CN102236778A - Method for identifying and reading anti-counterfeiting codes - Google Patents

Method for identifying and reading anti-counterfeiting codes Download PDF

Info

Publication number
CN102236778A
CN102236778A CN2010101555748A CN201010155574A CN102236778A CN 102236778 A CN102236778 A CN 102236778A CN 2010101555748 A CN2010101555748 A CN 2010101555748A CN 201010155574 A CN201010155574 A CN 201010155574A CN 102236778 A CN102236778 A CN 102236778A
Authority
CN
China
Prior art keywords
recognition
coding
code
valid data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101555748A
Other languages
Chinese (zh)
Inventor
万宏宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huaqi Information Digital Technology Co Ltd
Original Assignee
Beijing Huaqi Information Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huaqi Information Digital Technology Co Ltd filed Critical Beijing Huaqi Information Digital Technology Co Ltd
Priority to CN2010101555748A priority Critical patent/CN102236778A/en
Publication of CN102236778A publication Critical patent/CN102236778A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Character Discrimination (AREA)

Abstract

The invention relates to a method for identifying and reading anti-counterfeiting codes, which comprises the following steps of: acquiring the anti-counterfeiting codes by using an optical module, and decoding the anti-counterfeiting codes to acquire valid data in a cascaded code group; searching ciphertexts and keys which correspond to the valid data in a kernel database by using a processing module; and acquiring plaintext information corresponding to the ciphertexts and the keys by using the processing module through the ciphertexts and the keys, if the plaintext information can be found, outputting the plaintext information, and determining that a result is true, and if the plaintext information cannot be acquired, determining that the result is false. By the anti-counterfeiting codes, users can distinguish authenticity conveniently, and fake makers difficultly counterfeit.

