CN108875875A - A kind of label and method for anti-counterfeit - Google Patents
A kind of label and method for anti-counterfeit Download PDFInfo
- Publication number
- CN108875875A CN108875875A CN201810689280.XA CN201810689280A CN108875875A CN 108875875 A CN108875875 A CN 108875875A CN 201810689280 A CN201810689280 A CN 201810689280A CN 108875875 A CN108875875 A CN 108875875A
- Authority
- CN
- China
- Prior art keywords
- fake
- code
- label
- shading
- cloud platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F3/0297—Forms or constructions including a machine-readable marking, e.g. a bar code
Abstract
A kind of label and method for anti-counterfeit, belong to commodity circulation anti-counterfeit field in order to solve substantially to significantly increase anti-counterfeit capability, technical essential is:The problem of by two dimensional code in conjunction with anti-fake shading, there is the anti-fake shading of different admin number information in the white space in the outside of ciphering two-dimension code or the printing of ciphering two-dimension code center error correction region, the information of the number of the anti-fake shading is bound in the ciphering two-dimension code simultaneously.
Description
Technical field
The invention belongs to commodity circulation anti-counterfeit field, it is related to a kind of label and method for anti-counterfeit.
Background technique
Two dimensional code as it is a kind of can stealthy include bulk information convenient vehicle, bond material, optics, figure and interconnection
Network technology, be widely used commodity trace to the source in anti-counterfeit field, existing individual two dimensional code, or individually anti-fake bottom
Line is easy to be cracked during anti-fake, if the two is combined, although anti-fake effect can be reinforced, it is only
It is simple by two kinds of anti-fake mode stack combinations, the difficulty that is cracked actually both only superposition can't be solved substantially
The problem of enhancing anti-counterfeit capability, enables the combination of the two not only to play respective anti-counterfeit capability, and can significantly increase two
The sum of person's anti-counterfeit capability, it appears particularly important.
Summary of the invention
In order to solve the problem of substantially to significantly increase anti-counterfeit capability this hair by two dimensional code in conjunction with anti-fake shading
It is bright that the following technical solutions are proposed:
A kind of label and method for anti-counterfeit are printed in the white space in the outside of ciphering two-dimension code or ciphering two-dimension code center error correction region
The anti-fake shading with different admin number information is brushed, the information of the number of the anti-fake shading is bound to the encryption simultaneously
In two dimensional code.
Beneficial effect:Two-dimension code label of the present invention, since the two-dimension code label of each batch of goods can be using not
With the anti-fake burelage of admin number, the information of admin number is stored in ciphering two-dimension code simultaneously, and encryption two may be implemented
The binding of code and anti-fake shading is tieed up, in this way, ciphering two-dimension code and anti-fake shading form corresponding relationship, and this corresponding relationship is protected
There are cloud platforms, other than two dimensional code and shading identify, moreover it is possible to verify to this corresponding relationship, only bind with two dimensional code
Anti-fake shading indicate pictorial information it is consistent with platform, can just think, which is not forged.Thus, encryption
Two dimensional code binds the admin number of anti-fake shading, being capable of more significant enhancing anti-counterfeit capability.
Detailed description of the invention
Fig. 1 is the business process map of commodity circulation.
Specific embodiment
Embodiment 1:
A kind of label and method for anti-counterfeit,:White space or ciphering two-dimension code center error correction region in the outside of ciphering two-dimension code
The anti-fake shading with different admin number information is printed, the information of the number of the anti-fake shading is bound to described add simultaneously
In close two dimensional code.
Preferably, the ciphering two-dimension code is generated with anti-fake shading number by Encryption Algorithm by anti-fake number;
Preferably, the anti-fake number is to generate 64 using Twitter-Snowflake algorithm by the cloud platform
UUID globally unique identifier is then converted to the globally unique character string of 64 systems, then supplies titled with 1 classification code and 3
Quotient's identification code, the anti-fake number with uniqueness of generation.The classification code is used to define the type of this anti-fake number, can be with
Including following information code:A:Codeword value;B:Outer packing code:C:Middle packaging code:D:Big packaging code.Supplier's identification code is used for
Supplier belonging to this anti-fake number is defined, general different supplier is distinguished using 3 different identification codes.
