CN113420337A - Data protection method and system with anti-theft function - Google Patents

Data protection method and system with anti-theft function Download PDF

Info

Publication number
CN113420337A
CN113420337A CN202110826921.3A CN202110826921A CN113420337A CN 113420337 A CN113420337 A CN 113420337A CN 202110826921 A CN202110826921 A CN 202110826921A CN 113420337 A CN113420337 A CN 113420337A
Authority
CN
China
Prior art keywords
verification information
information
verification
carrier
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110826921.3A
Other languages
Chinese (zh)
Inventor
庄定善
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110826921.3A priority Critical patent/CN113420337A/en
Publication of CN113420337A publication Critical patent/CN113420337A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention provides a data protection method and a data protection system with an anti-theft function. The method comprises the following steps: one or more groups of combined check information are arranged on the check information carrier, when a user scans the check information, any one of the combined check information is scraped, and the other check information is exposed for scanning; after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system; the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged. The system comprises modules corresponding to the method steps.

Description

Data protection method and system with anti-theft function
Technical Field
The invention provides a data protection method and a data protection system with an anti-theft function, and belongs to the technical field of information authentication.
Background
In the current society, merchants want to make their commodities occupy the market, and most importantly, establish their brands. But counterfeit goods are not avoided in the market, and in order to protect the interests of the merchant, the merchant usually uses an anti-counterfeit label on the goods to help the consumer to identify the authenticity of the goods. However, the anti-counterfeit label is stolen and largely copied to be used on counterfeit goods in the circulation process, so that the brand image of a merchant is damaged, and the benefit of consumers is also seriously influenced.
With the continuous development of science and technology, verification information has become a wide information verification mode, however, when the current verification information is used for verifying the authenticity of a commodity, the verification information can be obtained through a photo and the like, so that the verification information is often stolen and copied, and the copied verification information is attached to a counterfeit product, so that a user can verify the counterfeit product through embezzling the copied true verification information in the product verification process.
Disclosure of Invention
The invention provides a data protection method and a system with an anti-theft function, which are used for solving the problem that a verification product corresponding to verification information is inconsistent with the verification information due to the fact that the verification information is imitated, and adopt the following technical scheme:
a data protection method with anti-theft functionality, the method comprising:
one or more groups of combined verification information are arranged on the verification information carrier, wherein each group of combined verification information comprises two different verification information; and, there are numbers corresponding to said check-up information on the said check-up information carrier, namely the carrier reveals the number;
when a user scans the verification information, any one of the verification information in all the combined verification information is scraped, and the other verification information is exposed for scanning;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Further, the verification information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Further, each group of the combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front side and the back side of the check information carrier, and the first check information and the second check information are mutually overlapped.
Further, the carrier display codes are arranged on the carrier in a non-overlapping mode.
Further, the method further comprises:
when a plurality of groups of combined check information are arranged on the check information carrier, when a user randomly scrapes any one check information in any group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user;
the user acquires another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the another piece of verification information;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Further, the retrieving a number corresponding to the scanned verification information from a verification system includes:
when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
after a user selects and scans verification information, a verification system extracts a system display code corresponding to the verification information for display, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time;
locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier;
setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first time display verification information as a starting point;
in the system display code destruction time, when a user adds one scanning authentication of the combined verification information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
if the user does not scan and verify all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
A data protection system with anti-theft function, said system is used to implement any one of the above mentioned data protection method with anti-theft function, said system includes:
the checking information carrier is used for carrying one group or a plurality of groups of combined checking information and carrier display numbers corresponding to the checking information in the combined checking information;
the scanning module I is used for calling a serial number corresponding to the scanned verification information from a verification system after a user scans the verification information, namely the serial number is provided by the system;
and the verification system is used for storing a system supply number corresponding to each piece of verification information in each piece of combined verification information.
Further, the verification information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Further, each group of the combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front surface and the back surface of the check information carrier, and the first check information and the second check information are mutually overlapped; and the carrier display number comprises a digital number uniquely corresponding to the first check information and the second check information.
Further, the carrier display codes are arranged on the carrier in a non-overlapping mode.
Further, the system further comprises:
the verification information destruction device is used for destroying the verification information of all other combination verification information which is not scraped by the user immediately when the user randomly scrapes any one of the combination verification information in any one group of combination verification information when the plurality of groups of combination verification information are arranged on the verification information carrier; the verification information destruction device can adopt an ink box;
the scanning module II is used for acquiring another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information by the user and scanning the verification information;