Description

A kind of method of distinguishing anti-fake code
[affiliated technical field]
The present invention relates to a kind of anti-counterfeiting technology, a kind of method of distinguishing anti-fake code is provided especially.
[background technology]
It is multiple that present people distinguish that the method for true from false of bills has, and overview mainly contains following several method:
(1) differentiates the invoice seal
Should add a cover operator's financial seal or Invoice Seal (hereinafter to be referred as the invoice seal) on the invoice.
True ticket characteristics: the invoice seal is consistent with operator's tax registration title, and seal is clear.
The false tickets characteristics: the one, do not affix one's seal; The 2nd, invoice seal and operator's tax registration title is not inconsistent; Perhaps seal is quite fuzzy, deliberately allows the people recognize unclear.
(2) differentiate printing quality
True ticket characteristics: the writing of printing is clear clean and tidy, and printing ink is even, and printing quality is good.
The false tickets characteristics: the handwriting is blurred in printing, and printing ink is inhomogeneous, and printing quality is poor.
(3) differentiate paper quality
True ticket characteristics: the paper pliability is good, hand held in when shake clear.
The false tickets characteristics: paper is softer, and pliability is poor.
(4) by " 12366 " or network inquiry
To being printed on the invoice of " invoice password ", can by dial " 12366 pay taxes service hotline " or network inquiry (query web address: ht tp: //www.hebds.gov.cn/) the mode verified commercial invoice true and false, need contents such as typing " invoice code ", " invoice number ", " invoice password " when examining.
Discern in the method for true from false of bills in above-mentioned four, first three methods is the most frequently used methods of people, and owing to the recognition feature fake producer copys easily, so these methods are difficult to distinguish true from false of bills; Though the true or false of described the 4th method checking invoice is higher relatively, yet verification mode is more loaded down with trivial details,, need to consume a large amount of time particularly under the more situation of invoice.
[summary of the invention]
Technical matters to be solved by this invention provides a kind of method of discerning anti-fake code, so that the method that obtains antifalse effect preferably and discern the false from the genuine easily.
For solving above technical matters, the present invention realizes by the following technical solutions:
A kind of method of distinguishing anti-fake code is characterized in that may further comprise the steps:
A, optical module obtain the anti-fake code group, and this anti-fake code group is decoded to obtain the cascade code character corresponding with this anti-fake code group;
B, processing module extracted valid data information from this cascade code character, and in core database, seek and unique corresponding ciphertext of this valid data information and key;
If the C processing module searches out and unique corresponding ciphertext of valid data information and key in core database, then carry out next step, if do not search out, then by output unit to the user feedback error message, wait the valid data information in the next cascade code character to be extracted;
D, processing module search out in the core database with unique corresponding ciphertext of valid data information and key after, search again and this ciphertext and the corresponding cleartext information of key, if find and this ciphertext and the corresponding cleartext information of key, then carry out next step, if do not search out, then by output unit to the user feedback error message;
E, processing module get access in the core database with ciphertext and key corresponding plaintext information after, the notice output unit is with this cleartext information output.
Described anti-fake code comprises startup coding, recognition coding, data length coding, valid data are encoded and finish coding.
Described cascade code character comprises with the startup of anti-fake code coding, recognition coding, data length coding, valid data coding and finishes coding corresponding respectively program start sign indicating number, file recognition code, data length identification code, valid data sign indicating number and end code.
Described steps A also comprises steps A 1, and optical module obtains described startup coding, and this is started the program start sign indicating number of coding and decoding Cheng Yuqi correspondence, and processing module is obtained generator program enabled instruction behind this program start sign indicating number, allows whole recognition program start.
Described steps A also comprises steps A 2, behind the recognition program start, optical module obtains described recognition coding, and should distinguish coding and decoding Cheng Yuqi corresponding file recognition code, processing module generates recognition program run instruction after obtaining this document recognition code, identifies this recognition program and begins.
Described steps A also comprises steps A 3, after the recognition program begins, optical module obtains described data length coding, and with the data length position of this data length coding and decoding Cheng Yuqi correspondence, processing module generates corresponding data length sign instruction according to this data length position, informs the effective length of wanting reading of data in the next step.
Described step B also comprises step B1, and optical module obtains described valid data coding, with the valid data sign indicating number of the unique correspondence of this valid data coding and decoding Cheng Yuqi.
Described step B also comprises step B2, described processing module generates valid data according to described valid data sign indicating number information and obtains instruction, and according to described data length sign instruction extracted valid data information from the valid data sign indicating number, during the effective length that if the valid data length of recognizer recognition surpasses or the instruction of not enough data length sign is suggested, processing module notice output module feedback error message; If effective length meets the suggested effective length of data length sign instruction, then proceed next step operation.