In a kind of scheme, method that the anti-fake shading is passed through OpenGL ES texture mapping by the cloud platform first
Generate a basic shading, then determine several length is made on the point of the position at anti-fake shading edge is 3
~5 pixels, color is identical as the basic background color of shading, and the lines of the corresponding position of basic shading is made to be cut out the mark of notch
Note.
In a kind of scheme, setting is used for positioning anti-fake bottom on the upper left of anti-fake shading, upper right and the position of lower-left three
The rectangular locating piece of line position has the notch similar to X and/or S on the surface of the two-dimension code label.
The anti-fake number of the two-dimension code label is generated with anti-fake shading by RSA asymmetric arithmetic, and its step are as follows:
The cloud platform is according to public key system to public, private key pair requirement, and random to generate key pair K1 and K1 ', K1 is as two
The encryption key of code information encryption is tieed up, K1 ' is as the decruption key in two dimension code reading;
The cloud platform converts cleartext information m to be encoded using K1, generation includes according to RSA asymmetric arithmetic rule
The two dimensional code original data stream s of anti-counterfeiting information and encryption information, wherein cleartext information m to be encoded is anti-fake number+anti-fake shading
Number;Error correction is carried out to original data stream s, obtains draw data stream, using draw data stream by calling system function to draw
It image in 2 D code and saves out;When reading two dimensional code, image in 2 D code is pre-processed, binaryzation, correcting data error, obtains and add
Original data stream s after close, and upload to the cloud platform;
The cloud platform uses K1 ' that encrypted original data stream s is decrypted according to RSA asymmetric arithmetic rule,
Obtain cleartext information m.
In one embodiment, it is related to a kind of commodity counterfeit prevention code label, being that each commodity are uniquely corresponding by cloud platform gives birth to
At comprising vpn label and outer layer label, the outer layer label identify that bar code and commodity are traced to the source two-dimentional code character by commodity
At;Commodity identification bar code is to generate 64 UUID overall situations only using Twitter-Snowflake algorithm by the cloud platform
One identifier is then converted to the globally unique character string of 64 systems, then titled with+3 supplier's identification codes of 1 classification code, raw
At anti-fake number with uniqueness, the commodity trace to the source two dimensional code, are made of cloud platform network address and the anti-fake number;
The vpn label can be two-dimension code label described in above-mentioned any number of scheme.
The commodity counterfeit prevention code label that this programme proposes as a result, is able to solve various antifalsification label forms in the prior art
Problem:
One, physical security+two dimensional code barcode scanning is traced to the source scheme
Two-dimension code label medium (common are using physical security means:Laser anti-counterfeit, fluorescence falsification preventing, anti-fake group flower, miniature text
Word is anti-fake, metal wire is anti-fake, easy design of scattered small flowers and plants knife, wet sensitive are anti-fake, infrared stealthy, ultraviolet stealthy, photochromatic printing ink etc.) tentatively guarantee one
A higher forgery cost.Two dimensional code itself uses plain code (not encrypting), scans the two-dimensional code the letter of tracing to the source that access is pre-set
Breath website obtains information of tracing to the source accordingly, reaches certain antifalse effect.
There are the problem of
1, physical security technology maturation, forgery are not difficult matter, can at least accomplish to compare picture.2, using the mode of naked eyes,
The true and false physical security label of on-site identification is nearly impossible.3, website of tracing to the source can forge, can not be really anti-fake.Fake producer's system
Make a false website of tracing to the source, two-dimensional barcode information is directed toward this false website, the information of pop-up can also be with website of really tracing to the source
That does is closely similar, and consumer can not tell truth from falsehood at all.And the outer layer label of this programme by commodity identify bar code and
Commodity are traced to the source two dimensional code composition, and item identification code and cloud platform are bound, and commodity are traced to the source two dimensional code, by cloud platform network address and described
Anti-fake number composition, in this way, can only can just be traced to the source by the scanning device that cloud platform is adapted to for item identification code, and commodity trace back
Source two dimensional code is due to can be used plain scan equipment or software barcode scanning knows, in this way, in commodity comprising cloud platform website information
It in circulation, does not correspond to, is could be aware that as personation if tracing to the source occurs in the two.
Two, two dimensional code+fake certification code scheme
General way is anti-fake website and fake certification code to be printed on two-dimension code label, and use the mode of coating
In the covering of fake certification code.Consumer can open anti-fake website by scraping coating off, input the mode of fake certification code into
Row fake certification.
There are the problem of
1, defeated code is needed, it is cumbersome.
