CN102147884A - Anti-counterfeiting and authenticity-verifying method and system for article - Google Patents

Anti-counterfeiting and authenticity-verifying method and system for article Download PDF

Info

Publication number
CN102147884A
CN102147884A CN 201110059453 CN201110059453A CN102147884A CN 102147884 A CN102147884 A CN 102147884A CN 201110059453 CN201110059453 CN 201110059453 CN 201110059453 A CN201110059453 A CN 201110059453A CN 102147884 A CN102147884 A CN 102147884A
Authority
CN
China
Prior art keywords
security code
signature file
private key
article
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110059453
Other languages
Chinese (zh)
Inventor
朱清明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 201110059453 priority Critical patent/CN102147884A/en
Publication of CN102147884A publication Critical patent/CN102147884A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention discloses an anti-counterfeiting and authenticity-verifying method and system for an article. The method comprises the following steps of: encrypting anti-counterfeiting article information acquired by using a first private key to generate a first signature file, and generating anti-counterfeiting codes according to public key information corresponding to the first signature file and the first private key; and when the article with the generated anti-counterfeiting codes is verified and displayed, acquiring image information of the anti-counterfeiting codes by using image pickup equipment, obtaining the first signature file and the public key information according to the image information, decrypting the first signature file according to the public key information, displaying the decrypted information, and judging the authenticity of the article according to the displayed information. According to the method, when the authenticity of the article is queried, the authenticity of the article can be identified without querying the information database of the article through a mobile phone or short message or in a surfing mode, the query process is convenient, and consumption of communication resources cannot be generated; meanwhile, according to the method of the embodiment, information data of the article do not need to be established and maintained, thus the cost of querying the authenticity of the article is reduced.

