CN201710051749 A CN 201710051749A CN 106934633 A CN106934633 A CN 106934633A
Authority
CN
China
Prior art keywords
commodity
quick response
response code
overlay film
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710051749.2A
Other languages
Chinese (zh)
Inventor
李智虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710051749.2A priority Critical patent/CN106934633A/en
Publication of CN106934633A publication Critical patent/CN106934633A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Abstract

The invention belongs to planar bar code technology field, disclose it is a kind of the false proof method and system traced to the source are carried out to commodity based on overlay film Quick Response Code, be attached to overlay film Quick Response Code on commodity by methods described(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics peel off, the unique sequence numbers and its corresponding cipher feature value of Quick Response Code commodity comprising associated by.The scheme low cost, safe, barcode scanning reads faster than manually entering speed, friendly with internet can access, the fast-developing trend of current mobile Internet is adapted to, adds the air brushing of intermediate transit point Quick Response Code to be traced to the source with realizing route, application prospect is widely.

Description

A kind of novel film coating two-dimension code anti-counterfeit traceability system and method
Technical field
The invention belongs to areas of information technology, and in particular to planar bar code technology field and password field, particularly Quick Response Code Anti-counterfeit field.
Background technology
Current anti-counterfeiting technology, is mostly based on material, physical characteristic, technique, chemistry, numeral, material technology and chemistry False proof, it is high to there is design and manufacture cost, the characteristics of differentiating difficult, and quickly cannot incorporate internet;Digital anti-counterfeiting is divided into high-grade Chip, inferior grade chip, without hardware(Chip)Deng, wherein using the high-grade chip of high cost, due to that cannot replicate chip in Data, can be good with off-line verification, antifalse effect, but high cost and cannot large-scale promotion;Using low without hardware anti-counterfeiting cost But be easily replicated, can only online verification, online verification there is also two problems, one be can infinite copy, during online verification only Can determine that first verifier is that true other are false, even if first is can only also judging by accident for vacation, and genuine piece will be mistaken for False product;Two is if identifying code generating mode is very simple, even if it is true that the equally possible personation of identifying code is not seen after being obtained by others Product are by checking.
Therefore, we devise one, that is, plus overlay film, can not be wanted due to verifying arbitrarily by people to the method for background authentication Destruction, common people will not go arbitrarily checking, in addition, employing cryptographic technique realizes that security code is unpredictable.
The content of the invention
Commodity are carried out with the false proof method traced to the source the invention discloses a kind of use overlay film Quick Response Code, including:Set up one On-line authentication center, sets up product database of tracing to the source, and the database comprises at least the unique sequence numbers of each commodity, Duo Gehuan Section(Logistics website, multistage whole seller, consumer)Whether mark etc. was queried.
The product false proof to each needs, according to logistics terminal points, multistage wholesale quotient, consumer's number, if printing Dry Quick Response Code.It is attached to after overlay film(Or be attached to using other modes)On commodity and cannot, physics complete with commodity peel off.
Quick Response Code comprises at least the unique sequence numbers of the commodity, and
1:The electronic signature of manufacturer or authoritative department to above- mentioned information;Or
2:The information that manufacturer or authoritative department are encrypted to above- mentioned information by symmetric cryptographic algorithm;Or
3:The Hash Value that manufacturer or authoritative department are calculated by the hash cryptographic algorithm with key(Cryptographic Hash);Or
4:Unpredictable random number R more long.
Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape covering for its correspondence Quick Response Code off On-line authentication center applications system is sent to after film, the mobile phone or terminal scanning Quick Response Code, for 1, system is to digital A.L.S. Breath is verified that, for 2, system is decrypted to ciphertext, and for 3, system contains unique sequence code according to original rule to commodity bundle Number essential information calculate Hash Value, for 4, system searches corresponding unpredictable random number R in database, if above-mentioned Calculated value(Or random number R)To matching and should not being queried in the record of unique sequence numbers commodity, then return mobile phone or The end of scan commodity are genuine pieces;Mistake in computation does not return to false product then in database this record;Calculate correctly or in number According to storehouse, but it has been queried, has informed and be queried, has there will more than likely be personation risk.
Received the commodity of inquiry, and the commodity were marked in authentication center's database and has been queried.If inquiring about first And issuer is certification user, and the user and commodity relation can be marked in database(For example certain user is as consumption Person carried out inquiry), and generate correspondence signature value, be passed back to user, on commodity air brushing contain user and commodity relation and its The Quick Response Code of signature value content, forms traceability mechanism, in case subsequent query.
Safe due to program low cost, barcode scanning is read than manually entering speed soon, can be connect with internet close friend Enter, be adapted to the fast-developing trend of current mobile Internet, add the air brushing of intermediate transit point Quick Response Code to be traced back with realizing route Source, application prospect is widely.
Brief description of the drawings
