CN105550730A - Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier - Google Patents

Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier Download PDF

Info

Publication number
CN105550730A
CN105550730A CN201610060527.2A CN201610060527A CN105550730A CN 105550730 A CN105550730 A CN 105550730A CN 201610060527 A CN201610060527 A CN 201610060527A CN 105550730 A CN105550730 A CN 105550730A
Authority
CN
China
Prior art keywords
dimensional code
micro
point
secure
dimension
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610060527.2A
Other languages
Chinese (zh)
Other versions
CN105550730B (en
Inventor
周晓明
曹鹏
王敬
于丽芳
牟大中
董智红
冯柳平
罗文秋
陈建博
李沐明
祖艳娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING PAN-PASS INFO TECH Co Ltd
Original Assignee
BEIJING PAN-PASS INFO TECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING PAN-PASS INFO TECH Co Ltd filed Critical BEIJING PAN-PASS INFO TECH Co Ltd
Priority to CN201610060527.2A priority Critical patent/CN105550730B/en
Publication of CN105550730A publication Critical patent/CN105550730A/en
Application granted granted Critical
Publication of CN105550730B publication Critical patent/CN105550730B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding

Abstract

The embodiment of the invention discloses a safe two-dimensional code manufacture method and decoding method, and a safe two-dimensional code identifier. The safe two-dimensional code manufacture method comprises the following steps: according to a two-dimensional code coding rule, obtaining a data storage area of a two-dimensional code, implanting a plurality of black and white microdots and a structure, which is formed by the relative positions of the microdots, of the black and white microdots into the data storage area, wherein the black and white microdots and the structure represent implanted information; and implanting the black and white microdots and the structure into the storage area of the two-dimensional code to form a safe two-dimensional code. The scheme solves the defects of low safety, replicability and the like of the common two-dimensional code. The safe two-dimensional code provided by the invention and a safe two-dimensional code identifier which uses the safe two-dimensional code can be widely applied to various information service systems including intellectual property protection, object authentication, anti-counterfeiting traceability and the like.