Description

A kind of article anti-counterfeit and the method and system of verifying the true and false
Technical field
The present invention relates to digital signature and field of anti-counterfeit technology, relate to a kind of article anti-counterfeit and the method and system of verifying the true and false in particular.
Background technology
Along with the continuous fierceness of social competition, the behavior of various false makings, fraud is increasing.As, forged certificates such as various Fake Diplomas, spurious certificate constantly occur, and various fake productss are of common occurrence especially.In order to identify forged certificate, counterfeit and shoddy goods, hit the behavior that false making is faked, various anti-fake certificate technology are arisen at the historic moment.
Existing qualification authentication to various certificates, the method of perhaps verifying authenticity of products is: when verifying the true and false of article such as certificate or commodity when needs, can by modes such as phone, sending short message by mobile phone or online enter article issuer (as, the issuing organization of certificate, bill production company, the commodity production merchant) inquiry system, import the anti-counterfeiting information such as numbering of article then to inquiry system, inquiry system can be by the information database of setting up in advance like this, obtain the true and false information of certificate or product, and return to the user.
Though by having the true and false information that method can be inquired about certificate and product now, but because this method of use need be passed through mode true-false inquiring information such as phone, note or online, query script inconvenience, true-false inquiring information consuming time longer also will inevitably be caused the consumption of the communication resource; Existing method need be set up and safeguard by the information database of inquiry article simultaneously, has increased the cost of inquiry article genuine-fake.
Summary of the invention
In view of this, the invention provides a kind of article anti-counterfeit and the method and system of verifying the true and false, can simplify the process of inquiry article genuine-fake, lower the cost of inquiry article genuine-fake.
For achieving the above object, the invention provides a kind of method of article anti-counterfeit, comprising:
Obtain the summary info for the treatment of false proof article;
First private key that utilization is preset is encrypted described summary info and is generated first signature file;
Generate security code according to described first signature file and the public key information corresponding with described first private key, so that described security code is presented at described treating on the false proof article, by yard software of testing that is installed in advance on the subscriber terminal equipment described security code is decoded, on described terminal device, demonstrate the described summary info that described security code comprises.
Preferably, described first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to, and described third party's false-proof mechanism is that the different false proof article issuers that treat distribute the first different private keys;
Described according to described first signature file and the public key information generation security code corresponding with described first private key, comprising:
Described first signature file and the public key information corresponding with described first private key are converted into security code.
Preferably, described according to described first signature file and the public key information generation security code corresponding with described first private key, comprising:
Utilize second private key of third party's false-proof mechanism that described first signature file and the public key information corresponding with described first private key are encrypted generation second signature file;
Described second signature file is converted into security code.
Preferably, the public key information of the described first private key correspondence is first PKI of the described first private key correspondence, or the generation parameter of first PKI of the described first private key correspondence.
Preferably, described security code is a two-dimension code.
Preferably, describedly treat that false proof article comprise: certificate, bill or commodity.
Preferably, described summary info comprises: treat the image information of false proof article and/or treat the Word message of false proof article.
The present invention also provides a kind of method of article genuine-fake checking, shows the security code of the method generation that utilizes described article anti-counterfeit on the described article, and this method comprises:
Obtain the image information of security code on the article by image capture apparatus;
According to the image information of described security code, obtain described first signature file and with the corresponding public key information of described first private key;
According to described public key information described first signature file is decrypted;
Show the information after deciphering.
Preferably, the image information of the described security code of described foundation, obtain described first signature file and with the corresponding public key information of described first private key, comprising:
With described security code decode transform obtain first signature file and with the corresponding public key information of described first private key.
Preferably, the image information of the described security code of described foundation, obtain described first signature file and with the corresponding public key information of described first private key, comprising:
Described security code transformed obtain second signature file;
Second PKI of third party's false-proof mechanism that utilization is preset is decrypted described second signature file, obtain described first signature file and with the corresponding public key information of described first private key, wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
Preferably, the described public key information corresponding with first private key is the first corresponding PKI of described first private key;
Describedly described first signature file is decrypted, comprises: utilize described first PKI that described signature file is decrypted according to described public key information.
Preferably, the corresponding public key information of described and described first private key is the generation parameter of the first corresponding PKI of described first private key;
Describedly described first signature file is decrypted, comprises according to described public key information:
Utilize the generation parameter of described first PKI to generate first PKI;
Utilize described first PKI to decipher described first signature file.
Preferably, described security code is a two-dimension code.
Preferably, described method is applied to have the subscriber terminal equipment of camera function.
The method of corresponding a kind of article anti-counterfeit of the present invention, the present invention also provides a kind of system of article anti-counterfeit, and this system comprises:
Information acquisition unit is used to obtain the summary info for the treatment of false proof article;
The information encryption unit is used to utilize first private key that presets that described summary info is encrypted and generates first signature file;
Coding unit, be used for generating security code according to described first signature file and the public key information corresponding with described first private key, so that described security code is presented at described treating on the false proof article, by yard software of testing that is installed in advance on the subscriber terminal equipment described security code is decoded, on described terminal device, demonstrate the described summary info that described security code comprises.
Preferably, described first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to;
Described coding unit comprises: first coding unit is used for described first signature file and the public key information corresponding with described first private key are converted into security code.
Preferably, described coding unit comprises:
The superencipher unit is used to utilize second private key of third party's false-proof mechanism that described first signature file and the public key information corresponding with described first private key are encrypted generation second signature file;
Second coding unit is used for described second signature file is converted into security code.
Preferably, described coding unit is specially: be used for described first signature file and first PKI corresponding with described first private key are generated security code.
Preferably, described coding unit is specially: be used for the generation parameter of described first signature file and first PKI corresponding with described first private key is generated security code.
Preferably, described coding unit is used for generating two-dimension code according to described first signature file and the public key information corresponding with described first private key.
The method of corresponding a kind of article genuine-fake checking of the present invention, the present invention also provides a kind of system of article genuine-fake checking, shows the security code of the system's generation that utilizes described article anti-counterfeit on the described article, and this system comprises:
The image capture unit is used for obtaining by image capture apparatus the image information of security code on the article;
The security code processing unit is used for the image information according to described security code, obtain described first signature file and with the corresponding public key information of described first private key;
Decryption unit, the public key information that is used for obtaining according to the security code processing unit is decrypted described first signature file;
Display unit is used to show the information after the deciphering.
Preferably, described security code processing unit comprises:
The first security code processing unit, be used for described security code decode transform obtain first signature file and with the corresponding public key information of described first private key.
Preferably, described security code processing unit comprises:
Conversion unit is used for described security code conversion is obtained second signature file;
The second security code processing unit, be used to utilize second PKI of the third party's false-proof mechanism that presets that described second signature file is decrypted, obtain described first signature file and with the corresponding public key information of described first private key, wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