2, anti-fake website and fake certification code can all be forged, can not be really anti-fake.
In another scheme, vpn label is the two-dimension code label, due to the two-dimension code label of each batch of goods
The anti-fake burelage of different admin numbers can be used, the information of admin number is stored in ciphering two-dimension code simultaneously, Ke Yishi
The binding of existing ciphering two-dimension code and anti-fake shading, in this way, ciphering two-dimension code and anti-fake shading form corresponding relationship, and this correspondence
Relationship is saved in cloud platform, other than two dimensional code and shading identify, moreover it is possible to verify to this corresponding relationship, only with two
The pictorial information for tieing up the anti-fake shading expression of code binding is consistent with platform, can just think, which is not forged.Cause
And ciphering two-dimension code binds the admin number of anti-fake shading, it being capable of more significant enhancing anti-counterfeit capability.
Three, two dimensional code encryption technique scheme
Being printed on label after two-dimentional code encryption, only pass through specific equipment or software (such as the mobile phone of system offer
APP), correct information can just be scanned.
There are the problem of
1, ciphering two-dimension code can be forged, can not be really anti-fake.Fake producer can be believed by reading encrypted two dimensional code
Breath, produces the same two dimensional code, and two dimensional code itself also just loses antiforge function.
2, specific equipment or software ability barcode scanning can only be used to operate, in the circulation and transfer of goods (entering outbound management etc.) and traced to the source
Query aspects are very inconvenient.
By above-mentioned, for enhancing antiforge function, the scheme of the realization conveniently traced to the source, the present embodiment be may be implemented.
Four, two dimensional code barcode scanning count protocol
System provides two dimensional code barcode scanning tally function.Two dimensional code itself is first stashed with coating, when consumer scrapes coating off, is swept
When retouching two dimensional code, barcode scanning number information is simultaneously pushed to consumer immediately by system accounting number, is for consumer's discrimination
The proficiency commodity of purchase.
There are the problem of
1, two dimensional code and counting website can forge, ineffective security.
2, very inconvenient in the circulation and transfer of goods (entering outbound management etc.) and query aspects of tracing to the source if hiding two dimensional code.
Except above scheme, in the scheme of the present embodiment or notch is used, only edge pastes between outer layer label and vpn label
It closes and the means on the label of outside with tearing port replaces the existing scheme, convenience goods circulates (entering outbound management etc.) and traces to the source
Inquiry.
In this embodiment, it is related to a kind of method of commodity counterfeit prevention analysis, includes the following steps:
Cloud platform is established, the cloud platform is that each commodity generate unique commodity counterfeit prevention code, and are saved in the cloud of cloud platform
Data center is managed and/or safeguards;
It is traced to the source inquiry using barcode scanning equipment for circulation and transfer of goods management and commodity, barcode scanning equipment scans ciphering two-dimension code and anti-fake bottom
Line, and the image information of ciphering two-dimension code and anti-fake shading is read to be sent to cloud platform;
Cloud platform reads the anti-fake shading number of binding from ciphering two-dimension code information, then transfers respective tube from cloud data center
The original anti-fake shading picture for managing number, by similarity algorithm to two anti-fake shading pictures carry out similarity comparisons calculate with
Determine whether image matches;
If comparison matching, cloud platform record the ciphering two-dimension code and push away by the number of barcode scanning, and match information and barcode scanning number
It send to scanning device;Otherwise, comparison mismatches, and unmatched information is pushed to scanning device by cloud platform;
In a kind of scheme, the commodity counterfeit prevention code label is commodity counterfeit prevention code label described in above-mentioned any number of scheme.
In a kind of scheme, the method for recording a kind of analysis of commodity counterfeit prevention, commodity identify that bar code is one-dimension code, using connecing
Enter to the anti-fake number in the barcode scanning equipment reading commodity identification bar code of cloud platform, circulation and transfer of goods management information is carried out to commodity
With the inquiry for information of tracing to the source;Commodity two dimensional code of tracing to the source is two dimensional code, wherein including cloud platform network address and anti-fake number, in cloud platform
The interface with cloud platform docking is provided in network address, third party's barcode scanning software or equipment trace to the source two dimensional code by items scanning can
Inquire information of tracing to the source.