Fig. 1 is the FB(flow block) that the present invention carries out the false proof method traced to the source using overlay film Quick Response Code to commodity.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with drawings and Examples, to this hair It is bright to be explained in further detail.It should be appreciated that specific embodiment described herein is used only for explaining of the invention, and without It is of the invention in limiting.
Conversely, the present invention covers any replacement done in spirit and scope of the invention being defined by the claims, repaiies Change, equivalent method and scheme.Further, in order that the public has a better understanding to the present invention, below to of the invention thin It is detailed to describe some specific detail sections in section description.Part without these details for a person skilled in the art Description can also completely understand the present invention.
A kind of use overlay film Quick Response Code carries out the false proof method traced to the source to commodity, and the method is based on overlay film, wherein will be unique Characteristic value, unpredictable not reproducible Quick Response Code are attached on commodity, and the Quick Response Code cannot realize complete, physics with commodity Peel off, the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, just visible Quick Response Code after only the overlay film is struck off should Two-dimentional digital content includes the unique sequence numbers and its corresponding cipher feature value of associated commodity, and the wherein unique sequence numbers can be with Prediction is disclosed, and the cipher feature value can be by the key that only has authentication center's system just to know to comprising unique sequence numbers Multiple elements are encrypted(Or signature or hash)Calculate and obtain, or matching one is complete in authentication center's system database Complete unpredictable random number R is obtained.
Referring to accompanying drawing 1, methods described following steps:
Step 1:Set up an on-line authentication centring system, the centring system is traced to the source product database, the data including foundation Storehouse comprises at least:The unique sequence numbers of each commodity, and multiple links(Logistics transfer website, multistage whole seller, consumption Person)Whether mark of the commodity etc. was inquired about.
Step 2:To each false proof commodity of needs, according to logistics terminal points, multistage wholesale quotient, consumer number Mesh, prints several Quick Response Codes.It is attached to after overlay film(Or be attached to using other modes, for example can not after overlay film but opening commodity See)On commodity and cannot, physics complete with commodity peel off.
The Quick Response Code is comprised at least:
1) unique sequence numbers of the commodity, and manufacturer or authoritative department are to commodity essential information(Date of manufacture, production firm, The information such as production batch)Electronic signature or 2)The encryption information 3 of manufacturer or authoritative department to above- mentioned information)Or manufacturer or authority Department calculates the Hash Value with key to above- mentioned information;Or unpredictable random number R more long.
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding two dimension off Code overlay film, it is described with the computation subsystem that on-line authentication centring system is sent to after mobile phone or the terminal scanning Quick Response Code Subsystem is calculated(For above-mentioned to 1), 2), 3))Or search(To 4))Commodity comprising the unique sequence numbers and cipher feature value Whether in database and it was not queried;
1. if so, then returning to genuine piece,
If 2. mistake in computation or not in database, false product are returned to,
3. if calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
Wherein, judge that the standard that the commodity were queried is:Unique sequence of the commodity is found in product database of tracing to the source The encryption that signing messages is correct, manufacturer or authoritative department are to above- mentioned information of row number, manufacturer or authoritative department to above- mentioned information is believed Breath is correct, manufacturer or authoritative department above- mentioned information is calculated the Hash Value with key it is correct or through search it is unpredictable compared with Random number R long is matching.
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried.If first Inquiry and issuer is certification user, can mark the user and commodity relation in database, and generate correspondence signature value, User is passed back to, air brushing contains user and commodity relation and its Quick Response Code of signature value content on commodity, forms traceability mechanism, In case subsequent query.
Quick Response Code signature value calculating method is specially wherein in step 2:
1)To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, using in computing subsystem Private key is digitally signed(For example with cryptographic algorithms such as SM2 or RSA)
2)Quick Response Code encrypts value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem is using symmetrical close Key carries out one-level or carries out multilevel symmetrical encryption(For example with cryptographic algorithms such as SM1, SM4, SM7 or AES).
Wherein one-level disperses computational methods:Using system root key to dispersion factor(Such as commodity unique sequence numbers)Added It is close to obtain merchandise news encryption key;
Multistage dispersion computational methods(By taking level Four key as an example):
System root key is to one-level dispersion factor(Such as vendor code)It is encrypted and obtains two grades of root keys;
Two grades of root keys are to the secondary breakup factor(Such as production batch)It is encrypted and obtains three-level root key;
Three-level root key is to three-level dispersion factor(Such as commodity unique sequence numbers)It is encrypted and obtains level Four key(Merchandise news adds Key);
3)Quick Response Code hash value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem uses root key Carry out one-level(It is multistage)Distributed key carries out hash(For example with cryptographic algorithms such as SM3 or SHA)
Key Multistage dispersion method is ibid
4)Quick Response Code random value R acquisition methods:
Generation batch random number, distributes to each commodity, and recorded in database.