Preferably, described security code is a two-dimension code.
Preferably, the security code processing unit is specially, and is used for the image information according to described security code, obtains described first signature file and first PKI corresponding with described first private key;
Described decryption unit comprises: first decryption unit is used to utilize described first PKI that described signature file is decrypted.
Preferably, the security code processing unit is specially, and is used for the image information according to described security code, obtains the generation parameter of described first signature file and first PKI corresponding with described first private key;
Described decryption unit comprises:
The PKI generation unit is used for generating first PKI according to the generation parameter of described first PKI;
Second decryption unit is used to utilize described first PKI to decipher described first signature file.
Via above-mentioned technical scheme as can be known, compared with prior art, the present invention openly provides the method and system of a kind of article anti-counterfeit with the checking true and false, the article anti-counterfeit method of the embodiment of the invention utilizes first private key that the false proof Item Information for the treatment of that obtains is encrypted generation first signature file, and generates security code according to first signature file and the public key information corresponding with first private key.The security code that the article anti-counterfeit method of the embodiment of the invention is generated is presented on the article, when needing the true and false of checking article, obtain the image information of the security code on the article by image capture apparatus, can get access to the public key information of first signature file and the first private key correspondence according to the image information of security code, can be decrypted described first signature file according to described public key information, and the final information that shows after deciphering, the information that foundation shows just can be judged the true and false of article.The method of the embodiment of the invention need not to inquire about the item information data storehouse by modes such as mobile phone, note or online when inquiring about article genuine-fake just can distinguish article genuine-fake, query script is convenient, can not produce the consumption of the communication resource, the method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.Simultaneously, this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is embodiments of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to the accompanying drawing that provides.
Fig. 1 is the flow chart of steps of method of a kind of article anti-counterfeit of the embodiment of the invention;
Fig. 2 is the flow chart of steps of method of a kind of article genuine-fake checking of the embodiment of the invention;
Fig. 3 is the structural representation of system of a kind of article anti-counterfeit of the embodiment of the invention;
Fig. 4 is the structural representation of system of a kind of article anti-counterfeit of another embodiment of the present invention;
Fig. 5 is the structural representation of system of a kind of article genuine-fake checking of the embodiment of the invention;
Fig. 6 is the structural representation of system of a kind of article genuine-fake checking of another embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The embodiment of the invention can be used in numerous general or special purpose calculation element environment or the configuration.For example: mobile phone, personal computer, server computer, handheld device or portable set, plate equipment, multiprocessor device, comprise distributed computing environment of above any device or equipment or the like.
Referring to Fig. 1, be the flow chart of steps of the method for a kind of article anti-counterfeit of the embodiment of the invention one, this method comprises:
Step S101: obtain the summary info for the treatment of false proof article;
Wherein, treat that false proof article can be extensive stock in certificate, bill or the market etc., as, treat that false proof article can be various certificates such as I.D., academic certificate, honorary certificate or various qualification certificates; Treat that false proof article also can be bills such as various ticket, admission ticket, various invoices.
The summary info for the treatment of false proof article is: treat the image information of false proof article, the Word message for the treatment of to show on the false proof article, recommended information etc.Can also comprise the information such as valid period for the treatment of false proof article.Certainly can also in summary info, increase other information for the treatment of false proof article according to actual needs.
For example, be example with the certificate, the summary info that obtains certificate can be the image information of certificate, can react content displayed on the certificate more intuitively like this, or additional clause word content summary.The relevant information that can also comprise the issuing organization and the issuing organization of certificate certainly, or the information such as date of expiration of certificate.
Wherein, the mode of obtaining the summary info for the treatment of false proof article can have multiple, can for: adopt and treat false proof article and take pictures, and from photo, extract the mode of summary info; Perhaps, for the summary info of forms such as literal, also can adopt manual entry is become e-file, from e-file, extract summary info again, can certainly adopt above dual mode combination is removed to obtain summary info, perhaps adopt other modes, enumerate no longer one by one here.
Step S102: utilize first private key that presets that described summary info is encrypted and generate first signature file;
By first private key that presets the summary info for the treatment of false proof article that gets access to is encrypted, to obtain first signature file corresponding with summary info.Have only by first PKI corresponding and could be decrypted the summary info that obtains treating false proof article this first signature file with this first private key.
Step S103: generate security code according to described first signature file and the public key information corresponding, so that described security code is presented at described treating on the false proof article with described first private key.
According to first signature file that obtains after will Summary file encrypting and the public key information corresponding, and encode and wait processing can generate the security code of correspondence with first private key.Then, security code can be presented at by modes such as printing, stickups and treat false proof article,, can realize verifying the purpose of the true and false of existing article by this security code by corresponding proving program.
Process by the security code checking article genuine-fake, need deciphering first signature file to obtain the summary info of article, therefore need to comprise in the security code public key information of the first private key correspondence, so that decipher first signature file according to the public key information of the first private key correspondence.Wherein, the public key information of the first private key correspondence can be the generation parameter of first PKI of the first private key correspondence.When checking article genuine-fake, according to the image information acquisition of the security code on the article to first signature file and the relevant generation parameter information of first PKI, utilize this generation parameter information to generate first PKI then, utilize first PKI to decipher first signature file again.
Certainly, the public key information of the first private key correspondence also can be first PKI of the first private key correspondence.In this case, during checking article genuine-fake, only need to first PKI and first signature file, just can directly be deciphered first signature file with first PKI according to the image information acquisition of the security code on the article.
Wherein, first PKI is the key corresponding with first private key, have only by this first public key information and just can decipher first signature file, thereby first signature file is reduced to the summary info for the treatment of false proof article, so that in the proof procedure, compare by this summary info and article, distinguish article genuine-fake.
The security code that the embodiment of the invention generates can be one dimension sign indicating number (bar code), two-dimension code, plays the effect of storing summary info and gets final product so long as can preserve.It is big to consider that two-dimension code has an information memory capacity, can represent multiple information such as Chinese character and image, is applicable to the characteristics of printing or sticking on article surface, can preferentially select two-dimension code as security code.Certainly, specifically select which kind of security code to determine as required.As, summary info is the recommended information for the treatment of false proof article of typing, is example with the certificate, summary info is the synopsis that comprises in the certificate, the signature file of the synopsis correspondence after encrypting can be generated the one dimension sign indicating number.
False proof to article comes down to false proof to the article fabricator, therefore, the most important thing is how to guarantee the authenticity of fabricator's identity, therefore, needs the arbitration of a third-party institution.That is to say, in the process that security code generates, should be able to embody the arbitrated procedure of the third-party institution, to guarantee the reliability of article fabricator or issuer, the mode that embodies the process of this arbitration in security code can have multiple, for example, wherein a kind of mode can for: by third party's false-proof mechanism according to the identity information for the treatment of false proof article issuer, determine and treat the corresponding unique PKI of false proof article issuer, and utilize the specific authorisation software program of third party's false-proof mechanism, by some algorithms this PKI is converted into first private key.