As a kind of preferred scheme, scheme is as follows to be illustrated for source tracing method:
A method of it prevents fake and inferior commodities from circulating field, includes the following steps:
S1 establishes cloud data center and cloud platform;
S2 acquires merchandise news, and merchandise news is uploaded to the cloud data center by the cloud platform to save;
Merchandise news described in S3 is attached to commodity bar code;
S4 authorised dealer information, and distributor information is uploaded to the cloud data center by the cloud platform to protect
It deposits;
S5 is ordered the goods as dealer by cloud platform, and the cloud platform passes through acquisition dealer's authorization message, the commodity
The information of bar code and quantity of ordering the goods generates commodity by the cloud platform and uniquely circulates code, and the commodity uniquely flow
Make code passes through cryptographic calculation again and generates unique verification code;Each last commodity can generate including:The quotient of goods themselves attachment
Product bar code, the unique circulation code generated by cloud platform, the unique verification code ultimately generated by cryptographic calculation;
The commodity unique verification code is mapped to cloud data center by Hash hash function by S6, and realizes that one-to-one correspondence closes
System makes each merchandise news have an independent unique verification code and its binding.
This method further includes step:S7 commodity are in the circulation process to shopping saving system and record.
The specific method of the step S7 is:The cloud platform receives the ordering information of dealer, agrees according to selling
It purchases commodity amount and generates equal number of unique circulation codes and unique verification code, and be by the batch of goods number tag
Outbound, and dealer's ordering information is recorded, dealer's ordering information includes:Product name, specifications and models, order date, order
Quantity and corresponding commodity bar code, Commodity Flow make code, commodity unique verification code, dealer site, logistics information,
And above-mentioned all information content update to cloud data center is saved;When commodity reach dealer designated place, dealer passes through
Cloud platform confirmation is received, and records the commodity in detail from manufacturer at dealer in cloud data center by the cloud platform
Circulation detailed record.
The method also includes step S8. consumer authentications.
The specific method of the step S8 is:When consumer passes through the unique verification code in terminal items scanning, terminal
The data of obtained unique verification code are compared with the corresponding merchandise news of the unique verification code in cloud data center, if
The information that the unique verification code of consumer scans obtains show this by commodity be located at cloud data center record in specifiedly
Point then lists the circulation record of the commodity;When consumer confirms purchase current commodity, the cloud platform is by current commodity information
It is set as having been sold out, and records buyer's information;If the information that the unique verification code of consumer scans obtains shows this by quotient
Product are not located at the designated place in cloud data center record, then judge that current commodity is not recorded by the cloud platform.
Embodiment 2:
The present embodiment can be used as independent alternative, and be equal in embodiment 1, close means can be used as scheme in embodiment 1
And its more detailed supplement for recording each scheme in embodiment 1 that can be used as:
A kind of label and method for anti-counterfeit, include the following steps:
S1, cloud data center and cloud platform are established, and the matched dedicated cell phone application of barcode scanning is provided;
S2, the cloud platform are that each commodity generate unique commodity counterfeit prevention code, and are saved in cloud data center management and dimension
Shield;
S3, the commodity counterfeit prevention code are made of inside and outside two layers of label, only edge fitting and outer between outer layer label and vpn label
Layer label is equipped with tearing port;
S4, the outer layer label identify that bar code and commodity two dimensional code of tracing to the source form by commodity, are used for circulation and transfer of goods management and quotient
Product are traced to the source inquiry;
S5, the commodity identify bar code, are to generate 64 using Twitter-Snowflake algorithm by the cloud platform
UUID (Universally Unique Identifier) globally unique identifier, is then converted to the globally unique of 64 systems
Character string, then titled with+3 supplier's identification codes of 1 classification code, generate anti-fake number with uniqueness, standard can be used
Barcode scanning equipment or software (such as barcode scanning gun and wechat etc.) and the dedicated cell phone application of the barcode scanning carry out circulation and transfer of goods management and
Commodity are traced to the source inquiry, and operation and management are facilitated;
S6, the commodity are traced to the source two dimensional code, are made of the anti-fake number generated in the cloud platform network address and step S5, any
Third party's barcode scanning software (such as wechat etc.) can identify, for tracing to the source inquiry to commodity;
S7, the vpn label are by ciphering two-dimension code, anti-fake shading and the flower anti-transfer technology groups of knife at for final consumption
Person judges the true and false of current commodity;
S8, the ciphering two-dimension code are combined with anti-fake shading number by adding by the anti-fake number generated in the step S5
Close algorithm generates, and the Encryption Algorithm of mainstream has DES balanced method and RSA asymmetric method at present, as long as Encryption Algorithm cipher round results can
It leans on, is not limited to a certain specific algorithm.
