CN103049779B - The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods - Google Patents
The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods Download PDFInfo
- Publication number
- CN103049779B CN103049779B CN201210588719.2A CN201210588719A CN103049779B CN 103049779 B CN103049779 B CN 103049779B CN 201210588719 A CN201210588719 A CN 201210588719A CN 103049779 B CN103049779 B CN 103049779B
- Authority
- CN
- China
- Prior art keywords
- code
- image
- quick response
- response code
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention is generation method and the recognition methods of a kind of food safety liability insurance electronic insurance policy two-dimension code credential.The method that wherein generates comprises the following steps that 1) generate electronic insurance policy image in 2 D code, image in 2 D code is the Quick Response Code binary map of M × M pixel;2) the Quick Response Code binary map in image in 2 D code is encrypted;3) in image in 2 D code, digital watermarking is embedded.Due to the fact that and use the method that the Quick Response Code binary map in image in 2 D code is encrypted and embeds digital watermarking in image in 2 D code, therefore can be easy to read in and checking, and guarantee that safety in utilization, the present invention are generation and the recognition methodss of a kind of safe and reliable and false proof food safety liability insurance electronic insurance policy two-dimension code credential that can ensure that food safety liability insurance two-dimensional code electronic declaration form.
Description
Technical field
The present invention is generation and the recognition methods of a kind of food safety liability insurance electronic insurance policy two-dimension code credential, belongs to food
The generation of safety responsibility danger electronic insurance policy two-dimension code credential and the innovative technology of recognition methods.
Background technology
The common issue that food safety is developed country and developing country faces.Owing to food safety relates to producing, adding
Work, transport, make and multiple links such as sale.Therefore, food safety management is a system engineering.For ensureing the food of the whole society
Product safety management, on the basis of various legislations are sound, it is necessary to establish a government food quality supervision department, educational institution, food
The tight supervisory system that manufacturing enterprise, food safety liability insurance and consumer combine, strengthening business accountability consciousness, set up
Perfect food safety Emergency System and liability insurance security system, with new science and technology and market means and food tracing
System and arranging acts the tight defence line taking precautions against food safety risk.In June, 2012 promulgate " State Council about strengthen food safety work
The decision made " (promulgated by the State Council [2012] 20), about " actively developing food safety responsibility compulsory insurance system pilot ", it will
China's food safety Fame Mechanism, food safety credit system and food safety risk management and control system is greatly promoted on the basis of this
Construction.
Food safety liability insurance is defined as insurant and produces and sells food in the management place that insurance contract is listed
Product, or on-the-spot time the food being consistent with its nature of business is provided, because of neglect or fault cause consumer's alimentary toxicosis or other
Disease caused by food-borne bacteria or because causing consumer's damage to person or property loss, victim or its agent first mixed with foreign body in food
Lodging claims to insurant, the insurer is the liability insurance of liable for compensation in the limit of indemnity of contract engagement.Food safety is blamed
Insurance is appointed to relate to the assessment to food safety liability exposure, the classification of food of accepting insurance, mode of accepting insurance, the determining of rate, risk pipe
Reason and multiple link such as settlement of insurance claim, procedural intervention, the management level for insurance company proposes higher
Requirement.As there is act of law and ensureing the voucher of insurant's legitimate rights and interests, the verity of insurance document, can not tamper
Particularly significant with non repudiation.Now declaration form is many presented in papery, but, insurance fraud, false declaration form case time have and send out
Raw, declaration form once goes wrong, and insurance company checks and processing procedure is sufficiently complex and slow.Along with cyber-net skill
Developing rapidly of art, particularly planar bar code technology are protected at the application of food safety tracking Yu trace field, safe and efficient electronics
The most emerging single fortune and give birth to, this will further facilitate carrying out of food safety responsibility compulsory insurance system pilot work.Simultaneously, it is achieved
To fully the identifying of food safety risk, evaluate and tight monitoring and control, build diversification, food at many levels, by all kinds of means
Product safety responsibility risk management and control system, for building China's food safety liability insurance system and seizing international specialized financial development
Strategic high ground provides strong support.