Description

A kind of secure two-dimensional code method for making, coding/decoding method and secure two-dimensional code mark
Technical field
The present invention relates to two-dimension code safe technical field, particularly relate to a kind of secure two-dimensional code method for making, coding/decoding method and secure two-dimensional code mark.
Background technology
Along with the popularization and application of planar bar code technology, the mark of commodity is used as by Quick Response Code, or the application of being distinguish true from false by scanning Quick Response Code is very general, but although existing ordinary two dimensional code can identify a certain commodity, or review this Quick Response Code merchandise news behind, but this ordinary two dimensional code is easily replicated and copys, and therefore, security is lower.
Summary of the invention
A kind of secure two-dimensional code method for making, coding/decoding method and secure two-dimensional code mark is provided, to solve the low problem of two-dimension code safe of the prior art in the embodiment of the present invention.
In order to solve the problems of the technologies described above, the embodiment of the invention discloses following technical scheme:
A kind of secure two-dimensional code method for making, described method comprises:
Obtain the data storage areas of Quick Response Code;
Form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
By micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, form secure two-dimensional code.
Preferably, the module that described Quick Response Code is encoded comprises at least one black module and at least one white module;
The micro-point of described configuration black and the structure be made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof, comprising:
The structure each described black module configuring the micro-point of described white and is made up of relative position, with, the structure each described white module configuring the micro-point of described black and is made up of relative position, wherein, the size of the micro-point of described white is less than the size of described black module, and the size of the micro-point of described black is less than the size of described white module.
Preferably, the structure each described black module configuring the micro-point of described white and is made up of relative position, and the structure configuring the micro-point of described black and be made up of relative position in each described white module, comprising:
Obtain implantation information, wherein, described implantation information comprises third dimension text message;
Described implantation information is converted to the third dimension and implants information coding;
Choose the described third dimension and implant information coding, with the micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the mapping ruler corresponding to structure that is made up of relative position thereof;
According to the structure that described mapping ruler configures the micro-point of described white and is made up of relative position in each described black module, and, the structure each described white module configuring the micro-point of described black and is made up of relative position.
Preferably, described implantation information is converted to after the third dimension implants information coding and also comprises:
Implant information coding to the described third dimension to be encrypted;
Choose with described encryption after the third dimension implant mapping ruler corresponding to information coding;
The third dimension stored after described and encryption implants the mapping ruler corresponding to information coding.
Preferably, the data storage areas of described acquisition Quick Response Code comprises:
Obtain the coding rule of any one Quick Response Code;
Obtain the data storage areas of this Quick Response Code according to the coding rule of described Quick Response Code, wherein, described data storage areas is for storing user data.
A kind of secure two-dimensional code coding/decoding method, described method comprises:
Secure two-dimensional code is separated, obtains and the micro-point of black corresponding to described secure two-dimensional code and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
To the micro-point of described black and the structure that is made up of relative position thereof, and the micro-point of described white and the structure that is made up of relative position thereof are resolved, and obtain mapping ruler;
According to described mapping ruler by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the cooperating measure that is made up of relative position thereof are that the third dimension implants information coding;
The third dimension text message corresponding to information coding is implanted according to the acquisition of described third dimension implantation information coding and this third dimension.
Preferably, obtain the third dimension text message implanted corresponding to information coding with this third dimension to comprise:
Implant information coding to the described third dimension to verify, reject mistake, or reduction is compensated to missing information, generate the third dimension and implant message code;
Resolve the described third dimension and implant message code, obtain described third dimension text message.
Preferably, described method also comprises:
Judge whether a Quick Response Code is secure two-dimensional code;
If be separated described Quick Response Code, can obtain and the micro-point of the black corresponding to described Quick Response Code and the structure that is made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and meet mapping ruler, then this Quick Response Code is secure two-dimensional code.
Preferably, described method also comprises:
Judge whether described secure two-dimensional code is true;
If the information match of described third dimension text message and the ordinary two dimensional code separated from described secure two-dimensional code, then described secure two-dimensional code is true; Otherwise described secure two-dimensional code is false.
A secure two-dimensional code mark, described secure two-dimensional code mark comprises: secure two-dimensional code and printing mark, wherein, described secure two-dimensional code is printed on described printing mark.
From above technical scheme, a kind of secure two-dimensional code method for making that the embodiment of the present invention provides, the structure data storage areas of common Quick Response Code configuring black, white micro-point and is made up of relative position, and this to be put slightly and structure is implanted on the data storage areas of Quick Response Code, form secure two-dimensional code.This secure two-dimensional code is in modulates information, Image Coding, printout and image acquisition, demodulates information and information extraction; the modulation of Application of composite present information and the multinomial advanced technology such as information coding, information security and digital code anti-false, shadow tone vector screening; achieve the dimension expansion of Quick Response Code storage space; and complete compatible original ordinary two dimensional code; solve ordinary two dimensional code and not there is the defect such as security and anti-copying, intellectual property protection, article authentication, false proof that much information service system such as to trace to the source can be widely used in.
In addition, present invention also offers a kind of secure two-dimensional code coding/decoding method, by the separation of secure two-dimensional code and parsing, obtain the third dimension text message of its representative, and then judge the true and false of secure two-dimensional code by this third dimension text message.Owing to containing third dimension text message in secure two-dimensional code, text information implants information coding by the special third dimension to be translated into, therefore, can not because of copying or the mode such as scanning and obtain the third dimension text message that secure two-dimensional code hides, so than the security of ordinary two dimensional code and antifalsification higher.