The embodiment of RSA asymmetric arithmetic is as follows:
1) key production module of the cloud platform generates key pair according to public key system to public, private key pair requirement at random
K1 (public key) and K1 ' (private key).Encryption key of the K1 (public key) as two-dimensional barcode information encrypting module, K1 ' (private key) conduct
Decruption key in two dimension code reading.
2) cloud platform utilizes RSA Algorithm, using K1 (public key) to cleartext information m to be encoded (anti-fake number+anti-fake bottom
Line number) it is converted, generate the two dimensional code original data stream s comprising anti-counterfeiting information and encryption information.
3) after carrying out error correction to original data stream s, draw data stream is obtained.Pass through calling system letter using draw data stream
Number can draw out image in 2 D code and save.
4) the dedicated cell phone application of the barcode scanning is when reading two dimensional code, using two dimensional code read module to image in 2 D code into
A series of processing such as row pretreatment, binaryzation, correcting data error, obtain encrypted original data stream s, and it is flat to upload to the cloud
Platform.
5) cloud platform recycles RSA Algorithm, uses K1 ' (private key) that encrypted original data stream s is decrypted
Processing obtains cleartext information m (anti-fake number+anti-fake shading number).
S9, the anti-fake shading generate a base by the method that the cloud platform passes through OpenGL ES texture mapping first
Plinth shading (careful complicated, regular shape the anti-fake knob rope of lines rolls into a ball flower), then in 6 positions determined (in terms of pixel
Calculate position.Because anti-fake shading is possible to be in the periphery of ciphering two-dimension code, 6 position selections are close to anti-fake shading edge
Position is more reasonable) on do special marking (shape be "/" or " ", length is 3~5 pixels, color and basic shading
Background color is identical, and effect is that the lines of the corresponding position of basic shading is made to be cut out notch), it can be gone out with permutation and combination different anti-fake
Then burelage is printed on the blank area or ciphering two-dimension code center error correction area in the outside of the ciphering two-dimension code, and
Rectangular locating piece is set on the upper left of anti-fake shading, upper right and the position of lower-left three, is used to supply the dedicated cell phone application of the barcode scanning
The position of positioning anti-fake shading;The two-dimension code label of each batch uses the anti-fake burelage of different admin numbers, and management is compiled
Number information simultaneously be stored in ciphering two-dimension code, realize ciphering two-dimension code and anti-fake shading binding, forge difficulty it is very big.
S10, the colored anti-transfer techniques of knife, are the notch stamped on the vpn label similar to X, S etc., when
Tear above paste this piece of label when, label will this X, S notch place damage fall, to prevent artificial
It tears and is pasted in fake and inferior commodities from commodity;
S11, the dedicated cell phone application of the barcode scanning, provide while can scan the functional module of ciphering two-dimension code and anti-fake shading.It is anti-
The reading of pseudo- burelage using OCR (Optical Character Recognition, optical character identification) image recognition and
Scanning technique is realized, it is ensured that reads the precision of image.System-specific APP reads ciphering two-dimension code and anti-fake shading image information
Afterwards, it is sent to cloud platform.Cloud platform reads the admin number of the anti-fake shading of binding from ciphering two-dimension code information, then from cloud
Data center transfers corresponding original anti-fake shading picture.Pass through histogram similarity algorithm (or OpenCV image similarity ORB
The abbreviation of algorithm ORiented Brief is the improvement of BRIEF algorithm) similarity comparison is carried out to two anti-fake shading pictures,
So that it is determined that whether image matches.If compared successfully, cloud platform records the ciphering two-dimension code by the number of barcode scanning, and handle immediately
(push of barcode scanning number is extremely important, just imagines, consumer tears outer layer label, in scanning for verification result and barcode scanning number
Layer ciphering two-dimension code, if the information returned is barcode scanning 2 times or more, then it is likely used only to this two-dimension code label is true
, but same label has done more parts, also itself is also a kind of fraud.) it is pushed to consumer.Certainly, if cloud platform school
Failure is tested, also the result of verification failure consumer can be pushed to, consumer's commodity is reminded to be particularly likely that counterfeit goods, it is real
Existing ultimate fake certification.