The subject matter that Integrated comparative papery declaration form exists, electronic insurance policy can reduce expense apparently and strengthen it
Ageing, antifalsification and traceability.But, electronic insurance policy needs to solve following key issue technically: (1) meets law and depends on
According to the reading of paper-based form of electronic insurance policy and checking and electronic anti-fogery verification (absolute safety);(2) have vast
Customer support and the storage form that can read and the electronics sending mode such as mail transmission, fax (extensively compatible).
Summary of the invention
It is an object of the invention to consider that the problems referred to above provide one to be easy to read in and checking, and guarantee safety in utilization
The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods.Present invention can ensure that food safety liability insurance
Two-dimensional code electronic declaration form safe and reliable and false proof.
The technical scheme is that the generation side of the food safety liability insurance electronic insurance policy two-dimension code credential of the present invention
Method, comprises the following steps that
1) generating electronic insurance policy image in 2 D code, image in 2 D code is the Quick Response Code binary map of M × M pixel;
2) the Quick Response Code binary map in image in 2 D code is encrypted;
3) in image in 2 D code, digital watermarking is embedded.
Above-mentioned steps 2) in method that the Quick Response Code binary map in image in 2 D code is encrypted be application chaos sequence
Quick Response Code binary map is encrypted, specifically includes following steps:
21) image in 2 D code is carried out pretreatment, remove clear area and location positioning detection figure, produce a carrier
Figure, and add up its embeddable capacity;
22) chaos sequence sensitivity to initial condition is utilized, by often organizing input initial value xiIncrease side-play amount and
The method forming new input initial value revises the path of key distribution automatically, to destroy the dependency in chaotic key path, because of
And Quick Response Code binary map is divided into N group, often group (M/N) × M pixel;
23) initial value x is choseniWith the system parameter values meeting generation chaos sequence requirementμ, produce an a length of (M/
The Rochester binary chaotic sequence of N) × M;
24) pixel value of the often interior two-dimensional code binary image of group is read, by Quick Response Code pixel value and the chaos two generated
Value sequence carries out XOR cryptographic calculation;
25) one group (M/N) × M pixel is often encrypted, i.e. at current input initial value xiValue is plus a side-play amount
T, and this side-play amount is one and organizes number N with currentiMake the variable of linear change, so constitute new input initial value xi+1=
xi+ NiT substitutes into chaos sequence equation, completes the XOR cryptographic calculation to N group Quick Response Code binary map;
26) data after being encrypted by XOR are write as the BMP picture format of standard, in order to by the most encrypted Quick Response Code two
Value image storage and transmission.
Above-mentioned steps 3) in embed digital watermarking in image in 2 D code be the application spatial domain normal direction Quick Response Code as carrier
Image embeds digital watermarking, and the step embedding digital watermarking is as follows:
31) application Gaussian Blur algorithm carries out fuzzy preceding operation to the most encrypted Quick Response Code, to obtain the gray scale of carrier
Image;
32) determine least significant bit and the figure place of embedding of the Quick Response Code gray level image as carrier, use all pixels
Last two embed digital watermark informations, and be predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to meet carrier embedding
The requirement of digital watermarking image data volume;
34) on the least significant bit of each pixel of carrier, a position of digital watermark data is embedded;
35) embedding of all digital watermarking numerical digits it is sequentially completed;
36) Quick Response Code embedding digital watermarking generated is carried out a series of attack resistance test, by comparing, analyze and
Checking confirms its absolute safety, thus completes the process of encryption and digital watermark embedding Quick Response Code.
The recognition methods of food safety liability insurance electronic insurance policy two-dimension code credential of the present invention, comprises the steps:
1) after receiving two-dimensional code electronic declaration form voucher, first extract image in 2 D code, carry out the pre-place of image in 2 D code
Reason;
2) digital watermarking is effectively extracted according to Digital Watermarking Embedded Algorithm and step;
3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information;
4) decoding obtains the whole valid data information entrained by image in 2 D code;
5) identify and verifying digital watermark and the correctness of Quick Response Code primary data information (pdi) and effectiveness, identified checking,
To legal two-dimension code pattern voucher, continue executing with subsequent transaction;To illegal two-dimension code pattern voucher, after forbidding immediately performing
Continuous transaction, and carry out total system warning.