That is to say that first private key that presets among the step S102 is: third party's false-proof mechanism licenses to the private key for the treatment of false proof article issuer.Because first private key is after third party's false-proof mechanism is treated false proof article issuer identity validation, license to the private key with uniqueness and non-reproduction of this article issuer, therefore by this first encrypted private key, first signature file, and the process that finally obtains security code has just embodied the identity validation process that third party's false-proof mechanism is treated false proof article issuer.
Wherein, treat false proof article issuer, be meant the producer, fabricator or the issuer etc. for the treatment of false proof article.As, when treating that false proof article are various certificate, the issuer that treats false proof article is meant the Notified Body of certificate; When treating that false proof article are commodity, treat that the issuer of false proof article is meant, the production of commodity, fabricator.
When first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to, generate security code according to first signature file and the public key information corresponding with first private key, can for: be converted into security code with first signature file and with the corresponding public key information of first private key.That is to say, the public key information of first signature file and the first private key correspondence is encoded, transform and obtain security code when first private key of authorizing with the third party.Because encrypting and obtaining first used in first signature file private key is through the mandate of third party's false-proof mechanism, therefore the security code process that obtains by such mode can embody the identity validation that third party's false-proof mechanism is treated false proof article mechanism.
Simultaneously, utilize third party's false-proof mechanism to license to treat the private key of false proof article issuer to obtain security code, can help third party's false-proof mechanism and determine the issuer that treats false proof article of the correspondence of this security code, like this, when certain article went wrong, that can determine this article correspondence treated false proof article issuer.As, when credential issuance mechanism distributed certificate indiscriminately, the security code in the certificate of utility can be determined the issuer of certificate, can avoid credential issuance mechanism to deny.
Certainly, first private key that presets also can be for treating what false proof article issuer determined voluntarily, in this case, in order to guarantee to treat the genuine and believable of false proof article issuer, promptly in order in security code, to embody the process of this arbitration, can also followingly carry out: second private key of determining unique third party's false-proof mechanism by third party's false-proof mechanism, treat false proof article issuer with first private key that presets summary info is encrypted generate first signature file after, utilize second private key of third party's false-proof mechanism that the public key information of first signature file and the first private key correspondence is encrypted and generate second signature file.Then generate the process of security code, specifically can comprise according to first signature file and the public key information corresponding with first private key:
Utilize second private key of third party's false-proof mechanism that the public key information of first signature file and the first private key correspondence is encrypted generation second signature file;
Second signature file is converted into security code.
That is to say, when first private key that presets is not during by the mandate of third party's false-proof mechanism, in order to guarantee to treat the true and reliable property of false proof article issuer, also promptly embodying the identity for the treatment of false proof article issuer by third party's false-proof mechanism confirms, then after the summary info encryption that will treat false proof article with first private key obtains first signature file, second private key that can utilize third party's false-proof mechanism is again encrypted the public key information of described first signature file and the first private key correspondence and is obtained second signature file, and second signature file is converted into security code.Like this can be when the security code of checking, have only by second PKI corresponding and could decipher second signature file with second private key of third party's false-proof mechanism, and behind deciphering second signature file, obtain the public key information of first signature file and the first private key correspondence, obtain first PKI by this public key information, and decipher first signature file, and the final summary info that obtains to treat false proof article by first PKI.Utilize second private key of third party's false-proof mechanism that first signature file is encrypted, because second private key of third party's false-proof mechanism has unicity and non-reproduction, just can guarantee to have only through just utilizing the security code that obtains of this method by passing through the false proof article issuer that treats that third party's false-proof mechanism carries out qualification testing.
Certainly, when first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to, first private key that utilization is preset is encrypted generation first signature file to summary info after, at second private key that utilizes third party's false-proof mechanism the public key information of first signature file and the first private key correspondence is encrypted generation second signature file, and second signature file is converted into security code.Can further guarantee to treat the true and reliable property of false proof article publisher like this.
As seen through the above description of the embodiments, those skilled in the art's article anti-counterfeit method that can be well understood to the embodiment of the invention can realize by the mode that software adds essential general hardware platform.
In addition, need to prove that first private key can be arranged in the software of the article anti-counterfeit method of moving the embodiment of the invention in the embodiment of the invention, as move the computer-internal of this software.In order to guarantee that the talent that this computing machine of security can only be had a special authority can move.Certainly, first private key sets in advance and is kept at independently in the hardware, when needs utilize the method for the embodiment of the invention to generate security code, with this hardware and the operation embodiment of the invention article anti-counterfeit the related software system (as, computing machine) connects, just can pass through this software, and utilize first private key to generate the first signature file file, and finally obtain security code.The article anti-counterfeit method corresponding software of the operation embodiment of the invention can be to treat false proof article issuer, by treating that first private key that false proof article issuer utilizes the third party to authorize encrypts the article summary info, and generate security code according to the method for the embodiment of the invention.
Perhaps, also can be by the software of third party's false-proof mechanism operation embodiment of the invention article anti-counterfeit method, third party's false-proof mechanism can be by communicating with treating false proof article issuer, obtain the identity information for the treatment of false proof article issuer and the summary info for the treatment of false proof article, after treating the identity of false proof article issuer by third party's false-proof mechanism checking then, utilize first private key to encrypt the summary info for the treatment of false proof article for the treatment of false proof article issuer, obtain first signature file, again the public key information of first signature file and the first private key correspondence is passed to and treated false proof article issuer, so that treat false proof article issuer the public key information of first signature file and the first private key correspondence is generated security code, certainly, third party's false-proof mechanism also can utilize second PKI that the public key information of first signature file and the first private key correspondence is encrypted again, obtain second signature file, second signature file is passed to article issuer, so that article issuer generates security code with second signature file.
Referring to Fig. 2, the flow chart of steps for the method for a kind of article genuine-fake checking of the embodiment of the invention shows the security code that generates in the article anti-counterfeit method in the embodiment of the invention on the article of the true and false to be verified, and this method comprises:
Step S201: the image information of obtaining security code on the article by image capture apparatus;
Show the security code that generates in the embodiment of the invention article anti-counterfeit method on the article of verifying in the method for the item authentication true and false in the embodiment of the invention.
The figure that comprises image or Word message that security code is made up of strip or certain specific geometric figure, as, two-dimensional bar code/two-dimension code (2-dimensional bar code) is that the figure of the different colours block combination that (on the two-dimensional directional) distributes on the plane according to certain rules with certain specific geometric figure comes the record data symbolic information.At first need get access to by image capture apparatus the image information of article anti-counterfeit sign indicating number, so that according to the image information of security code, Item Information is finally obtained in operation such as decode to security code.
The article genuine-fake verification method of the embodiment of the invention can be realized by the mode that software adds essential general hardware platform equally, as, the software of realizing the article genuine-fake verification method of the embodiment of the invention can be installed in and be equipped with in the camera mobile phone, absorb the image information of security code by the camera of mobile phone, so that realize gathering in this method the effect of the image information of security code, and then carry out respective handling according to the image information of security code.Certainly the corresponding software of the embodiment of the invention also can be installed in other equipment with Flame Image Process capture functions, as the computing machine of band camera etc.
Step S202: according to the image information of described security code, obtain described first signature file and with the corresponding public key information of described first private key;