A kind of secure two-dimensional code mark that present invention also offers, by being arranged on printing mark by having the secure two-dimensional code implanting message identification, form secure two-dimensional code mark, this secure two-dimensional code is identified and can paste or be applied in much information service system.In addition, this secure two-dimensional code mark also can be added unique identification or the trade mark of user, further increasing application and the antifalsification of secure two-dimensional code.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, for those of ordinary skills, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The process flow diagram of a kind of secure two-dimensional code method for making that Fig. 1 provides for the embodiment of the present invention;
The process flow diagram of the another kind of secure two-dimensional code method for making that Fig. 2 provides for the embodiment of the present invention;
The process flow diagram of another secure two-dimensional code method for making that Fig. 3 provides for the embodiment of the present invention;
The process flow diagram of a kind of secure two-dimensional code coding/decoding method that Fig. 4 provides for the embodiment of the present invention;
The process flow diagram of the another kind of secure two-dimensional code coding/decoding method that Fig. 5 provides for the embodiment of the present invention;
The process flow diagram of another secure two-dimensional code coding/decoding method that Fig. 6 provides for the embodiment of the present invention;
The schematic diagram of a kind of secure two-dimensional code that Fig. 7 provides for the embodiment of the present invention;
The schematic diagram of a kind of secure two-dimensional code mark that Fig. 8 provides for the embodiment of the present invention.
Embodiment
Technical scheme in the present invention is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
Below in conjunction with Fig. 1 to Fig. 8, a kind of secure two-dimensional code method for making, coding/decoding method and the secure two-dimensional code mark that the embodiment of the present invention provides is specifically described.
See Fig. 1, be the process flow diagram of a kind of secure two-dimensional code method for making that the embodiment of the present invention provides, concrete the method comprises:
Step S110: the data storage areas obtaining Quick Response Code.
Wherein, the data storage areas obtaining Quick Response Code is specially: the Quick Response Code first obtaining any one, the data storage areas of this Quick Response Code is obtained according to the coding rule of this Quick Response Code, such as by searching the instructions of Quick Response Code, or obtained the coding rule of this Quick Response Code by scanning device scanning.Wherein, described data storage areas is the storage of subscriber data region except locating information, system information.For QR code, the region beyond 3 postings, version information and format informations, for storing the region of user data, these regions and data storage areas.
Wherein, represent a coding at the described white micro-point or the micro-point of black and structure thereof often organized, the code set of the micro-point of all described white or the micro-point of black and structure thereof represents implantation information.
Step S120: form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof.
Normally, Quick Response Code forms by the little module that several sizes are identical is regularly arranged, and the gray scale of each lattice is different, presents black and white two kinds of colors.The module of described Quick Response Code coding comprises at least one black module and at least one white module;
Step S120 specifically comprises: the structure configuring the micro-point of described white and be made up of relative position in each described black module, with, the structure each described white module configuring the micro-point of described black and is made up of relative position, wherein, the size of the micro-point of described white is less than the size of described black module, and the size of the micro-point of described black is less than the size of described white module.
Form in the module of Quick Response Code coding in described data storage areas, the position of black little module configures or embeds the micro-point of white with certain structure distribution, namely the structure of white micro-point and the micro-composition of adularescent thereof is configured, with, configuration or embed with the micro-point of black of certain structure distribution on the position of white little module, namely configures the micro-point of black and by the micro-structure formed of black.
Micro-some composition coding unit on several wherein adjacent little modules, the information that the representative of this coding unit is implanted, and, in coding unit, the quantity of micro-point and position can present various permutation and combination, often kind of permutation and combination, can represent a basic symbol, as numeral, character etc., a series of unit then can represent a character string or information.
In addition, the present invention is described except configuration on Free Region or other coding embedding the micro-point of black and white and structure, and such as, symbol, the mark such as geometric configuration also belongs in the scope that the present invention protects.
Step S130: by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, form secure two-dimensional code.
Particularly, by orthogonal (or shadow tone) modulation technique, and I, Q orthogonal modulation technique, the modulation of shadow tone orthogonal vector is carried out to image in 2 D code, realizes modulates information and vast capacity modulates information.The implantable data being equivalent to its two-dimensional code data total amount 10 to 1000 times in ordinary two dimensional code, to form secure two-dimensional code, as shown in Figure 7.
As shown in Figure 2, in a preferred embodiment, in above-mentioned steps S120: form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof specifically comprise:
Step S121: obtain implantation information, wherein, described implantation information is third dimension text message.Data storage areas in the corresponding ordinary two dimensional code of this third dimension text message or third dimension information space, this third dimension text message can record the identity information such as fingerprint, watermark of Quick Response Code publisher, authenticity annotation is carried out to the information that ordinary two dimensional code is issued, stop other people to copy, thus make ordinary two dimensional code become secure two-dimensional code.
Step S122: described implantation information is converted to the third dimension and implants information coding.Usual implantation message identification is word or character string, this word or character string is converted to N number of 1 or 0 message code represented, so that by this implantation Information Embedding or be embedded in ordinary two dimensional code.
Step S123: choose the described third dimension and implant information coding, with the micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the mapping ruler corresponding to structure that is made up of relative position thereof.
Such as, in the coding table of comparisons, store many group micro-points of black and by the micro-structure formed of black, and, white micro-point and by the micro-structure formed of white.Often kind of mapping ruler represent one group of micro-point of white quantity and by the micro-structure formed that distributes of white, and the quantity of the micro-point of black and the structure that is made up of the micro-distribution of black thereof.