and the extraction module is used for calling a serial number corresponding to the scanned verification information from the verification system after the user scans the verification information, namely the serial number is provided by the system.
Further, the first scanning module comprises:
the extraction recording module is used for extracting and displaying a system display code corresponding to the verification information by the verification system after the user selects and scans the verification information, and simultaneously recording the time of displaying the system display code corresponding to the verification information for the first time;
the locking module is used for locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located and acquiring system display codes corresponding to all the verification information carried on the verification information carrier;
the time setting module is used for setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
the automatic adjustment module is used for automatically adjusting the destroying time of the system display codes once when a user adds one scanning authentication of the combined verification information within the destroying time of the system display codes until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
and the destruction module is used for scanning and verifying all combined verification information on the verification information carrier if the user does not perform scanning and verification on all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, and the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
The invention has the beneficial effects that:
the invention provides a data protection method and a system with an anti-theft function, which effectively prevent verification information from being stolen through image acquisition modes such as photographing and the like by a mode of stacking two pieces of completely different verification information at the same position of the front side and the back side of a transparent or semitransparent verification information carrier. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. On the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, and the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a system block diagram of the system of the present invention;
fig. 3 is a schematic diagram of the operation of the system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
The embodiment provides a data protection method with an anti-theft function, as shown in fig. 1, the method includes:
s1, one or more groups of combined verification information are arranged on the verification information carrier, wherein each group of combined verification information comprises two different verification information; and, there are numbers corresponding to said check-up information on the said check-up information carrier, namely the carrier reveals the number; wherein the carrier display codes are arranged on the carrier in a non-overlapping way;
s2, when the user scans the verification information, scraping any one of the verification information in all the combined verification information, and exposing the other verification information for scanning;
s3, after the user scans the verification information, calling a number corresponding to the scanned verification information from the verification system, namely, the system provides a number; the checking system can adopt a block chain system, and can also adopt a database or a data storage system;
s4, the user compares the carrier display number with the system supply number, if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Wherein, the checking information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Each group of combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front side and the back side of the check information carrier, and the first check information and the second check information are mutually overlapped.
The verification information can be information symbols, graphs or codes with verification functions, such as two-dimensional codes, bar codes, verification codes, plaintext and the like.
The working principle of the technical scheme is as follows: taking 10 combined systems with eight pieces of verification information on the two sides as an example for illustration, four pieces of combined verification information are arranged on the central area of the verification information carrier, and each piece of combined verification information is a completely different combination of verification information with the front side and the back side superposed, so 8 pieces of verification information are arranged on the verification information carrier. A verification information area with the size of 2cm x 2cm or 1.8cm x 1.8cm is arranged, and due to the fact that two completely different verification information are printed on the front side and the back side in an overlapped mode, the verification information cannot be read under the condition that the other side is not scraped.
Numbers from 1 to 8 are respectively printed outside the central area (such as the upper left corner or the lower right corner) of the verification information carrier, four numbers are printed on the front side, four numbers are printed on the back side (namely, carrier display numbers), and the numbers on the front side and the back side are not overlapped at one position, so that the numbers can be visually identified without operation.
The corresponding 8 verification information and the numbers thereof are stored in a verification system from 00001-. A total of 80 different verification messages are used in 10 systems or products, each system or product corresponding to 8 numbers and verification messages.
After a user scans certain scraped verification information, the verification system can give a number corresponding to the verification information. If the numbers do not conform, the counterfeiting is indicated. If the number of a certain system is missing, only four numbers are missing, so that the counterfeiting is also indicated.
Meanwhile, the number (namely, the system display code) can be corresponding to different verification information through the verification system, and the number must be preset in advance and cannot be tampered in the future, so that effective evidence can be provided when piracy is attacked. Otherwise, the counterfeiter can claim that the anti-counterfeiting system is changed or has errors, and the counterfeiter needs to prove that the anti-counterfeiting system has not been changed or has no errors all the time.
The effect of the above technical scheme is as follows: through the mode of stacking two completely different check information at the same position of the front side and the back side of the transparent or semitransparent check information carrier, the check information is effectively prevented from being stolen through image acquisition modes such as photographing. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. From the perspective that the verification information cannot be imitated and stolen, the product is prevented from being imitated and verified; on the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided, and the product is thoroughly prevented from being imitated and verified from the verification information verification angle.
Example 2
In this embodiment, a scheme addition is performed on the basis of embodiment 1, and specifically, the method further includes:
step 1, when a plurality of groups of combined check information are arranged on a check information carrier, and when a user randomly scrapes any one check information in any one group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user;
step 2, the user obtains another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the verification information;