Owing to include the public key information of first signature file and the first private key correspondence in the security code that the embodiment of the invention obtains, after getting access to the image information of security code, image information according to security code, decode accordingly or necessary decryption processing, can get access to first signature file that comprises the article summary info and with the article anti-counterfeit method in the corresponding public key information of first private key.
Corresponding with the article anti-counterfeit method of the embodiment of the invention, when first PKI according to first signature and the first private key correspondence generates security code, according to the image information of security code, the public key information of the first private key correspondence that gets access to can be the parameter information of first PKI of the first private key correspondence; When the parameter information according to first signature and first PKI of the first private key correspondence generated security code, then according to the image information of security code, the public key information of the first private key correspondence that gets access to was: first PKI of the first private key correspondence.
Step S203: described first signature file is decrypted according to described public key information;
When the public key information of the first private key correspondence is first PKI of the first private key correspondence, the process that first signature file is decrypted according to public key information, can for: utilize first PKI that first signature file is decrypted.
When the public key information of the first private key correspondence was the generation parameter of first PKI of the first private key correspondence,, be specifically as follows the process that first signature file is decrypted according to public key information: the generation parameter information according to described first PKI generated first PKI; Utilize described first PKI that first signature file is decrypted.That is, in security code, only comprise the generation parameter information of first PKI, at first need to utilize these to generate parameter, transform and necessary computation process obtains first PKI, and then utilize first PKI that obtains to decipher first signature file.
First signature file is to utilize first private key will treat that the summary info encryption of false proof article obtains, and therefore, utilizes first PKI corresponding with first private key to be decrypted described first signature file, thereby obtains the summary info of article.And when first signature file be not when obtaining by first encrypted private key, just can not decipher the article relevant information after first signature file obtains deciphering, so these article just may be the forgery article.
Step S204: show the information after deciphering.
After deciphering obtains the article summary info of the first signature file correspondence, show the information after deciphering, so that the user compares to the article of the true and false to be verified according to the decryption information after showing, to determine the true and false of article.
The article anti-counterfeit method of the corresponding embodiment of the invention, for licensing to, treats third party's false-proof mechanism the private key of false proof article issuer when first private key that presets, and generating security code according to first signature file and the public key information corresponding with first private key is: be converted into security code with first signature file and with the corresponding public key information of described first private key, in this case, the image information of the described security code of foundation among the step S202, obtain the public key information of described first signature file and the first private key correspondence, comprising:
Security code decoded transform the public key information obtain first signature file and the first private key correspondence.
That is to say, when security code is when transforming the security code that obtains by the public key information with first private key of first signature file and the mandate of third party's false-proof mechanism, only need decodes and transform the public key information that just can obtain first signature file and the described first private key correspondence security code.
In the article anti-counterfeit method of the embodiment of the invention, security code is to utilize second private key of third party's false-proof mechanism that the public key information of first signature file and the first private key correspondence is encrypted generation second signature file, and when transforming second signature file and obtaining, then according to the image information of described security code, obtain the public key information of first signature file and the described first private key correspondence, can for:
Transform security code and obtain second signature file;
Second PKI of third party's false-proof mechanism that utilization is preset is decrypted second signature file, obtains the public key information of first signature file and the first private key correspondence, and wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
That is to say, after security code obtains second signature file for the public key information with first encrypted private key, first signature file of third party's false-proof mechanism and the first private key correspondence, second signature file is transformed under the situation about obtaining, and need decode and handle accordingly security code obtains second signature file.Because second signature file is encrypted for second private key that uses third party's false-proof mechanism and is obtained, and therefore can decipher second signature file by second PKI corresponding with second private key that presets.When security code is not by second private key that the third party authorizes signature file to be encrypted to obtain, utilize second PKI also just can not decipher security code on the article, therefore these article are not to issue or produce through the article issuer that third party's false-proof mechanism is determined, so these article are fake product probably just.
The method of article genuine-fake checking is applied to have the subscriber terminal equipment of camera function in the embodiment of the invention.Wherein, terminal device can be mobile phone, computing machine etc., and terminal device itself has the support on the hardware capability such as take pictures, can also install software, this software is exactly the software that is used to realize the article genuine-fake verification method of the embodiment of the invention, can abbreviate as and test a yard software.This is tested yard software and can be installed in users' the terminal device by third party's false proof center public publication.Test at this and to be provided with cover public key data and a decipherment algorithm in yard software, be used to treat the checking of decoding of security code that anti-fake product issuer generates with the described method of embodiment of the invention preamble, if the verification passes, can on subscriber terminal equipment, demonstrate the summary info that security code comprises.The user can judge the true and false of these article by comparing the summary info that demonstrates on the terminal device and treating the content that actual displayed goes out on the false proof article surface.As seen, test a yard software by this, when needs carry out authenticity verification to article, do not need again to inquire about authenticity by initiating the decoding in the database of authentication center of mode such as communication, and only need use the local resource (mainly be shooting first-class local hardware device) of common terminal devices such as mobile phone, can realize treating the authenticity verification of false proof article, very convenient, also saved the expense that communication process causes.Simultaneously, this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
In a word, the embodiment of the invention utilizes first private key that the false proof Item Information for the treatment of that obtains is encrypted generation first signature file, and generate security code according to first signature file and first PKI corresponding with first private key, treat on the false proof article so that security code is presented at.When the needs checking shows the article genuine-fake of the security code that generates in the embodiment of the invention, obtain the image information of security code by image capture apparatus, can obtain the public key information of first signature file and the first private key correspondence according to this image information, and can obtain first PKI by this public key information, first PKI that utilization obtains can be decrypted first signature file, and the information after the demonstration deciphering, the information that foundation shows just can be judged the true and false of article.Need not to inquire about the item information data storehouse during embodiment of the invention article genuine-fake verification method inquiry article genuine-fake and just can distinguish article genuine-fake by modes such as mobile phone, note or online, query script is convenient, can not produce the consumption of the communication resource, the method of embodiment of the invention checking article genuine-fake need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.Simultaneously, this testing in the terminal device that yard software can be installed in users, be equivalent to adopt the PKI diffusion technique of a large amount of public publications, this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
For the concrete process of article anti-counterfeit and authenticity verification method in the clearer description embodiment of the invention of energy, be that example is introduced with process to the certificate false proof and the checking certificate true and false.For example, the licence issuing authority of I.D. need be issued I.D. for citizen A, then can after I.D. is made this I.D. be taken pictures, and therefrom extracts the image summary info of I.D., and as, extraction is the photo of citizen A.After extracting image information, this licence issuing authority can be " the security code making software " of its mandate method making security code according to the embodiment of the invention with third party's false-proof mechanism just, then security code is printed or is sticked on the I.D. of citizen A.The I.D. that is printed on security code is at last issued citizen A.When citizen A goes to be engaged in certain social activities, certain B of mechanism needs him to show I.D., in order to verify the true and false of the I.D. that citizen A is shown, the staff of this mechanism just can take out oneself mobile phone, and (this mobile phone has camera, and pre-installed decoding software), open the security code on the camera aligning I.D., get access to the image information of security code, and according to the true and false of the article genuine-fake verification method identity verification of embodiment of the invention card, on the mobile phone display screen is a photo if finally be presented at, and identical with the photo on the I.D., can prove that then the I.D. that citizen A shows is genuine; If what demonstrate on the display screen of mobile phone is mess code, perhaps the content of actual displayed is inconsistent on content of Shi Xianing and the I.D., proves that then I.D. may be false.