As a kind of scheme, this method further includes that step S12 carries out circulation and transfer of goods management.
As further scheme, the step S12 specific method is:The dedicated cell phone application of barcode scanning (or barcode scanning gun) scanning
Commodity on outer layer label trace to the source two dimensional code or commodity identification bar code, carry out circulation and transfer of goods management (entering outbound management etc.) note
Record.At this point, commodity essential information and circulation (entering outbound management etc.) information will be uploaded to the cloud number by the cloud platform
It is saved according to center.Commodity identify that bar code is one-dimension code, and using the barcode scanning equipment for being linked into cloud platform, (barcode scanning gun or cloud are flat
Platform provide cell phone application) read commodity identification bar code in anti-fake number, to commodity carry out (entering outbound) Commodity Flow tube
The inquiry of reason information and information of tracing to the source, (third party's barcode scanning software (such as barcode scanning function of wechat) can read commodity knowledge
Anti-fake number in other bar code, but can not be docked with cloud platform and carry out circulation and transfer of goods management and inquiry and trace to the source information) commodity trace back
Source two dimensional code is two dimensional code, wherein including cloud platform network address and anti-fake number, is provided in cloud platform network address and cloud platform pair
The interface connect, so third party's barcode scanning software (such as barcode scanning function of wechat) can be traced to the source by items scanning
Two dimensional code inquires information of tracing to the source.The cell phone application for of coursing cloud platform offer also can be achieved on said function.It is above-mentioned
It is related to commodity counterfeit prevention code in method for anti-counterfeit, is made of inside and outside two layers of label, only edge between outer layer label and vpn label
It is bonded and outer layer label is equipped with tearing port;The outer layer label identifies that bar code and commodity are traced to the source by commodity
Two dimensional code composition, traces to the source inquiry for circulation and transfer of goods management and commodity;The commodity identify bar code, are put down by the cloud
Platform uses Twitter-Snowflake algorithm, and it is global to generate 64 UUID (Universally Unique Identifier)
Unique identifier, is then converted to the globally unique character string of 64 systems, then titled with+3 supplier's identification codes of 1 classification code,
Generate anti-fake number with uniqueness, can be used standard barcode scanning equipment or software (such as barcode scanning gun and wechat etc.) and
Inquiry that the dedicated cell phone application of the barcode scanning carries out circulation and transfer of goods management and commodity are traced to the source, facilitates operation and management;
The commodity are traced to the source two dimensional code, are made of the anti-fake number of the cloud platform network address and generation, any third party's barcode scanning is soft
Part (such as wechat etc.) can identify, for tracing to the source inquiry to commodity;
The vpn label is by ciphering two-dimension code, anti-fake shading and the flower anti-transfer technology groups of knife at for ultimate consumer's judgement
The true and false of current commodity;
The ciphering two-dimension code is combined with anti-fake shading number by the anti-fake number of the generation and is generated by Encryption Algorithm,
The Encryption Algorithm of mainstream has DES balanced method and RSA asymmetric method at present, as long as Encryption Algorithm cipher round results are reliable, is regardless of
Mud is in a certain specific algorithm.
The anti-fake shading generates a basis by the method that the cloud platform passes through OpenGL ES texture mapping first
Shading (careful complicated, regular shape the anti-fake knob rope of lines rolls into a ball flower), then (is calculated in 6 positions determined with pixel
Position.Because anti-fake shading is possible to be in the periphery of ciphering two-dimension code, 6 position selections are in the position close to anti-fake shading edge
It is reasonable to set comparison) on do special marking (shape be "/" or " ", length is 3~5 pixels, the bottom of color and basic shading
Color is identical, and effect is that the lines of the corresponding position of basic shading is made to be cut out notch), different anti-fake bottoms can be gone out with permutation and combination
Line pattern, is then printed on the blank area or ciphering two-dimension code center error correction area in the outside of the ciphering two-dimension code, and
Rectangular locating piece is set on the upper left of anti-fake shading, upper right and the position of lower-left three, it is fixed for the dedicated cell phone application of the barcode scanning to be used to
The position of the anti-fake shading in position;The two-dimension code label of each batch uses the anti-fake burelage of different admin numbers, admin number
Information simultaneously be stored in ciphering two-dimension code, realize ciphering two-dimension code and anti-fake shading binding, forge difficulty it is very big.