step 3, after the user scans the verification information, calling a number corresponding to the scanned verification information from the verification system, namely providing the number by the system;
step 4, the user compares the carrier display number with a system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
The working principle of the technical scheme is as follows: when a plurality of groups of combined check information are arranged on the check information carrier, when a user randomly scrapes any one check information in any group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user; the user acquires another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the another piece of verification information; after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system; the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged. The damage mode can be that an ink box or other objects polluting the verification information are arranged on the verification information carrier, when a user scrapes off a group of combined verification information, the ink box mechanism is touched to pollute all other combined verification information, and therefore other combined verification information cannot be used. Since the user randomly selects the verification information from the multiple groups of combined verification information, the verification information is uncertain and random, and a malicious third party cannot determine which verification information the user can utilize for scanning verification in advance, so that the true verification information cannot be stolen, and the anti-theft and anti-counterfeiting performances of the verification information are effectively improved.
The effect of the above technical scheme is as follows: through the uncertainty and unpredictability of the check information randomly selected and verified by the user, a malicious third party cannot determine which check information the user can utilize for scanning and verification in advance, so that the true check information cannot be stolen, and the anti-theft and anti-counterfeiting performances of the check information are effectively improved.
Example 3
The present embodiment is a further limitation on the data protection method with an anti-theft function provided in embodiment 1, and specifically, the retrieving, from the verification system, a number corresponding to the scanned verification information in S3 includes:
s301, when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
s302, after a user selects and scans verification information, a verification system extracts a system display code corresponding to the verification information for display, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time;
s303, locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier;
s304, setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
s305, in the system display code destruction time, when a user adds one scanning authentication of the combined check information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined check information on the check information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
s306, if the user does not scan and verify all combined verification information on the verification information carrier in the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to the verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
In this embodiment, the check system may be a blockchain system, and when the blockchain system is adopted, the data security can be further improved due to the non-falsification property of the blockchain system.
Firstly, when a plurality of groups of combined check information are arranged on the check information carrier, a system display code corresponding to each check information in each group of combined check information is stored in the check system; then, after the user selects and scans the verification information, the verification system extracts and displays the system display code corresponding to the verification information, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time; then, locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier; setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first time display verification information as a starting point; in the system display code destruction time, when a user adds one scanning authentication of the combined verification information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; and finally, if the user does not scan and verify all combined verification information on the verification information carrier in the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to the verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
Wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
the effect of the above technical scheme is as follows: in this embodiment, another way of improving the randomness of the user verification check information is shown, after the user performs one or more (i.e., part or all) check information scanning verification, the check system automatically destroys the stored system provided serial number, and by this way, it is effectively prevented that a malicious third party performs counterfeit verification by using the check information exposed after being scraped. Through the mode, the verification information corresponding to each product can be ensured to be verified for the product only once, and the product is thoroughly prevented from being imitated and verified from the verification information verification angle. Through the time setting mode, effective time can be provided for a user to complete verification of all verification information, meanwhile, the reserved time of system display codes in the verification system can be shortened, and the situation that the system display verification information is acquired or copied due to the fact that the system display time corresponding to the verification information in the verification system is too long after the verification information is started is avoided. Meanwhile, due to the limitation of the time length, the randomness of the verification completion result of the user can be improved through the limitation of the verification progress of the user with the low verification speed, the uncertainty of malicious third parties in obtaining information is improved, the difficulty of information imitation and embezzlement is improved, and the anti-counterfeiting performance of the verification information is further effectively improved.
Example 4
This embodiment proposes a data protection system with an anti-theft function, which is used to implement the data protection method with an anti-theft function described in embodiments 1 to 3, as shown in fig. 2, the system includes:
the checking information carrier is used for carrying one group or a plurality of groups of combined checking information and carrier display numbers corresponding to the checking information in the combined checking information; the carrier display codes are arranged on the carrier in a non-overlapping mode.
The scanning module I is used for calling a serial number corresponding to the scanned verification information from a verification system after a user scans the verification information, namely the serial number is provided by the system;
and the verification system is used for storing a system supply number corresponding to each piece of verification information in each piece of combined verification information. The checking system may adopt a block chain system or a database.