This method also comprises step F, optical module obtains described end coding, and will finish the end code information of coding and decoding Cheng Yuqi correspondence, processing module generates according to the end code information of obtaining and finishes the recognition programmed instruction, identifies this recognition program run and finishes.
Described cleartext information is predefined unique voice messaging.
Generate corresponding ciphertext unique behind the described cleartext information process DES algorithm with it.
Described core database is the webserver, and described key, ciphertext and cleartext information are stored in this webserver.
Described core database is the flash memory storage module, and described key, ciphertext and cleartext information are stored in this memory module.
Described anti-fake code group is formed by the array mode of a plurality of little elementary areas, described a plurality of little elementary areas be combined to form human eye the minute pattern that can not discern.
The method of recognition anti-fake code of the present invention has following advantage:
The user obtains anti-fake code on the code carrier by optical module, and by output module error message or correct cleartext information is played out, and can distinguish the true and false of code carrier.Code carrier for the anti-fake code of spreading the printed books invention, owing to obtain cleartext information when discerning the false from the genuine, must obtain and unique corresponding ciphertext of cleartext information and key by electronic system, and ciphertext obtains cleartext information by des encryption or other cryptographic algorithm, key is by production firm or customization, can't obtain ciphertext and key also just can't obtain cleartext information by electronic system for the fake producer, the anti-counterfeiting performance height, the fake producer is difficult for copying.For example, the shop is printed on the invoice of the bright anti-fake code of this law, and the anti-fake code shop is imprinted on false proof zone, and the user is scanned the true and false that this code carrier promptly can be differentiated in this false proof zone by described electronic system, and use-pattern is simple, convenient.
[description of drawings]
Fig. 1 is an Antiforge system structured flowchart of the present invention.
Fig. 2 is the structured flowchart of optical module of the present invention.
Fig. 3 is the method flow diagram of recognition anti-fake code of the present invention.
[embodiment]
Reach technological means and the effect that predetermined purpose is taked for further setting forth the present invention, below in conjunction with accompanying drawing and preferred embodiment, a kind of anti-fake code that foundation the present invention is proposed and embodiment, structure, feature and the effect thereof of distinguishing the method for this anti-fake code, describe in detail as after.
Seeing also shown in Figure 1ly, is Antiforge system 1 synoptic diagram that utilizes anti-fake code of the present invention, and this Antiforge system 1 comprises: code carrier 10, optical module 23, processing module 22, core database 21 and output module 20.Wherein, shop, the surface of described code carrier 10 is printed on the anti-fake code that human eye is easy to ignore, and this anti-fake code shop is imprinted on anti-counterfeit recognition place of code carrier 10, obtains to make things convenient for optical module.A plurality of anti-fake codes are combined into an anti-fake code group, and the unique corresponding code carrier of anti-fake code group is used to distinguish the true and false of a code carrier.
The shop impression method of described anti-fake code has a detailed description in application number is 02122633.4 Chinese patent, so be not described in detail in this.
As shown in Figure 2, be the structured flowchart of described optical module 23, it comprises: optics acquisition module 230 is used to obtain code carrier 1 surperficial microscopic magnified optical images; Imageing sensor 231 is used for the optical image that optics acquisition module 230 obtains is generated as digitized video; Image recognizing and processing unit 232 is picked up the digitized video of anti-fake code from the digitized video that imageing sensor 231 generates, and this anti-fake code digitized video is decoded as concatenated code corresponding with it.A plurality of concatenated codes are formed a cascade code character, and a cascade code character is corresponding with an anti-fake code group.
Described each cascade code character comprises five concatenated codes: program start sign indicating number, file recognition code, data length identification code, valid data sign indicating number, end code; Each concatenated code of corresponding each cascade code character, described every group of anti-fake code group comprises: start coding, recognition coding, data length coding, valid data coding and finish coding.
Described processing module 22 is according to five different in each cascade code character sign indicating numbers, can generate and the corresponding associated instructions of different concatenated codes, this associated instructions is respectively: program start instruction, recognition program run instruction, the instruction of data length sign, valid data obtain instruction, finish reading command.
Described program start instruction is used for the initialization clock signal is provided when optical module starts, and the recognition program of optical module can be started;
Described recognition program run instruction is used for identifying the beginning of these recognition program valid data, triggers the recognition program run;
The instruction of described data length sign is as the digital content length indication, and when the valid data length of recognizer recognition surpassed or is not enough, the control output module was to the user feedback error message;
Described valid data obtain instruction, and the valid data that obtain have identified the valid data information in this recognition process, and the valid data coding in this valid data information and the described anti-fake code group is to concern one to one;
Described end reading command finally provides CRC sign indicating number (cyclic redundancy check (CRC) code) proof test value, is used for the correctness of the valid data that verification obtains, and identifies program run simultaneously and finishes.Can certainly come the correctness of checking data by other check additions, such as the Hamming check method.