Claims (8)

1. a kind of that commodity are carried out with the false proof method traced to the source based on overlay film Quick Response Code, overlay film Quick Response Code is attached to business by methods described On product, it is characterised in that the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics Peel off, the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity.
2. method according to claim 1, it is characterised in that the unique sequence numbers can predict or open, the password Characteristic value can be carried out by the key for only having authentication center's system just to know to the multiple information elements comprising unique sequence numbers Encryption(Or signature or hash)Calculate obtain, or in the database of the system match one completely it is unpredictable with Machine number R is obtained.
3. method according to claim 2, methods described is specifically included:
Step 1:An on-line authentication centring system is set up, the centring system includes a product database of tracing to the source, the data Storehouse comprises at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
Step 2:Several are printed on the false proof commodity of each needs and scrapes just visible Quick Response Code off;The Quick Response Code is carried out Encryption(Or signature or hash)Calculate, or a complete unpredictable random number R is matched in the database of the system Obtain cipher feature value;And be attached on commodity after overlay film and cannot, physics complete with commodity peel off;Or not overlay film but nothing Method is directly scanned out, for example, to take commodity packaging apart;
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding Quick Response Code off and cover The computation subsystem of on-line authentication centring system, the subsystem are sent to after film, the mobile phone or terminal scanning Quick Response Code It is computed or looked up whether the commodity comprising the unique sequence numbers and cipher feature value in database and were not queried;
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried;If inquiring about first And issuer is certification user, the user and commodity relation can be marked in database, and generate correspondence signature value, loopback To user, user's air brushing on commodity contains user and commodity relation and its Quick Response Code of signature value content, forms traceability mechanism, In case subsequent query.
4. method according to claim 3, it is characterised in that the Quick Response Code is comprised at least:The unique sequence code of the commodity Number and the electronic signature of merchandise news including sequence number or the encryption information of the merchandise news or the merchandise news Key Hash Value;Or unpredictable random number more long.
5. method according to claim 3, it is characterised in that the specific judgement wherein in step 3 is:
1)If in database and not being queried, then genuine piece is returned to,
2)It is middle to return to false product if calculate there is mistake or not in database,
3)If calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
6. method according to claim 3, it is characterised in that Quick Response Code encryption value calculating method wherein in step 2:
To Quick Response Code merchandise news(The information such as unique sequence numbers, date of manufacture, production firm, production batch)Using symmetric key Carry out one or more levels symmetric cryptography;
Wherein one-level computational methods:System symmetric key is encrypted to dispersion factor and obtains merchandise news encryption key;
Multistage dispersion computational methods:
This grade of root key of system is encrypted subordinate's dispersion factor and obtains subordinate(Root)Key;
Wherein Quick Response Code hash value calculating method is:
To Quick Response Code merchandise news, using root key, one or more levels dispersion carries out hash;
The random value-acquiring method of Quick Response Code:
Generation batch random number, distributes to each commodity, and recorded in database.
7. method according to claim 1, it is characterised in that methods described can be replaced with and for Quick Response Code be attached to commodity On, Quick Response Code top not overlay film, but Quick Response Code cannot be directly scanned out and arrived, it is necessary to take commodity packaging apart and could scan, and it is described Quick Response Code and commodity cannot completely, physics peel off, Quick Response Code unique sequence numbers of commodity and its corresponding close comprising associated by Code characteristic value.
8. it is a kind of that the false proof system traced to the source is carried out to commodity based on overlay film Quick Response Code, it is characterised in that the overlay film Quick Response Code is attached On commodity(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code include one Layer and can scan Quick Response Code at overlay film, and the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity;
The system includes online authentication center's system, and the on-line authentication centring system includes a product database of tracing to the source, The database is comprised at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
On-line authentication centring system also includes a computation subsystem, wherein the subsystem is computed or looked up comprising this only Whether the commodity of one sequence number and cipher feature value in database and were not queried;Received inquiry, in the data The commodity are marked in storehouse to be queried;If inquiry first and issuer is certification user, can be marked in database The user and commodity relation, and correspondence signature value is generated, user is passed back to, and air brushing contains user and commodity relation on commodity And its Quick Response Code of signature value content, traceability mechanism is formed, in case subsequent query.
CN201710051749.2A 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method Pending CN106934633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710051749.2A CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710051749.2A CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Publications (1)