Wherein, the checking information carrier is a transparent (or semitransparent, with certain perspective) carrier. Each group of combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front surface and the back surface of the check information carrier, and the first check information and the second check information are mutually overlapped; and the carrier display number comprises a digital number uniquely corresponding to the first check information and the second check information.
The system further comprises:
the verification information destruction device is used for destroying the verification information of all other combination verification information which is not scraped by the user immediately when the user randomly scrapes any one of the combination verification information in any one group of combination verification information when the plurality of groups of combination verification information are arranged on the verification information carrier; the verification information destruction device can adopt an ink box;
the scanning module II is used for acquiring another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information by the user and scanning the verification information;
and the extraction module is used for calling a serial number corresponding to the scanned verification information from the verification system after the user scans the verification information, namely the serial number is provided by the system.
Wherein, the scanning module one includes:
when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
the extraction recording module is used for extracting and displaying a system display code corresponding to the verification information by the verification system after the user selects and scans the verification information, and simultaneously recording the time of displaying the system display code corresponding to the verification information for the first time;
the locking module is used for locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located and acquiring system display codes corresponding to all the verification information carried on the verification information carrier;
the time setting module is used for setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
the automatic adjustment module is used for automatically adjusting the destroying time of the system display codes once when a user adds one scanning authentication of the combined verification information within the destroying time of the system display codes until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
and the destruction module is used for scanning and verifying all combined verification information on the verification information carrier if the user does not perform scanning and verification on all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, and the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
The effect of the above technical scheme is as follows: through the mode of stacking two completely different check information at the same position of the front side and the back side of the transparent or semitransparent check information carrier, the check information is effectively prevented from being stolen through image acquisition modes such as photographing. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. On the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, and the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A data protection method with anti-theft function, the method comprising:
one or more groups of combined verification information are arranged on the verification information carrier, wherein each group of combined verification information comprises two different verification information; and, there are numbers corresponding to said check-up information on the said check-up information carrier, namely the carrier reveals the number;
when a user scans the verification information, any one of the verification information in all the combined verification information is scraped, and the other verification information is exposed for scanning;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
2. Method according to claim 12, characterized in that the verification information carrier is a transparent carrier.
3. The method according to claim 1 or 2, wherein each set of the combined check information includes first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front side and the back side of the check information carrier, and the first check information and the second check information are mutually overlapped.
4. The method of claim 1, wherein the carrier display codes are disposed on the carrier in a non-overlapping manner.
5. The method of claim 1, further comprising:
when a plurality of groups of combined check information are arranged on the check information carrier, when a user randomly scrapes any one check information in any group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user;
the user acquires another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the another piece of verification information;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
6. A data protection system with anti-theft function, characterized in that, the system is used to implement a data protection method with anti-theft function as claimed in any one of claims 1 to 5, wherein, the system includes:
the checking information carrier is used for carrying one group or a plurality of groups of combined checking information and carrier display numbers corresponding to the checking information in the combined checking information;
the scanning module I is used for calling a serial number corresponding to the scanned verification information from a verification system after a user scans the verification information, namely the serial number is provided by the system;
and the verification system is used for storing a system supply number corresponding to each piece of verification information in each piece of combined verification information.
7. The system of claim 6, wherein the verification information carrier is a transparent carrier.
8. The system according to claim 6 or 7, wherein each set of the combined check information includes a first check information and a second check information; the first check information and the second check information are respectively arranged at the same positions of the front surface and the back surface of the check information carrier, and the first check information and the second check information are mutually overlapped; and the carrier display number comprises a digital number uniquely corresponding to the first check information and the second check information.
9. The system of claim 6, wherein the carrier display codes are disposed on the carrier in a non-overlapping manner.
10. The system of claim 6, further comprising:
the verification information destruction device is used for destroying the verification information of all other combination verification information which is not scraped by the user immediately when the user randomly scrapes any one of the combination verification information in any one group of combination verification information when the plurality of groups of combination verification information are arranged on the verification information carrier;
the scanning module II is used for acquiring another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information by the user and scanning the verification information;
and the extraction module is used for calling a serial number corresponding to the scanned verification information from the verification system after the user scans the verification information, namely the serial number is provided by the system.
CN202110826921.3A 2021-07-21 2021-07-21 Data protection method and system with anti-theft function Pending CN113420337A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110826921.3A CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110826921.3A CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Publications (1)