The anti-transfer techniques of colored knife, are the notch stamped on the vpn label similar to X, S etc., when pasting
Tear above object this piece of label when, label will this X, S notch place damage fall, to prevent by artificially from quotient
It tears and is pasted in fake and inferior commodities on product;The dedicated cell phone application of barcode scanning, provide and meanwhile can scan ciphering two-dimension code and
The functional module of anti-fake shading.The reading of anti-fake burelage uses OCR (Optical Character Recognition, light
Learn character recognition) image recognition and scanning technique realize, it is ensured that read the precision of image.System-specific APP reads encryption two
After tieing up code and anti-fake shading image information, it is sent to cloud platform.Cloud platform reads the anti-fake of binding from ciphering two-dimension code information
Then the admin number of shading transfers corresponding original anti-fake shading picture from cloud data center.Pass through histogram similarity operator
Method (or abbreviation of OpenCV image similarity ORB algorithm ORiented Brief, be the improvement of BRIEF algorithm) is anti-fake to two
Shading picture carries out similarity comparison, so that it is determined that whether image matches.If compared successfully, cloud platform records the ciphering two-dimension
Verification result and barcode scanning number, (push of barcode scanning number is extremely important, just imagines, disappears by the number of barcode scanning, and immediately for code
Expense person tears outer layer label, scans internal layer ciphering two-dimension code, if the information returned is barcode scanning 2 times or more, very
It is possible that this two-dimension code label is genuine, but same label has done more parts, also itself is also a kind of fraud.) be pushed to
Consumer.Certainly, if cloud platform verification failure, also the result of verification failure can be pushed to consumer, reminds consumer should
Commodity are particularly likely that counterfeit goods, realize ultimate fake certification.Briefly, commodity identification bar code is that commodity are traced to the source two dimensional code
A subset.Commodity identification bar code mainly facilitates cloud platform to carry out internal control.Commodity two dimensional code of tracing to the source is conveniently to disappear
Expense person carries out inquiry of tracing to the source to commodity using third party's barcode scanning software.
The preferable specific embodiment of the above, only the invention, but the protection scope of the invention is not
It is confined to this, anyone skilled in the art is in the technical scope that the invention discloses, according to the present invention
The technical solution of creation and its inventive concept are subject to equivalent substitution or change, should all cover the invention protection scope it
It is interior.
Claims (7)
1. a kind of label and method for anti-counterfeit, which is characterized in that white space or ciphering two-dimension code in the outside of ciphering two-dimension code
Central error correction region printing has the anti-fake shading of different admin number information, the information while quilt of the number of the anti-fake shading
It is bound in the ciphering two-dimension code.
2. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that the ciphering two-dimension code is by anti-fake number
It is generated with anti-fake shading number by Encryption Algorithm;The anti-fake number is to generate globally unique identifier by the cloud platform
Symbol, is then converted to globally unique character string, then titled with classification code and supplier's identification code, generation it is with uniqueness anti-fake
Number.
3. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that the anti-fake shading is by the cloud platform
A basic shading is generated by the method for OpenGL ES texture mapping first, then determine several close to anti-fake
It is 3~5 pixels that length is made on the point of the position at shading edge, and color is identical as the basic background color of shading, makes basic bottom
The lines of the corresponding position of line are cut out the label of notch.
4. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that the upper left of anti-fake shading, upper right and
Setting is used for the rectangular locating piece of positioning anti-fake shading position on the position of lower-left three, has on the surface of the two-dimension code label
Similar to the notch of X and/or S.
5. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that the anti-fake volume of the two-dimension code label
It number is generated with anti-fake shading by RSA asymmetric arithmetic, characterization step is as follows:The cloud platform is according to public key system to public, private
The requirement of key pair, random to generate key pair K1 and K1 ', the encryption key that K1 is encrypted as two-dimensional barcode information, K1 ' is as two dimension
Decruption key in code recognition;The cloud platform according to RSA asymmetric arithmetic rule, using K1 to cleartext information m to be encoded into
Row transformation, generates the two dimensional code original data stream s comprising anti-counterfeiting information and encryption information, wherein cleartext information m to be encoded is anti-
Puppet number+anti-fake shading number;Error correction is carried out to original data stream s, obtains draw data stream, uses draw data circulation toning
Image in 2 D code is drawn out with system function and is saved;Read two dimensional code when, image in 2 D code is pre-processed, binaryzation,
Correcting data error obtains encrypted original data stream s, and uploads to the cloud platform;The cloud platform is according to the asymmetric calculation of RSA
Method rule, uses K1 ' that encrypted original data stream s is decrypted, and obtains cleartext information m.
6. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that by cloud platform be each commodity only
One corresponding generation comprising vpn label and outer layer label, the outer layer label identify that bar code and commodity are traced to the source by commodity
Two dimensional code composition;Commodity identification bar code is to generate globally unique identifier by the cloud platform, is then converted to unique character
String, then titled with classification code+supplier's identification code, the anti-fake number with uniqueness of generation, the commodity are traced to the source two dimensional code,
It is made of cloud platform network address and the anti-fake number;The vpn label is two-dimension code label.
7. a kind of label as described in claim 1 and method for anti-counterfeit, which is characterized in that the vpn label is wanted for right
Seek the described in any item two-dimension code labels of 1-5;Between the outer layer label and vpn label only edge fitting and outside label
It is upper that there is tearing port.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810689280.XA CN108875875A (en) | 2018-06-28 | 2018-06-28 | A kind of label and method for anti-counterfeit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810689280.XA CN108875875A (en) | 2018-06-28 | 2018-06-28 | A kind of label and method for anti-counterfeit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108875875A true CN108875875A (en) | 2018-11-23 |
Family
ID=64296532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810689280.XA Withdrawn CN108875875A (en) | 2018-06-28 | 2018-06-28 | A kind of label and method for anti-counterfeit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875875A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831309A (en) * | 2019-02-25 | 2019-05-31 | 胡辉萍 | A kind of safety code principle and method with multiple-authentication |
CN110866579A (en) * | 2019-11-15 | 2020-03-06 | 拍拍看(海南)人工智能有限公司 | Code edge sawtooth anti-counterfeiting method and product |
CN111832689A (en) * | 2020-07-27 | 2020-10-27 | 沈阳海创文化印刷有限公司 | Design method of label anti-counterfeiting mark |
-
2018
- 2018-06-28 CN CN201810689280.XA patent/CN108875875A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831309A (en) * | 2019-02-25 | 2019-05-31 | 胡辉萍 | A kind of safety code principle and method with multiple-authentication |
CN110866579A (en) * | 2019-11-15 | 2020-03-06 | 拍拍看(海南)人工智能有限公司 | Code edge sawtooth anti-counterfeiting method and product |
CN111832689A (en) * | 2020-07-27 | 2020-10-27 | 沈阳海创文化印刷有限公司 | Design method of label anti-counterfeiting mark |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107506816A (en) | The method of two-dimension code label, commodity counterfeit prevention code label and commodity counterfeit prevention analysis | |
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
US20230342582A1 (en) | Systems and methods for generating secure tags | |
US11864642B1 (en) | Secure diamond smart cards and exchange systems therefor | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
TWI246030B (en) | Product authentication method and label | |
CN104854642B (en) | For the method and apparatus using physical features mark manufacture article | |
CN107341676A (en) | False proof mark and the method for tracing to the source | |
US20050234823A1 (en) | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. | |
US20010047340A1 (en) | Authenticity verification method and apparatus | |
US20120298741A1 (en) | Method and System for Deterring Product Counterfeiting, Diversion and Piracy | |
WO2018107683A1 (en) | Method and device for preventing counterfeit and inferior merchandise from entering circulation field | |
CN109190736B (en) | Anti-counterfeiting two-dimensional code and generation method and generation application system thereof | |
CN105740926A (en) | Anti-counterfeiting method and anti-counterfeiting system | |
CN109583894A (en) | Offer, verification method and the device of two dimensional code | |
WO2009122730A1 (en) | Goods processing method | |
CN205665721U (en) | Present label that machine readable vision is showed | |
CN108875875A (en) | A kind of label and method for anti-counterfeit | |
CN105678369A (en) | Anti-counterfeiting-tag-based anti-counterfeiting method for commodity | |
CN105894303A (en) | Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package | |
CN104616150A (en) | Tracking, managing and authentic identification system and method for circulation goods | |
CN111754243A (en) | Product information dynamic management system based on block chain | |
CN108629603B (en) | Commodity anti-counterfeiting method based on two-dimensional code | |
CN104574119B (en) | A kind of method that commodity Jianzhen traces to the source | |
CN109919280B (en) | Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181123 |
|
WW01 | Invention patent application withdrawn after publication |