Publication Number Publication Date
CN106934633A true CN106934633A (en) 2017-07-07

Family

ID=59423502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710051749.2A Pending CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Country Status (1)

Country Link
CN (1) CN106934633A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977434A (en) * 2017-12-01 2018-05-01 珠海市魅族科技有限公司 Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods
CN109461010A (en) * 2018-11-16 2019-03-12 重庆工商职业学院 Fake products tracking based on big data
CN110210877A (en) * 2019-06-06 2019-09-06 大族激光科技产业集团股份有限公司 A kind of anti-fake management method and anti-fake data entry method
CN111127046A (en) * 2019-12-26 2020-05-08 赵建林 Method and system for realizing digital multi-dimensional anti-counterfeiting tracing by adopting artificial intelligence
CN111415173A (en) * 2020-03-16 2020-07-14 可可奇货(深圳)科技有限公司 Method for encrypting and verifying commodity integrity

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN103400270A (en) * 2013-07-03 2013-11-20 陕西科技大学 Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN104574119A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Commodity identifying and tracing method
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN103400270A (en) * 2013-07-03 2013-11-20 陕西科技大学 Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN104574119A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Commodity identifying and tracing method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977434A (en) * 2017-12-01 2018-05-01 珠海市魅族科技有限公司 Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods
CN108694429B (en) * 2018-05-11 2021-03-02 张玉 Two-dimensional code generation method and identification method
CN109461010A (en) * 2018-11-16 2019-03-12 重庆工商职业学院 Fake products tracking based on big data
CN109461010B (en) * 2018-11-16 2021-06-08 重庆工商职业学院 Big data-based counterfeit product tracking method
CN110210877A (en) * 2019-06-06 2019-09-06 大族激光科技产业集团股份有限公司 A kind of anti-fake management method and anti-fake data entry method
CN110210877B (en) * 2019-06-06 2024-01-23 大族激光科技产业集团股份有限公司 Anti-counterfeiting management method and anti-counterfeiting data input method
CN111127046A (en) * 2019-12-26 2020-05-08 赵建林 Method and system for realizing digital multi-dimensional anti-counterfeiting tracing by adopting artificial intelligence
CN111127046B (en) * 2019-12-26 2023-09-05 赵建林 Method and system for realizing digital multidimensional anti-counterfeiting tracing by adopting artificial intelligence
CN111415173A (en) * 2020-03-16 2020-07-14 可可奇货(深圳)科技有限公司 Method for encrypting and verifying commodity integrity
CN111415173B (en) * 2020-03-16 2023-05-02 可可奇货(深圳)科技有限公司 Commodity integrity encryption and verification method

Similar Documents

Publication Publication Date Title
CN106934633A (en) A kind of novel film coating two-dimension code anti-counterfeit traceability system and method
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US20190013950A1 (en) Method And System For Privacy-Preserving Social Media Advertising
US7673144B2 (en) Cryptographic system for group signature
US8112626B1 (en) Method and apparatus to provide public key authentication with low complexity devices
CN102004965B (en) Double ant-counterfeiting method and system of product
CN107431622A (en) The blocking tracking in supply chain occurs
CN106452756A (en) Construction verification method and device capable of verifying security two-dimensional code offline
US20050169461A1 (en) Method and device for anonymous signature with a shared private key
JP2009508430A (en) Device, system and method for determining authenticity of items
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
CN104299140A (en) Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce
JP2007507120A (en) Product protection gateway and method for checking product authenticity
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN113034128B (en) Block chain-based data transaction and right confirmation method
Rührmair Simpl systems: On a public key variant of physical unclonable functions
US10484182B2 (en) Encrypted text verification system, method, and recording medium
CN106209730B (en) Method and device for managing application identifier
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification
CN110321734A (en) A kind of file verification method and device
García-Rodríguez et al. To pass or not to pass: Privacy-preserving physical access control
CN116611851A (en) Hotpot condiment product tracing method and system based on blockchain
CN110245965B (en) Safety method for ice cream stick data processing system and ice cream stick with two-dimensional code
Hamian et al. Blockchain-based User Re-enrollment for Biometric Authentication Systems
Itakura et al. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170707

RJ01 Rejection of invention patent application after publication