A kind of article anti-counterfeit method of the corresponding embodiment of the invention, referring to Fig. 3, the embodiment of the invention also provides a kind of structured flowchart of system of article anti-counterfeit, and this system comprises:
Information acquisition unit 301 is used to obtain the summary info for the treatment of false proof article;
Information encryption unit 302 is used to utilize first private key that presets that described summary info is encrypted and generates first signature file;
Coding unit 303, be used for generating security code according to described first signature file and corresponding public key information with described first private key, so that described security code is presented at described treating on the false proof article, by yard software of testing that is installed in advance on the subscriber terminal equipment described security code is decoded, on described terminal device, demonstrate the described summary info that described security code comprises.
Wherein, treat that false proof article can be extensive stock in certificate, bill or the market etc., as, treat that false proof article can be various certificates such as I.D., academic certificate, honorary certificate or various qualification certificates; Be with false proof article also can be bills such as various ticket, admission ticket, various invoices.
Wherein, the summary info for the treatment of false proof article is: treat false proof article image information, treat the Word message of false proof article and/or treat recommended information of false proof article etc.Can also comprise the information such as valid period for the treatment of false proof article.Certainly can also in summary info, increase other information for the treatment of false proof article according to actual needs.Therefore, information acquisition unit specifically is used for:
Obtain the image information for the treatment of false proof article, the Word message for the treatment of false proof article and or treat the information of false proof article issuer.
Preferably, coding unit is specially: be used for first signature file and first PKI corresponding with first private key are generated security code.
Certainly coding unit also can be only generates security code with the generation parameter coding of first signature file and first PKI, and then coding unit is specially: be used for the generation parameter of first signature file and first PKI corresponding with first private key is generated security code.
Through the recognition of qulifications of third party's false-proof mechanism, first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses in order to ensure the issuer that treats false proof article;
Coding unit comprises: first coding unit is used for first signature file and the public key information corresponding with described first private key are converted into security code.
Treat false proof article issuer, be meant the producer, fabricator or the issuer etc. for the treatment of false proof article.As, when treating that false proof article are various certificate, the issuer that treats false proof article is meant the Notified Body of certificate; When treating that false proof article are commodity, treat that the issuer of false proof article is meant, the production of commodity, fabricator.
Referring to Fig. 4, structured flowchart for a kind of article anti-counterfeit system of another embodiment of the present invention, in this embodiment, when first private key that presets be treat that false proof article issuer determines the time, in order to ensure the issuer that treats false proof article through the recognition of qulifications of third party's false-proof mechanism, first private key that perhaps ought preset is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to, in order further to guarantee to treat the true and reliable property assurance of false proof article publisher, described coding unit 430 comprises:
Superencipher unit 431, second private key that is used to utilize third party's false-proof mechanism with described first signature file and the public key information corresponding with stating first private key encrypt and generate second signature file;
Second coding unit 432 is used for described second signature file is converted into security code.
It is big to consider that two-dimension code has an information memory capacity, can represent multiple information such as Chinese character and image, the characteristics that security and antiforge purpose is strong, and coding unit is used for generating two-dimension code according to described first signature file and the public key information corresponding with first private key.
Wherein, the information acquisition unit 410 among Fig. 4, information encryption unit 420 respectively with Fig. 3 in information acquisition unit 301, the effect of information encryption unit 302 is identical.
The method of a kind of article genuine-fake checking of the corresponding embodiment of the invention, referring to Fig. 5, system architecture diagram for a kind of article genuine-fake of the embodiment of the invention is verified shows the security code that a kind of article anti-counterfeit system generates among the above embodiment of the present invention on the described article, this system comprises:
Image capture unit 501 is used for obtaining by image capture apparatus the image information of security code on the article;
Security code processing unit 502 is used for the image information according to described security code, obtain described first signature file and with the corresponding public key information of described first private key;
Decryption unit 503 is used to utilize described public key information that described first signature file is decrypted;
Display unit 504 is used to show the information after the deciphering.
Wherein, the article in the present embodiment can be for showing certificate, bill or the commodity of the security code that obtains in the article anti-counterfeit system in the above embodiment of the present invention.
Preferably, security code is a two-dimension code.
In a kind of article anti-counterfeit system of the corresponding embodiment of the invention, information acquisition unit is used to obtain the image information for the treatment of false proof article, the Word message for the treatment of false proof article, recommended information etc.
Display unit, be used to show deciphering back article image information, article recommended information and or the information of article issuer.
When security code is when obtaining according to first signature file and first PKI, the security code processing unit is specially, and is used for the image information according to security code, obtains first signature file and first PKI corresponding with described first private key;
Decryption unit comprises: first decryption unit is used to utilize described first PKI that described signature file is decrypted.
Further, when security code is when generating according to the generation parameter information of first signature file and first PKI, the security code processing unit is specially, and is used for the image information according to security code, obtains the generation parameter information of first signature file and first PKI corresponding with first private key;
Under this kind situation, decryption unit comprises:
The PKI generation unit is used for generating first PKI according to the generation parameter information of first PKI;
Second decryption unit is used to utilize first PKI to decipher first signature file.
For licensing to, treats third party's false-proof mechanism the private key of false proof article issuer when first private key that presets, and according to first signature file and the public key information generation security code corresponding be: be converted into security code with first signature file and with the corresponding public key information of first private key with described first private key, in this case, the security code processing unit comprises:
The first security code processing unit, being used for decodes security code to transform obtains first signature file and the public key information corresponding with first private key.
Be that second private key that utilizes third party's false-proof mechanism is encrypted the public key information of first signature file and the described first private key correspondence and generated second signature file when security code, and when transforming second signature file and obtaining, referring to Fig. 6, it is single 620 that security code is handled, and comprising:
Conversion unit 621 is used for described security code conversion is obtained second signature file;
The second security code processing unit 622, be used to utilize second PKI of the third party's false-proof mechanism that presets that described second signature file is decrypted, obtain described first signature file and with the corresponding public key information of described first private key, wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
Wherein, the image capture unit 610 among Fig. 6, decryption unit 630, display unit 640 respectively with Fig. 5 in image capture unit 501, decryption unit 503, the effect of display unit 504 is identical.
Each embodiment adopts the mode of going forward one by one to describe in this instructions, and what each embodiment stressed all is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For the disclosed device of embodiment, because it is corresponding with the embodiment disclosed method, so description is fairly simple, relevant part partly illustrates referring to method and gets final product.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the present invention.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined herein General Principle can realize under the situation that does not break away from the spirit or scope of the present invention in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.