The unique corresponding ciphertext of valid data information and the key that comprise in the described core database and obtain.Particularly, described key is to obtain by following mode: at first, provide the cleartext information of false proof required encryption, and the invoice number of invoice for example, perhaps date of manufacture etc. has the information of uniqueness; Secondly, generate and the unique corresponding ciphertext of this cleartext information behind the cleartext information process des encryption algorithm, production firm or client set the key corresponding with ciphertext again.Since cleartext information in the des encryption process ciphertext for showing at random, and irregular seeking, so the adulterator can't recall plaintext according to the ciphertext law of character graphics displaying, improved antifalsification.
Described DES algorithm is the DSE arithmetic in the cipher system, is become Data Encryption Standard again, is the DSE arithmetic cryptographic algorithm of American I BM company development in 1972, is a kind of known cryptographic algorithm, therefore is not described in detail in this.Can certainly be by other cryptographic algorithm, for example RSA cryptographic algorithms is encrypted cleartext information and is obtained described ciphertext.
The concatenated code that described processing module is used for obtaining according to optical module is carried out corresponding instruction, and control output module feedback error message or correct cleartext information.
Particularly, as shown in Figure 3, the method for distinguishing anti-fake code of the present invention is as described below:
A, optical module obtain the anti-fake code group, and this anti-fake code group is decoded to obtain the cascade code character corresponding with this anti-fake code group;
B, processing module extracted valid data information from this cascade code character, and in core database, seek and unique corresponding ciphertext of this valid data information and key;
If the C processing module searches out and unique corresponding ciphertext of valid data information and key in core database, then carry out next step, if do not search out, then by output unit to the user feedback error message, wait the valid data information in the next cascade code character to be extracted;
D, processing module search out in the core database with unique corresponding ciphertext of valid data information and key after, search again and this ciphertext and the corresponding cleartext information of key, if find and this ciphertext and the corresponding cleartext information of key, then carry out next step, if do not search out, then by output unit to the user feedback error message;
E, processing module get access in the core database with ciphertext and key corresponding plaintext information after, the notice output unit is with this cleartext information output.
F, optical module obtain described end coding, and will finish the end code information of coding and decoding Cheng Yuqi correspondence, and processing module generates according to the end code information of obtaining and finishes the recognition programmed instruction, identify this recognition program run and finish.
In the present invention, the user need utilize the startup that optical module scans one group of anti-fake code successively to encode by the mode that scans, recognition is encoded, data length is encoded, valid data are encoded and the end coding.
Particularly, described method A is further comprising the steps of:
A1, optical module obtain described startup coding, and this is started the program start sign indicating number of coding and decoding Cheng Yuqi correspondence, and processing module is obtained generator program enabled instruction behind this program start sign indicating number, allow whole recognition program start;
Behind A2, the recognition program start, optical module obtains described recognition coding, and should distinguish coding and decoding Cheng Yuqi corresponding file recognition code, and processing module generates recognition program run instruction after obtaining this document recognition code, identifies this recognition program and begins;
After A3, recognition program begin, optical module obtains described data length coding, and with the data length position of this data length coding and decoding Cheng Yuqi correspondence, processing module generates corresponding data length sign instruction according to this data length position, informs the effective length of wanting reading of data in the next step.
Described method B may further comprise the steps particularly:
B1, optical module obtain described valid data coding, with the valid data sign indicating number of the unique correspondence of this valid data coding and decoding Cheng Yuqi.
B2, described processing module generate valid data according to described valid data sign indicating number information and obtain instruction, and according to described data length sign instruction extracted valid data information from the valid data sign indicating number, during the effective length that if the valid data length of recognizer recognition surpasses or the instruction of not enough data length sign is suggested, processing module notice output module feedback error message; If effective length meets the suggested effective length of data length sign instruction, then proceed next step operation.
During concrete enforcement, optical module, processing module, core database and output module can be integrated in the electronic system, the user obtains anti-fake code on the code carrier by this electronic system, and by output module error message or correct cleartext information are played out, can distinguish the true and false of code carrier.Described core database can be the flash memory storage module, also can be the webserver, and the data message of its stored can regular update.For the code carrier of the anti-fake code of spreading the printed books invention, the anti-counterfeiting performance height, the fake producer is difficult for copying.For example, the shop is printed on the invoice of the bright anti-fake code of this law, and the anti-fake code shop is imprinted on false proof zone, and the user is scanned the true and false that code carrier can be known in this false proof zone by described electronic system, and use-pattern is simple, convenient.
Below only embodiments of the invention are described, but be not that various variations or the modification made according to spirit of the present invention are all within the protection category of claim of the present invention in order to restriction the present invention.

Claims (14)

1. method of distinguishing anti-fake code is characterized in that may further comprise the steps:
A, optical module obtain the anti-fake code group, and this anti-fake code group is decoded to obtain the cascade code character corresponding with this anti-fake code group;
B, processing module extracted valid data information from this cascade code character, and in core database, seek and unique corresponding ciphertext of this valid data information and key;
If the C processing module searches out and unique corresponding ciphertext of valid data information and key in core database, then carry out next step, if do not search out, then by output unit to the user feedback error message, wait the valid data information in the next cascade code character to be extracted;
D, processing module search out in the core database with unique corresponding ciphertext of valid data information and key after, search again and this ciphertext and the corresponding cleartext information of key, if find and this ciphertext and the corresponding cleartext information of key, then carry out next step, if do not search out, then by output unit to the user feedback error message;
E, processing module get access in the core database with ciphertext and key corresponding plaintext information after, the notice output unit is with this cleartext information output.
2. the method for recognition anti-fake code according to claim 1 is characterized in that: described anti-fake code group comprises startup coding, recognition coding, data length coding, valid data are encoded and finish coding.
3. the method for recognition anti-fake code according to claim 2 is characterized in that: described cascade code character comprises with the startup of anti-fake code group coding, recognition coding, data length coding, valid data coding and finishes coding corresponding respectively program start sign indicating number, file recognition code, data length identification code, valid data sign indicating number and end code.
4. the method for recognition anti-fake code according to claim 3, it is characterized in that: described steps A also comprises steps A 1, optical module obtains described startup coding, this is started the program start sign indicating number of coding and decoding Cheng Yuqi correspondence, processing module is obtained generator program enabled instruction behind this program start sign indicating number, allows whole recognition program start.
5. the method for recognition anti-fake code according to claim 4, it is characterized in that: described steps A also comprises steps A 2, behind the recognition program start, optical module obtains described recognition coding, and should distinguish coding and decoding Cheng Yuqi corresponding file recognition code, processing module generates recognition program run instruction after obtaining this document recognition code, identifies this recognition program and begins.
6. the method for recognition anti-fake code according to claim 5, it is characterized in that: described steps A also comprises steps A 3, after the recognition program begins, optical module obtains described data length coding, and with the data length position of this data length coding and decoding Cheng Yuqi correspondence, processing module generates corresponding data length sign instruction according to this data length position, informs the effective length of wanting reading of data in the next step.
7. the method for recognition anti-fake code according to claim 3 is characterized in that: described step B also comprises step B1, and optical module obtains described valid data coding, with the valid data sign indicating number of the unique correspondence of this valid data coding and decoding Cheng Yuqi.
8. the method for recognition anti-fake code according to claim 7, it is characterized in that: described step B also comprises step B2, described processing module generates valid data according to described valid data sign indicating number information and obtains instruction, and according to described data length sign instruction extracted valid data information from the valid data sign indicating number, during the effective length that if the valid data length of recognizer recognition surpasses or the instruction of not enough data length sign is suggested, processing module notice output module feedback error message; If effective length meets the suggested effective length of data length sign instruction, then proceed next step operation.
9. the method for recognition anti-fake code according to claim 3, it is characterized in that: also comprise step F, optical module obtains described end coding, and will finish the end code information of coding and decoding Cheng Yuqi correspondence, processing module generates according to the end code information of obtaining and finishes the recognition programmed instruction, identifies this recognition program run and finishes.
10. according to the method for any described recognition anti-fake code of claim 1 to 9, it is characterized in that: described cleartext information is predefined unique voice messaging.
11. the method according to any described recognition anti-fake code of claim 1 to 9 is characterized in that: generate corresponding ciphertext unique after described cleartext information process DES or the RSA Algorithm with it.
12. according to the method for any described recognition anti-fake code of claim 1 to 9, it is characterized in that: described core database is the webserver, and described key, ciphertext and cleartext information are stored in this webserver.
13. according to the method for any described recognition anti-fake code of claim 1 to 9, it is characterized in that: described core database is the flash memory storage module, and described key, ciphertext and cleartext information are stored in this memory module.
14. method according to any described recognition anti-fake code of claim 1 to 9, it is characterized in that: described anti-fake code group is formed by the array mode of a plurality of little elementary areas, described a plurality of little elementary areas be combined to form human eye the minute pattern that can not discern.
CN2010101555748A 2010-04-21 2010-04-21 Method for identifying and reading anti-counterfeiting codes Pending CN102236778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101555748A CN102236778A (en) 2010-04-21 2010-04-21 Method for identifying and reading anti-counterfeiting codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101555748A CN102236778A (en) 2010-04-21 2010-04-21 Method for identifying and reading anti-counterfeiting codes

Publications (1)

Publication Number Publication Date
CN102236778A true CN102236778A (en) 2011-11-09

Family

ID=44887417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101555748A Pending CN102236778A (en) 2010-04-21 2010-04-21 Method for identifying and reading anti-counterfeiting codes

Country Status (1)

Country Link
CN (1) CN102236778A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956864A (en) * 2016-05-03 2016-09-21 立德高科(昆山)数码科技有限责任公司 Method and system for determining authenticity of goods through microscopic image of goods logo
CN113873488A (en) * 2021-10-26 2021-12-31 深圳市心链科技有限公司 Anti-counterfeiting method based on NFC

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956864A (en) * 2016-05-03 2016-09-21 立德高科(昆山)数码科技有限责任公司 Method and system for determining authenticity of goods through microscopic image of goods logo
CN113873488A (en) * 2021-10-26 2021-12-31 深圳市心链科技有限公司 Anti-counterfeiting method based on NFC

Similar Documents

Publication Publication Date Title
US7263205B2 (en) System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
US9396383B2 (en) System, method and computer program for verifying a signatory of a document
CN101645133B (en) Methods and apparatuses for verifying and creating safe articles
JP2012070396A (en) Method and apparatus for creating authenticatable printed article and subsequently verifying it
CN1969289A (en) Authenticity verification methods, products and apparatuses
JP3960617B2 (en) Variable seal stamp and seal verification system
CN105788064B (en) Bill identification method and device
CN102236808A (en) Code carrier, electronic system capable of recognizing code and anti-counterfeiting system thereof
CN102236778A (en) Method for identifying and reading anti-counterfeiting codes
CN100587764C (en) Method for encryption and decryption of data using pixel
CN109409466B (en) Method and system for generating and checking dynamic anti-counterfeiting physical signature
CN1643551A (en) Method and system for user authentication in a digital communication system
CN102236807A (en) Information carrier with anti-counterfeiting codes
EP3550458A1 (en) Electronic devices and methods for identifying and/or authenticating a user
KR20150090159A (en) Security improvements for tickets
CN101807365B (en) Numeric-code safety-line self-certification anti-counterfeiting product and method
CN112528254A (en) Password security detection method
KR20170017190A (en) Apparatus for verifying biometric information and mobile authentication and payment method using thereof
EP2724305A1 (en) Method of dematerialized transaction
CN101807366B (en) Numeric-code safely-line self-certification anti-counterfeiting product and method
Haron et al. SAFe: a secure and fast auto filling form system
WO2023166698A1 (en) Data processing device, data processing method, and program
KR20010087749A (en) Apparatus and method for manufacturing and authenticating a card using watermarking technique
JP3139407U (en) Signature data generator
KR101298224B1 (en) Authentication method using 2-dimensional code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20111109