Due to the fact that the Quick Response Code binary map in image in 2 D code is encrypted and embedding in image in 2 D code by employing
The method entering digital watermarking, therefore can be easy to read in and checking, and guarantee that safety in utilization, the present invention are that one can ensure that food is pacified
The life of the safe and reliable and false proof food safety liability insurance electronic insurance policy two-dimension code credential of full liability insurance two-dimensional code electronic declaration form
Become and recognition methods.
Accompanying drawing explanation
Fig. 1 is that food safety liability insurance is insured and accept insurance flow process;
Fig. 2 is food safety liability insurance electronic insurance policy two-dimension code credential product process;
Fig. 3 is that food safety liability insurance electronic insurance policy two-dimension code credential verifies identification process;
Fig. 4 is food safety liability insurance Two-dimensional electron declaration form structural representation.
Detailed description of the invention
Embodiment:
The insuring of food safety liability insurance, audit, accept insurance flow process as shown in Figure 1.When including the food enterprises insured
Essential information, food safety responsibility insurance kind, insured amount information, risk assessment and management and control information, msu message and underwriting information exist
After interior full detail enters computer management system, at the end of food safety liability insurance electronic insurance policy product process, it is
System automatically generates two-dimensional code electronic declaration form.
The generation method flow diagram of the food safety liability insurance electronic insurance policy two-dimension code credential of the present invention is as in figure 2 it is shown, wrap
Include and have the following steps:
1) generating electronic insurance policy image in 2 D code, image in 2 D code is the Quick Response Code binary map of M × M pixel;
2) the Quick Response Code binary map in image in 2 D code is encrypted;
3) in image in 2 D code, digital watermarking is embedded.
Electronic insurance policy needs the key issue solved technically to be electronic anti-fogery and the checking of electronic insurance policy.Chaos sequence
Due to have non-linear, pseudo-randomness, non-convergency, complexity and the characteristic such as initial condition value is very sensitive is made be
Unite unpredictable, thus be applicable to the occasion of electronic insurance policy information encryption.Raw at food safety liability insurance electronic insurance policy Quick Response Code
Cheng Hou, it is assumed that carried the bianry image that Quick Response Code is M × M pixel of food safety liability insurance underwriting information, application enhancements
Chaos sequence key step that Quick Response Code binary map is encrypted as follows: 21) first Quick Response Code is carried out pretreatment, remove
Clear area and location positioning detection figure, produce a carrier figure, and add up its embeddable capacity;22) chaos sequence is utilized
Sensitivity to initial condition, by often organizing input initial value xiIncrease side-play amount and form the side of new input initial value
Method revises the path of key distribution automatically, to destroy the dependency in chaotic key path.Thus Quick Response Code binary map is divided into N
Group, often group (M/N) × M pixel;23) initial value x is choseniWith the system parameter values meeting generation chaos sequence requirementμ, produce
Rochester (Logistic) binary chaotic sequence of raw a length of (M/N) × M;24) the often interior Quick Response Code two-value of group is read
Image pixel value, carries out XOR cryptographic calculation by Quick Response Code pixel value and the chaotic binary sequences generated;25) one is often encrypted
Group (M/N) × M pixel, i.e. at current input initial value xiValue is plus side-play amount t, and this side-play amount is one
With current group number NiMake the variable of linear change, so constitute new input initial value xi+1= xi+ NiT substitutes into chaos sequence side
Journey, completes the XOR cryptographic calculation to N group Quick Response Code binary map;26) data after being encrypted by XOR are write as the BMP figure of standard
As form, in order to the storage of the most encrypted two-dimensional code binary image and transmission.
In view of digital watermarking in recent years is in the extensive application in the field such as Information hiding, digital anti-counterfeiting, it is contemplated that by chaos encryption
Carry out organically with digital watermarking, combine cleverly.Therefore, on the basis of Quick Response Code improves encrypted chaotic array, should
Embed digital watermarking with improving the spatial domain normal direction image in 2 D code as carrier, with improve further Quick Response Code security performance and
Anti-counterfeiting performance.Above-mentioned steps 3) in embedding algorithm step as follows: 31) application Gaussian Blur algorithm to the most encrypted two
Dimension code carries out fuzzy preceding operation, to obtain the gray level image of carrier;32) the minimum of the Quick Response Code gray level image as carrier is determined
Significance bit and the figure place of embedding, use last two of all pixels to embed digital watermark information, and be predisposed to zero;33) produce
Digital watermarking image, and suitably adjust size and the number of bits of digital watermarking image, to meet the digital watermarking that carrier embeds
The requirement of image data amount;34) on the least significant bit position of each pixel of carrier, a position of digital watermark data is embedded;
35) embedding of all digital watermarking numerical digits it is sequentially completed;36) Quick Response Code embedding digital watermarking generated is carried out a series of
Attack resistance is tested, and by comparing, analyze and verify its absolute safety of confirmation, thus completes encryption and digital watermark embedding two
The process of dimension code.As can be seen here, the food safety liability insurance electronic insurance policy image in 2 D code voucher referred here to actually includes
Two layer data: the visual information layer i.e. carried by Quick Response Code and the hiding Information Level carried by digital watermarking.This two-layer is mutual
Independent data message, through organically blending and a series of mathematic(al) manipulations process, is defined and can be tested by key and implicit information
Card identifies but can not the food safety liability insurance electronic insurance policy image in 2 D code voucher of copying and forging.
Food safety liability insurance electronic insurance policy two-dimension code credential checking identification process is food safety liability insurance electronic insurance policy
The inverse process of two-dimension code credential product process.Its flow process is as shown in Figure 3.Food safety liability insurance electronic insurance policy two-dimension code credential is tested
Card identification step is as follows: 1) after receiving two-dimensional code electronic declaration form voucher, first extracts image in 2 D code, carries out image in 2 D code
Pretreatment;2) digital watermarking is effectively extracted according to Digital Watermarking Embedded Algorithm and step;3) according to chaos encryption algorithm and step
Rapid extraction key and deciphering, recover original two dimensional code information;4) decoding obtains the whole valid data entrained by image in 2 D code
Information;5) identify and verifying digital watermark and the correctness of Quick Response Code primary data information (pdi) and effectiveness.Identified checking, involutory
The two-dimension code pattern voucher of method, continues executing with subsequent transaction;To illegal two-dimension code pattern voucher, forbid immediately performing follow-up friendship
Easily, and carry out total system warning.Such identify checking can occur food safety liability insurance electronic insurance policy formed any
Node, to guarantee the safe and reliable and false proof of food safety liability insurance two-dimensional code electronic declaration form.
The food safety liability insurance two-dimensional code electronic declaration form structural representation of present invention design is as shown in Figure 4.Electronic insurance policy
Design of Main Structure is four parts: the 1) essential information of the food enterprises of insuring, essential information mainly include enterprise name,
Attribute, address and contact person etc.;2) insure the enterprise qualification information of the food enterprises, enterprise qualification information spinner enterprise to be included
Scale, leading organ, registered capital, production kind, the production permit of food safety Regulation department and health perform standard, economy
With social benefit and the sincere degree etc. of enterprise;3) the food safety liability insurance of the food enterprises of insuring is insured information, throws
Protect information spinner and to include insure insurance kind, insured amount information, careful guarantor's information and underwriting information etc.;4) express inform necessity information carry
Show.
Claims (2)
1. the generation method of a food safety liability insurance electronic insurance policy two-dimension code credential, it is characterised in that include following step
Rapid:
1) generating electronic insurance policy image in 2 D code, image in 2 D code is the Quick Response Code binary map of M × M pixel;
2) the Quick Response Code binary map in image in 2 D code is encrypted;
3) in image in 2 D code, digital watermarking is embedded;
Above-mentioned steps 2) in method that the Quick Response Code binary map in image in 2 D code is encrypted be that application chaos sequence is to two
Dimension code binary map is encrypted, and specifically includes following steps:
21) image in 2 D code is carried out pretreatment, remove clear area and location positioning detection figure, produce a carrier figure, and
The statistics embeddable capacity of carrier figure;
22) chaos sequence sensitivity to initial condition is utilized, by often organizing input initial value xiIncrease side-play amount and formed
The method of new input initial value revises the path of key distribution automatically, to destroy the dependency in chaotic key path, thus will
Quick Response Code binary map is divided into N group, often group (M/N) × M pixel;
23) initial value x is choseniWith the system parameter values meeting generation chaos sequence requirementμ, produce a length of (M/N) × M
Rochester binary chaotic sequence;
24) pixel value of the often interior two-dimensional code binary image of group is read, by Quick Response Code pixel value and the chaos two-value sequence generated
Row carry out XOR cryptographic calculation;
25) one group (M/N) × M pixel is often encrypted, i.e. at current input initial value xiValue adds side-play amount t, and
This side-play amount is one and organizes number N with currentiMake the variable of linear change, so constitute new input initial value xi+1= xi+
NiT substitutes into chaos sequence equation, completes the XOR cryptographic calculation to N group Quick Response Code binary map;
26) data after being encrypted by XOR are write as the BMP picture format of standard, in order to by the most encrypted Quick Response Code binary map
As storage and transmission.
Method the most according to claim 1, it is characterised in that above-mentioned steps 3) in image in 2 D code embed numeral water
Print is the image in 2 D code embedding digital watermarking as carrier of the application spatial domain normal direction, and the step embedding digital watermarking is as follows:
31) application Gaussian Blur algorithm carries out fuzzy preceding operation to the most encrypted Quick Response Code, to obtain the gray level image of carrier;
32) determine the least significant bit of Quick Response Code gray level image as carrier and the figure place of embedding, use all pixels
Latter two embed digital watermark information, and are predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to meet the number that carrier embeds
The requirement of word watermark image data amount;
34) on the least significant bit of each pixel of carrier, a position of digital watermark data is embedded;
35) embedding of all digital watermarking numerical digits it is sequentially completed;
36) Quick Response Code embedding digital watermarking generated is carried out a series of attack resistance test, by comparing, analyze and verifying
Confirm its absolute safety, thus complete the process of encryption and digital watermark embedding Quick Response Code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588719.2A CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588719.2A CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103049779A CN103049779A (en) | 2013-04-17 |
CN103049779B true CN103049779B (en) | 2016-12-28 |
Family
ID=48062411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210588719.2A Expired - Fee Related CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103049779B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239838A (en) * | 2013-06-19 | 2014-12-24 | 广州市人民印刷厂股份有限公司 | Anti-fake verification method for color two-dimensional code with digital watermark |
JP5869733B2 (en) | 2013-07-03 | 2016-02-24 | A・Tコミュニケーションズ株式会社 | Authentication server, authentication system, authentication method, and program |
CN103414549B (en) * | 2013-07-16 | 2016-12-28 | 广东工业大学 | A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method |
CN104680218B (en) * | 2015-02-12 | 2018-07-31 | 航天信息股份有限公司 | A kind of more space two-dimensional codes and its generation, coding/decoding method |
CN105187428A (en) * | 2015-09-15 | 2015-12-23 | 重庆智韬信息技术中心 | Method for realizing third-party safety authentication detection of two-dimensional code |
CN105389708A (en) * | 2015-11-05 | 2016-03-09 | 成都天星印务股份有限公司 | Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof |
CN107104790A (en) * | 2017-03-20 | 2017-08-29 | 上海师范大学 | Optical encryption method based on QR codes and array fingerprint key |
CN108921262A (en) * | 2018-04-26 | 2018-11-30 | 中国海洋大学 | A kind of three primary colours bar code and its generation and reading method |
CN109190339A (en) * | 2018-09-13 | 2019-01-11 | 中国农业银行股份有限公司 | A kind of webpage digital watermarking image generates, identification, Method of printing and device |
CN110570218A (en) * | 2018-09-13 | 2019-12-13 | 拍拍看(海南)人工智能有限公司 | genuine product responsibility insurance policy setting method and inquiry and registration system |
CN109740927B (en) * | 2018-12-29 | 2023-04-18 | 重庆工商大学融智学院 | Legal risk assessment and prevention system for colleges and universities |
CN112016937A (en) * | 2019-09-01 | 2020-12-01 | 海南亚元防伪技术研究所(有限合伙) | Insurance fidelity anti-fake method and its mark |
CN111489173A (en) * | 2020-03-03 | 2020-08-04 | 四川飨誉食界供应链管理有限公司 | Food safety tracing system and method based on full ecological monitoring |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Method for transmitting and receiving image series digital content as well as transmitter and receiver |
CN101377837A (en) * | 2007-08-29 | 2009-03-04 | 北京方维银通科技有限公司 | Method for generating and checking electronic check two-dimension code credence |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN101751658A (en) * | 2009-12-09 | 2010-06-23 | 清华大学 | Image visual separate-management method with minimum pixel expansion and optimal contrast |
CN101930588A (en) * | 2009-06-22 | 2010-12-29 | 夏普株式会社 | Image processing apparatus, image read-out, image processing system and disposal route |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102664727A (en) * | 2012-04-11 | 2012-09-12 | 南京邮电大学 | Virtual optical encryption method based on chaotic mapping |
-
2012
- 2012-12-31 CN CN201210588719.2A patent/CN103049779B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Method for transmitting and receiving image series digital content as well as transmitter and receiver |
CN101377837A (en) * | 2007-08-29 | 2009-03-04 | 北京方维银通科技有限公司 | Method for generating and checking electronic check two-dimension code credence |
CN101930588A (en) * | 2009-06-22 | 2010-12-29 | 夏普株式会社 | Image processing apparatus, image read-out, image processing system and disposal route |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN101751658A (en) * | 2009-12-09 | 2010-06-23 | 清华大学 | Image visual separate-management method with minimum pixel expansion and optimal contrast |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102664727A (en) * | 2012-04-11 | 2012-09-12 | 南京邮电大学 | Virtual optical encryption method based on chaotic mapping |
Also Published As
Publication number | Publication date |
---|---|
CN103049779A (en) | 2013-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103049779B (en) | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods | |
Vyas | Java in Action: AI for Fraud Detection and Prevention | |
US11682095B2 (en) | Methods and apparatus for performing agricultural transactions | |
WO2018103755A1 (en) | Combined two-dimensional code, electronic certificate carrier, and generation and reading apparatus and method | |
Sahu et al. | Improving grayscale steganography to protect personal information disclosure within hotel services | |
CN109564668A (en) | Electronics mortgage manager and monitoring | |
US20050273628A1 (en) | Registration and Verification System | |
Lou et al. | Construction information authentication and integrity using blockchain-oriented watermarking techniques | |
Irannezhad et al. | Addressing some of bill of lading issues using the Internet of Things and blockchain technologies: a digitalized conceptual framework | |
Nguyen et al. | A watermarking technique to secure printed matrix barcode—Application for anti-counterfeit packaging | |
CN111861461A (en) | Transaction data tracing method and system based on block chain | |
Herr | Cyber insurance and private governance: The enforcement power of markets | |
CN117314424A (en) | Block chain transaction system and method for big financial data | |
Barua et al. | Swindle: Predicting the probability of loan defaults using catboost algorithm | |
Shope | The bill of lading on the blockchain: an analysis of its compatibility with international rules on commercial transactions | |
US20130332374A1 (en) | Fraud prevention for real estate transactions | |
CN113570387A (en) | Artwork tracing method based on block chain and electronic equipment | |
CN115731056A (en) | Method for protecting insurance claim settlement report information | |
Tatineni et al. | Enhancing Financial Security: Data Science's Role in Risk Management and Fraud Detection | |
Arora et al. | Privacy Protection of Digital Images Using Watermarking and QR Code‐based Visual Cryptography | |
CN118261713A (en) | Financial data analysis method and system based on artificial intelligence | |
CN111161081B (en) | Method and storage medium for third party guarantee of Fu Fei Ting based on blockchain | |
CN116167807A (en) | Bill anti-counterfeiting method and device, electronic equipment and storage medium | |
CN113011543B (en) | Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system | |
CN109325568A (en) | Anti-fake two-dimension code and its modulation encryption method and identifying system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Liu Zexi Inventor after: Liu Yang Inventor after: Zheng Yingna Inventor before: Zheng Yingna Inventor before: Liu Yang |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161228 Termination date: 20171231 |