Claims (26)

1. the method for an article anti-counterfeit is characterized in that, comprising:
Obtain the summary info for the treatment of false proof article;
First private key that utilization is preset is encrypted described summary info and is generated first signature file;
Generate security code according to described first signature file and the public key information corresponding with described first private key, so that described security code is presented at described treating on the false proof article, by yard software of testing that is installed in advance on the subscriber terminal equipment described security code is decoded, on described terminal device, demonstrate the described summary info that described security code comprises.
2. method according to claim 1, it is characterized in that, described first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to, described third party's false-proof mechanism is that the different false proof article issuers that treat distribute the first different private keys;
Described according to described first signature file and the public key information generation security code corresponding with described first private key, comprising:
Described first signature file and the public key information corresponding with described first private key are converted into security code.
3. method according to claim 1 is characterized in that, and is described according to described first signature file and the public key information generation security code corresponding with described first private key, comprising:
Utilize second private key of third party's false-proof mechanism that described first signature file and the public key information corresponding with described first private key are encrypted generation second signature file;
Described second signature file is converted into security code.
4. according to each described method of claim 1 to 3, it is characterized in that the public key information of the described first private key correspondence is first PKI of the described first private key correspondence, or the generation parameter of first PKI of the described first private key correspondence.
5. method according to claim 1 is characterized in that, described security code is a two-dimension code.
6. method according to claim 1 is characterized in that, describedly treats that false proof article comprise:
Certificate, bill or commodity.
7. method according to claim 1 is characterized in that, described summary info comprises:
Treat the image information of false proof article and/or treat the Word message of false proof article.
8. the method for an article genuine-fake checking is characterized in that, shows the security code that utilizes the described method of claim 1 to generate on the described article, and this method comprises:
Obtain the image information of security code on the article by image capture apparatus;
According to the image information of described security code, obtain described first signature file and with the corresponding public key information of described first private key;
According to described public key information described first signature file is decrypted;
Show the information after deciphering.
9. method according to claim 8 is characterized in that, the image information of the described security code of described foundation, obtain described first signature file and with the corresponding public key information of described first private key, comprising:
With described security code decode transform obtain first signature file and with the corresponding public key information of described first private key.
10. method according to claim 8 is characterized in that, the image information of the described security code of described foundation, obtain described first signature file and with the corresponding public key information of described first private key, comprising:
Described security code transformed obtain second signature file;
Second PKI of third party's false-proof mechanism that utilization is preset is decrypted described second signature file, obtain described first signature file and with the corresponding public key information of described first private key, wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
11. to 10 each described methods, it is characterized in that according to Claim 8 the described public key information corresponding with first private key is the first corresponding PKI of described first private key;
Describedly described first signature file is decrypted, comprises: utilize described first PKI that described signature file is decrypted according to described public key information.
12. to 10 each described methods, it is characterized in that according to Claim 8 the public key information that described and described first private key is corresponding is the generation parameter of the first corresponding PKI of described first private key;
Describedly described first signature file is decrypted, comprises according to described public key information:
Utilize the generation parameter of described first PKI to generate first PKI;
Utilize described first PKI to decipher described first signature file.
13. method according to claim 8 is characterized in that, described security code is a two-dimension code.
14. method according to claim 8 is characterized in that, described method is applied to have the subscriber terminal equipment of camera function.
15. the system of an article anti-counterfeit is characterized in that, comprising:
Information acquisition unit is used to obtain the summary info for the treatment of false proof article;
The information encryption unit is used to utilize first private key that presets that described summary info is encrypted and generates first signature file;
Coding unit, be used for generating security code according to described first signature file and the public key information corresponding with described first private key, so that described security code is presented at described treating on the false proof article, by yard software of testing that is installed in advance on the subscriber terminal equipment described security code is decoded, on described terminal device, demonstrate the described summary info that described security code comprises.
16. system according to claim 15 is characterized in that, described first private key that presets is treated the private key of false proof article issuer for third party's false-proof mechanism licenses to;
Described coding unit comprises: first coding unit is used for described first signature file and the public key information corresponding with described first private key are converted into security code.
17. system according to claim 15 is characterized in that, described coding unit comprises:
The superencipher unit is used to utilize second private key of third party's false-proof mechanism that described first signature file and the public key information corresponding with described first private key are encrypted generation second signature file;
Second coding unit is used for described second signature file is converted into security code.
18., it is characterized in that described coding unit is specially: be used for described first signature file and first PKI corresponding with described first private key are generated security code according to each described system of claim 15 to 17.
19., it is characterized in that described coding unit is specially: be used for the generation parameter of described first signature file and first PKI corresponding with described first private key is generated security code according to each described system of claim 15 to 17.
20. system according to claim 15 is characterized in that, described coding unit is used for generating two-dimension code according to described first signature file and the public key information corresponding with described first private key.
21. the system of an article genuine-fake checking is characterized in that, shows the security code that utilizes the described system of claim 15 to generate on the described article, this system comprises:
The image capture unit is used for obtaining by image capture apparatus the image information of security code on the article;
The security code processing unit is used for the image information according to described security code, obtain described first signature file and with the corresponding public key information of described first private key;
Decryption unit, the public key information that is used for obtaining according to the security code processing unit is decrypted described first signature file;
Display unit is used to show the information after the deciphering.
22. system according to claim 21 is characterized in that, described security code processing unit comprises:
The first security code processing unit, be used for described security code decode transform obtain first signature file and with the corresponding public key information of described first private key.
23. system according to claim 21 is characterized in that, described security code processing unit comprises:
Conversion unit is used for described security code conversion is obtained second signature file;
The second security code processing unit, be used to utilize second PKI of the third party's false-proof mechanism that presets that described second signature file is decrypted, obtain described first signature file and with the corresponding public key information of described first private key, wherein, second PKI is the PKI corresponding with second private key of third party's false-proof mechanism.
24. system according to claim 21 is characterized in that, described security code is a two-dimension code.
25., it is characterized in that the security code processing unit is specially according to each described system of claim 21 to 24, be used for image information according to described security code, obtain described first signature file and first PKI corresponding with described first private key;
Described decryption unit comprises: first decryption unit is used to utilize described first PKI that described signature file is decrypted.
26. according to each described system of claim 21 to 24, it is characterized in that, the security code processing unit is specially, and is used for the image information according to described security code, obtains the generation parameter of described first signature file and first PKI corresponding with described first private key;
Described decryption unit comprises:
The PKI generation unit is used for generating first PKI according to the generation parameter of described first PKI;
Second decryption unit is used to utilize described first PKI to decipher described first signature file.
CN 201110059453 2011-03-11 2011-03-11 Anti-counterfeiting and authenticity-verifying method and system for article Pending CN102147884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110059453 CN102147884A (en) 2011-03-11 2011-03-11 Anti-counterfeiting and authenticity-verifying method and system for article