Publication Number Publication Date
CN113420337A true CN113420337A (en) 2021-09-21

Family

ID=77718023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110826921.3A Pending CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Country Status (1)

Country Link
CN (1) CN113420337A (en)

Similar Documents

Publication Publication Date Title
EP0966839B1 (en) In-camera image marking and authentication
US7815117B2 (en) Method and apparatus for counterfeiting protection
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
US7757952B2 (en) Method and apparatus for counterfeiting protection
EP3311336B1 (en) Authentication feature in a barcode
CN109472337B (en) Label anti-counterfeiting method and device based on random characteristics
US20040042641A1 (en) Personnel identity verification system
US20020178363A1 (en) System and method for authentication of items
US20050049979A1 (en) Method, apparatus, and system for determining a fraudulent item
US20070152032A1 (en) Method and apparatus for counterfeiting protection
US20150188706A1 (en) Method for Unambiguous Marking of an Object
CN109190736B (en) Anti-counterfeiting two-dimensional code and generation method and generation application system thereof
US20070200335A1 (en) Method and apparatus for counterfeiting protection
US6691916B2 (en) Autograph verification and authentication system
EP2702541A2 (en) Monitoring movable articles
US6772342B1 (en) Document or message security arrangements using a numerical hash function
CN101356538A (en) Method of authentication of items put into circulation field
JP2017017673A (en) Method for protecting authenticity of article, item, document, package and/or label from imitation, forgery and theft
US8325969B2 (en) Methods for making an authenticating system
WO2006042913A1 (en) Method for making secure transactions and authentication of objects or documents
WO2022094635A1 (en) Anti-tampering medium, anti-tampering authentication system and tamper detection method
CN113420337A (en) Data protection method and system with anti-theft function
US20190156090A1 (en) Warranty tracking method for a consumer product
JP2001052143A (en) Recording medium for authentication and authentication system
CN113743555A (en) Composite two-dimensional code system with calibration function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination