CN102915427A - Two-dimensional code-based bidirectional dynamic authentication method - Google Patents
Two-dimensional code-based bidirectional dynamic authentication method Download PDFInfo
- Publication number
- CN102915427A CN102915427A CN2012103859889A CN201210385988A CN102915427A CN 102915427 A CN102915427 A CN 102915427A CN 2012103859889 A CN2012103859889 A CN 2012103859889A CN 201210385988 A CN201210385988 A CN 201210385988A CN 102915427 A CN102915427 A CN 102915427A
- Authority
- CN
- China
- Prior art keywords
- code
- product
- authentication
- weighted codes
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a two-dimensional code-based bidirectional dynamic authentication method. The method comprises two stages of authentication code generation and authentication code verification, wherein firstly the identity code of a product is generated by an authentication code and then all the weighted codes are generated after the identity code is authenticated successfully; and the authentication code verification comprises two steps of verifying the identity code of the product and verifying all the weighted codes of the product respectively. The authentication method can be widely applied to crafts, collection, rare wine, jewelry, commodity exchanges and the like, and safety, rights and interests of commodity transaction are guaranteed.
Description
Technical field
The present invention relates to the planar bar code technology field, relate in particular to the two-way dynamic confirming method based on two-dimension code.
Background technology
At present, at aspects such as the authenticity of product and identity verifications, mainly adopt the methods such as the false proof and electronic anti-fogery of physics, these methods exist level of security to solidify, and authentication is unidirectional and passive.Simultaneously, these methods also are faced with the problems such as complicated operation cost height or security deficiency.How safer, easier authentication method is provided, guarantees authenticator and certified person both sides' safety.
How the authentication method of a kind of effective authenticity of products evaluation and identity verification is provided, and is the industry problem demanding prompt solution.
Summary of the invention
The present invention proposes a kind of two-way dynamic confirming method based on two-dimension code for the authentication question that solves authenticity of products, identity verification problem, comprises that authentication code generates and two stages of authentication code verifying, and described authentication code generation comprises the following steps:
S11. give unique identity code that can authenticate to product;
S12. scan the identity code of product, the identity code of product is verified, if authentication failed is returned step S11; If be proved to be successful, turn step S13;
S13. give product all unique weighted codes;
S14. scan all weighted codes of product, all weighted codes of product are verified, if authentication failed is returned step S13; If be proved to be successful, EO;
Described authentication code verifying comprises the following steps:
Step S21. scans the identity code of product;
Step S22. authenticates the identity code of product, if authentification failure, terminating operation; If authentication success turns step S23;
S23. all weighted codes of product scanned;
S24. all weighted codes of product authenticated, if authentification failure, terminating operation; If authentication success is confirmed the entitlement of product.
Described identity code and all weighted codes all adopt two-dimension code.
Described authentication code verifying also comprises step S25, and all weighted codes after the checking are upgraded, and generates all new weighted codes.
Described authentication code verifying also comprises step S26, and the identity code after the checking is upgraded, and generates new identity code.
Described authentication code verifying is further comprising the steps of: the identity code after the checking and all weighted codes are upgraded, generated new identity code and all new weighted codes.
The present invention gives the identity that one of product can unique authentication by planar bar code technology, and give the product owner all weighted codes, the methods such as again combination product true and false discriminating, owner's discriminating, entitlement transaction have ensured safety and the owner's equity of product when the owner changes.The invention solves the unidirectional and passive discriminating of authenticity of products, the problems such as product ownership issue, realize the dynamic bidirectional authentication of product, and the multi-level safety in the product ownership transfer authenticates and ownership issue shifts, thereby ensured verifier and authenticatee's rights and interests.The present invention can be widely used in product false proof, examines the aspects such as identity.
Description of drawings
Fig. 1 is authentication code product process figure of the present invention;
Fig. 2 is authentication code verifying process flow diagram of the present invention.
Embodiment
A kind of two-way dynamic confirming method based on two-dimension code proposed by the invention comprises that mainly authentication code generates and two stages of authentication code verifying.
Fig. 1 is authentication code product process figure, before the dispatching from the factory of commodity, gives identity code and all weighted codes to commodity, gives authentication code for commodity and comprises the following steps:
S11. give unique two-dimension code identity code that can authenticate to commodity, identifying these commodity is certified products;
S12. the two-dimension code identity code of items scanning is verified the identity code of commodity, if authentication failed is returned step S11; If be proved to be successful, turn step S13;
S13. give commodity all weighted codes of unique two-dimension code, identify this certified products and be producer all or other producer all;
S14. all weighted codes of the two-dimension code of items scanning are verified all weighted codes of commodity, if authentication failed is returned step S13; If be proved to be successful, EO;
Fig. 2 is authentication code verifying process flow diagram of the present invention, after commodity dispatch from the factory, in the process of circulation, is necessary identity and the owner of commodity are verified that authentication code verifying comprises the following steps:
Step S21. scans the identity code of commodity;
Step S22. authenticates the identity code of commodity, if authentification failure illustrates that these commodity are fake products, terminating operation; If authentication success turns step S23;
S23. all weighted codes of commodity scanned;
S24. all weighted codes of commodity is authenticated, if authentification failure illustrates that these commodity do not belong to this everyone, terminating operation; If authentication success is confirmed the entitlement of commodity.
Behind the commodity authentication success, can conclude the business, commodity are after concluding the business, the owner changes, so be necessary possessory identity code is changed, simultaneously, in order further to ensure the safety of commodity, authentication code verifying also comprises step S25, and all weighted codes after the checking are upgraded, generate all new weighted codes, also comprise step S26, the identity code after the checking is upgraded, generate new identity code, also can all upgrade the identity code after the checking and all weighted codes, generate new identity code and all new weighted codes.Commodity and all weighted codes after the transaction are maintained secrecy again, ensure owner's right.
Only in order to illustrate structure of the present invention, those of ordinary skill in the art can make various deformation and variation to above specific embodiment under design of the present invention, and these distortion and variation include within protection scope of the present invention.
Claims (5)
1. the two-way dynamic approach based on two-dimension code is characterized in that, comprises that authentication code generates and two stages of authentication code verifying, and described authentication code generates and comprises the following steps:
S11. give unique identity code that can authenticate to product;
S12. scan the identity code of product, the identity code of product is verified, if authentication failed is returned step S11; If be proved to be successful, turn step S13;
S13. give product all unique weighted codes;
S14. scan all weighted codes of product, all weighted codes of product are verified, if authentication failed is returned step S13; If be proved to be successful, EO;
Described authentication code verifying comprises the following steps:
Step S21. scans the identity code of product;
Step S22. authenticates the identity code of product, if authentification failure, terminating operation; If authentication success turns step S23;
S23. all weighted codes of product scanned;
S24. all weighted codes of product authenticated, if authentification failure, terminating operation; If authentication success is confirmed the entitlement of product.
2. the two-way dynamic approach based on two-dimension code as claimed in claim 1 is characterized in that: described identity code and all weighted codes all adopt two-dimension code.
3. the two-way dynamic approach based on two-dimension code as claimed in claim 1, it is characterized in that: described authentication code verifying also comprises step S25, and all weighted codes after the checking are upgraded, and generates all new weighted codes.
4. the two-way dynamic approach based on two-dimension code as claimed in claim 1, it is characterized in that: described authentication code verifying also comprises step S26, and the identity code after the checking is upgraded, and generates new identity code.
5. the two-way dynamic approach based on two-dimension code as claimed in claim 1 is characterized in that described authentication code verifying is further comprising the steps of: the identity code after the checking and all weighted codes are upgraded, generated new identity code and all new weighted codes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103859889A CN102915427A (en) | 2012-10-12 | 2012-10-12 | Two-dimensional code-based bidirectional dynamic authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103859889A CN102915427A (en) | 2012-10-12 | 2012-10-12 | Two-dimensional code-based bidirectional dynamic authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102915427A true CN102915427A (en) | 2013-02-06 |
Family
ID=47613789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103859889A Pending CN102915427A (en) | 2012-10-12 | 2012-10-12 | Two-dimensional code-based bidirectional dynamic authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102915427A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182866A (en) * | 2013-05-22 | 2014-12-03 | 吴宁飞 | Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like |
CN105321082A (en) * | 2015-06-12 | 2016-02-10 | 施文明 | Two-segment code information anti-counterfeit verification technology |
CN108737404A (en) * | 2018-05-10 | 2018-11-02 | 广州优特尔信息科技有限公司 | A kind of information checking method, apparatus and system based on bar code |
CN109146519A (en) * | 2018-08-14 | 2019-01-04 | 向林 | Sign the technical support system of consumption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009018A (en) * | 2007-01-17 | 2007-08-01 | 白涛 | Anti-counterfeiting verification information searching system for card and certificate of house ownership |
CN101577697A (en) * | 2008-05-07 | 2009-11-11 | 深圳市络道科技有限公司 | Authentication method and authentication system for enforced bidirectional dynamic password |
CN102184506A (en) * | 2011-05-10 | 2011-09-14 | 南通大学 | Digital anti-counterfeiting method based on chaos password encryption |
CN102411748A (en) * | 2011-07-28 | 2012-04-11 | 黄晋 | Safety anti-counterfeiting system and method based on two wireless radio frequency tags |
CN102609846A (en) * | 2011-03-18 | 2012-07-25 | 诺美网讯应用技术有限公司 | Anti-false verification method and system based on communication network |
-
2012
- 2012-10-12 CN CN2012103859889A patent/CN102915427A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009018A (en) * | 2007-01-17 | 2007-08-01 | 白涛 | Anti-counterfeiting verification information searching system for card and certificate of house ownership |
CN101577697A (en) * | 2008-05-07 | 2009-11-11 | 深圳市络道科技有限公司 | Authentication method and authentication system for enforced bidirectional dynamic password |
CN102609846A (en) * | 2011-03-18 | 2012-07-25 | 诺美网讯应用技术有限公司 | Anti-false verification method and system based on communication network |
CN102184506A (en) * | 2011-05-10 | 2011-09-14 | 南通大学 | Digital anti-counterfeiting method based on chaos password encryption |
CN102411748A (en) * | 2011-07-28 | 2012-04-11 | 黄晋 | Safety anti-counterfeiting system and method based on two wireless radio frequency tags |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182866A (en) * | 2013-05-22 | 2014-12-03 | 吴宁飞 | Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like |
CN105321082A (en) * | 2015-06-12 | 2016-02-10 | 施文明 | Two-segment code information anti-counterfeit verification technology |
CN108737404A (en) * | 2018-05-10 | 2018-11-02 | 广州优特尔信息科技有限公司 | A kind of information checking method, apparatus and system based on bar code |
CN108737404B (en) * | 2018-05-10 | 2021-06-04 | 广州源创设计顾问有限公司 | Information checking method, device and system based on bar code |
CN109146519A (en) * | 2018-08-14 | 2019-01-04 | 向林 | Sign the technical support system of consumption |
CN109146519B (en) * | 2018-08-14 | 2021-06-11 | 向林 | Technical support system for signature consumption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102075547B (en) | Dynamic password generating method and device and authentication method and system | |
US10607211B2 (en) | Method for authenticating a user to a machine | |
KR101111381B1 (en) | User identification system, apparatus, smart card and method for ubiquitous identity management | |
CN104838629B (en) | Use mobile device and the method and system that are authenticated by means of certificate to user | |
CN105554035B (en) | A kind of electronic lock system and its control method | |
US20140062658A1 (en) | Authentication system and authentication method | |
CN103514536A (en) | Secure payments with untrusted devices | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
US20150161594A1 (en) | Payment unit, system and method | |
CN101561956A (en) | Method and system for information interaction | |
CN102915427A (en) | Two-dimensional code-based bidirectional dynamic authentication method | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN105871424A (en) | RFID group validation method based on ECC | |
CN105450400B (en) | Identity verification method, client, server and system | |
JP2015088080A (en) | Authentication system, authentication method, and program | |
Tsai et al. | Trusted M-banking Verification Scheme based on a combination of OTP and Biometrics | |
KR101907170B1 (en) | Biometric card for encrypting card information using biometric crptosystem and biometric data and user authentication method thereof | |
CN104217335A (en) | Storing device and method for commodity authenticity verification information, and commodity authenticity verification method | |
CN109450915A (en) | A kind of homing pigeon foot ring and its recognition methods based on NFC | |
JP2009272737A (en) | Secret authentication system | |
CN107453871A (en) | Password generated method, password authentication method, method of payment and device | |
CN103268509A (en) | Ticketing system based on two-dimensional code and encryption technique | |
CN104156855A (en) | Payment method and system | |
KR101242684B1 (en) | User certification system and method for 2 dimensional barcode | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130206 |