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110059453 CN102147884A (en) 2011-03-11 2011-03-11 Anti-counterfeiting and authenticity-verifying method and system for article

Publications (1)

Publication Number Publication Date
CN102147884A true CN102147884A (en) 2011-08-10

Family

ID=44422139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110059453 Pending CN102147884A (en) 2011-03-11 2011-03-11 Anti-counterfeiting and authenticity-verifying method and system for article

Country Status (1)

Country Link
CN (1) CN102147884A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647410A (en) * 2012-03-14 2012-08-22 上海众人网络安全技术有限公司 Information safe system and method based on light sensation identification
CN103269269A (en) * 2013-05-08 2013-08-28 吴伟 File encryption transmission method based on two-dimensional bar code technology
CN103793830A (en) * 2014-02-24 2014-05-14 朱清明 Goods identifying and authenticating method and corresponding device thereof
CN103886469A (en) * 2014-03-31 2014-06-25 南京理工大学 Product two-dimension code generation and query system
CN104240098A (en) * 2014-09-24 2014-12-24 于兵 Method and system for certificating authenticity of identity certifications of commodities on basis of encrypted two-dimensional codes
CN104539910A (en) * 2015-01-16 2015-04-22 移康智能科技(上海)有限公司 Method, system and monitoring equipment thereof for safe access of data
CN104735065A (en) * 2015-03-16 2015-06-24 联想(北京)有限公司 Data processing method, electronic device and server
CN104993930A (en) * 2015-05-19 2015-10-21 吴晗 Digital voucher generation method and system, and digital voucher verifying method and system
WO2015180691A1 (en) * 2014-05-30 2015-12-03 北京奇虎科技有限公司 Key agreement method and device for verification information
WO2016070382A1 (en) * 2014-11-06 2016-05-12 华为技术有限公司 Secure information configuration method, secure authentication method and related chip
US9426130B2 (en) 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CN107092945A (en) * 2017-02-27 2017-08-25 李家旺 The generation and recognition methods of a kind of graphic code and device
CN107563777A (en) * 2017-10-19 2018-01-09 深圳市中海湾实业有限公司 The endowed two-dimension code anti-counterfeit system and method for facing to manufacture line high speed
CN108197685A (en) * 2017-12-26 2018-06-22 福建工程学院 The method for anti-counterfeit and terminal of a kind of visual code
CN108229878A (en) * 2016-12-22 2018-06-29 德国邮政股份公司 Verify the authenticity of the content of consignment
WO2021073224A1 (en) * 2019-10-14 2021-04-22 深圳创维-Rgb电子有限公司 Data display method, display terminal, server, display system and storage medium
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588436A (en) * 2004-09-20 2005-03-02 邱华生 Anti-fake method using non-symmetric cipher technology

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588436A (en) * 2004-09-20 2005-03-02 邱华生 Anti-fake method using non-symmetric cipher technology

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647410A (en) * 2012-03-14 2012-08-22 上海众人网络安全技术有限公司 Information safe system and method based on light sensation identification
CN103269269A (en) * 2013-05-08 2013-08-28 吴伟 File encryption transmission method based on two-dimensional bar code technology
CN103269269B (en) * 2013-05-08 2016-02-10 吴伟 A kind of file encryption transmission method based on Two-Dimensional Bar-Code Technologies
CN103793830A (en) * 2014-02-24 2014-05-14 朱清明 Goods identifying and authenticating method and corresponding device thereof
CN103886469A (en) * 2014-03-31 2014-06-25 南京理工大学 Product two-dimension code generation and query system
WO2015180691A1 (en) * 2014-05-30 2015-12-03 北京奇虎科技有限公司 Key agreement method and device for verification information
US9426130B2 (en) 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CN104240098A (en) * 2014-09-24 2014-12-24 于兵 Method and system for certificating authenticity of identity certifications of commodities on basis of encrypted two-dimensional codes
WO2016070382A1 (en) * 2014-11-06 2016-05-12 华为技术有限公司 Secure information configuration method, secure authentication method and related chip
US10419217B2 (en) 2014-11-06 2019-09-17 Huawei Technologies Co., Ltd. Security information configuration method, security verification method, and related chip
CN104539910A (en) * 2015-01-16 2015-04-22 移康智能科技(上海)有限公司 Method, system and monitoring equipment thereof for safe access of data
CN104539910B (en) * 2015-01-16 2019-06-04 移康智能科技(上海)股份有限公司 A kind of Data Access Security method and system
CN104735065A (en) * 2015-03-16 2015-06-24 联想(北京)有限公司 Data processing method, electronic device and server
CN104993930A (en) * 2015-05-19 2015-10-21 吴晗 Digital voucher generation method and system, and digital voucher verifying method and system
CN108229878A (en) * 2016-12-22 2018-06-29 德国邮政股份公司 Verify the authenticity of the content of consignment
CN107092945A (en) * 2017-02-27 2017-08-25 李家旺 The generation and recognition methods of a kind of graphic code and device
CN107563777A (en) * 2017-10-19 2018-01-09 深圳市中海湾实业有限公司 The endowed two-dimension code anti-counterfeit system and method for facing to manufacture line high speed
CN108197685A (en) * 2017-12-26 2018-06-22 福建工程学院 The method for anti-counterfeit and terminal of a kind of visual code
WO2021073224A1 (en) * 2019-10-14 2021-04-22 深圳创维-Rgb电子有限公司 Data display method, display terminal, server, display system and storage medium
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities

Similar Documents

Publication Publication Date Title
CN102147884A (en) Anti-counterfeiting and authenticity-verifying method and system for article
US8775814B2 (en) Personalized biometric identification and non-repudiation system
US9369287B1 (en) System and method for applying a digital signature and authenticating physical documents
US7519825B2 (en) Electronic certification and authentication system
CN102201100B (en) Object anti-counterfeiting method and system
CN105590199B (en) Payment method and payment system based on dynamic two-dimensional code
CN106688004B (en) Transaction authentication method and device, mobile terminal, POS terminal and server
CN101848090B (en) Authentication device and system and method using same for on-line identity authentication and transaction
CN102035654B (en) Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
CN102129589A (en) Asymmetric encryption two-dimension code anti-counterfeiting method
CN103985036A (en) Two-dimension code payment method with biological characteristics
CN102461229A (en) System and method for personal certification using a mobile device
CN101340294A (en) Cipher keyboard apparatus and implementing method thereof
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN101340285A (en) Method and system for identity authentication by finger print USBkey
CN103198344A (en) Tax-control safety two-dimensional code encoding and decoding processing method
KR102178179B1 (en) apparatus and user terminal for mobile identification
JP2017117301A (en) Ticket issuing system
CN101335754A (en) Method for information verification using remote server
JP2009272737A (en) Secret authentication system
CN106100854A (en) The reverse authentication method of terminal unit based on authority's main body and system
US20140019366A1 (en) Method and a system for securing financial transaction
KR101242684B1 (en) User certification system and method for 2 dimensional barcode
CN110111461A (en) A kind of pass identified off-line method and apparatus based on two dimensional code
CN104268780A (en) Trade order confirmation method and device and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110810