For ensureing the uniqueness of secure two-dimensional code, in the secure two-dimensional code of each generation, the micro-point of black is not identical with the micro-point of white minute other mapping ruler and quantity in little module, but in same secure two-dimensional code, in all little modules, the distribution rule of the micro-point of black and quantity are identical, the corresponding micro-point of institute's adularescent and by micro-structure form of white, divides other regular and quantity to be also identical in little module.
Step S124: the structure configuring the micro-point of described white according to described mapping ruler and be made up of relative position in each described black module, and, the structure each described white module configuring the micro-point of described black and is made up of relative position.In step S123, choose the micro-point of black in current little module in data storage areas, and after the mapping ruler of the micro-point of white and quantity, micro-for black point and the micro-point of white are configured respectively or are implanted on each self-corresponding little module.Now, the making of the micro-point of black to be implanted and the micro-point of white is completed.Afterwards, perform abovementioned steps S130, by micro-for black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, to form the step of secure two-dimensional code.
In addition, for ensureing security and the antifalsification of implantation information further, at above-mentioned steps S122: described implantation information is converted to after the third dimension implants information coding and also comprises:
Step S1221: information coding is implanted to the described third dimension and is encrypted.Such as, implant information coding by special algorithm to the third dimension to be encrypted.It should be noted that, generally, third dimension space encoding is generally underground, therefore can carry out multi-enciphering, and then the information privacy that can realize under naked state and safety.
Step S1222: choose with described encryption after the third dimension implant mapping ruler corresponding to information coding.Can be particularly, choose by computer random, or the mapping ruler of artificial setting current safety Quick Response Code, and according to this locating rule, the third dimension after encryption is implanted the configuration that information coding carries out black color dots position and white point position, namely choose one group of micro-point of black quantity and by the micro-structure formed of these black, and the quantity of the micro-point of white and by these white micro-structure formed.
Step S1223: described in computing machine or system storage with encryption after the third dimension implants mapping ruler corresponding to information coding, so that search or resolve the third dimension implantation information coding of current safety Quick Response Code, to obtain implantation information.
In the present embodiment, being encrypted by implanting information coding to the third dimension, adding the complicacy implanting information coding, further increasing the difficulty understood or decode information coding, improve antifalsification and the security of secure two-dimensional code.
In addition, in above-mentioned steps S120: in the module of Quick Response Code coding, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and be made up of relative position structure time, also comprise: redundancy process is carried out to the pre-implantation information implanted.
Be specially: the mapping ruler according to the micro-point of the black of described selection, white micro-point configures at least one group of third dimension information coding on described data storage areas, wherein, each group third dimension information coding is by the micro-point of a series of black or white micro-point and the Structure composing that is made up of relative position thereof.Because the free space (data storage areas) of ordinary two dimensional code is more, therefore, the methods such as verification, compensation can be adopted on free space, mistake is there is when making or edit to prevent single one group of implantation message identification, or there is error, cause the implantation message identification of None-identified or reading secure two-dimensional code.Therefore, the free space of ordinary two dimensional code arranges redundancy, prevent single implantation message identification None-identified, and affect identification and the use of secure two-dimensional code.
A kind of secure two-dimensional code method for making that the embodiment of the present invention provides, the structure data storage areas of common Quick Response Code configuring black, white micro-point and is made up of relative position, and this to be put slightly and structure is implanted on the data storage areas of Quick Response Code, form secure two-dimensional code.This secure two-dimensional code is in modulates information, Image Coding, printout and image acquisition, demodulates information and information extraction; the modulation of Application of composite present information and the multinomial advanced technology such as information coding, information security and digital code anti-false, shadow tone vector screening; achieve the dimension expansion of Quick Response Code storage space; and complete compatible original ordinary two dimensional code; solve ordinary two dimensional code and not there is the defect such as security and anti-copying, intellectual property protection, article authentication, false proof that much information service system such as to trace to the source can be widely used in.
In a specific embodiment, as shown in Figure 3, the process flow diagram of another the secure two-dimensional code method for making provided for the embodiment of the present invention.The method is specially:
Step 201: be embedded into by the text message of Quick Response Code in ordinary two dimensional code (for QR code), generates ordinary two dimensional code figure (step 202).
Step 101: select the pre-third dimension text message implanting ordinary two dimensional code, such as, the content of this third dimension text message is: " National Industrial and Commercial Bank of China ".Step 102: the parameter configuration device in system or processor selection or a configuration parameter are in third dimension text message, 3rd text message conversion is generated third dimension information coding (step 103), such as, configuration is " 1 " to the configuration parameter of described third dimension text message, character corresponding to described " National Industrial and Commercial Bank of China " is respectively " ABCDEF ", then the third dimension information coding generated for " 1; ABCDEF ".Third dimension information coding in step 104 pair step 103 carries out cipher key, namely selects one or more encryption rules to " 1; ABCDEF " be encrypted, the information generated after encryption is " 2UVWXYZ " (step 105); Then, the conversion of step 106 character code is performed, such as, according to certain rule, " 2, U, V; W, X, Y; Z " corresponding is respectively " 01,000,001; 010,011,100; 101,110 " with binary coding, then " 2UVWXYZ " is converted to the expression formula of the binary numeral only comprising 0 or 1 for " 01000001010011100101110 ".Step 107, carries out information Error Control to the character code generated in step 106, namely checks that whether binary expression formula is correct.If the binary number value expression after conversion is correct, then perform step 108, configuration mapping ruler; Otherwise re-execute step 106.The mapping ruler that processor selection in system configures well, the i.e. quantity of black color dots position and the distribution rule of black color dots position on little module of current quantity, with the quantity of white point position and the white point position of current quantity after the distribution rule on little module, micro-for the black and white configured point and the structure that is made up of relative position thereof are implanted on the little module of Quick Response Code coding in data storage areas, i.e. step 109: frame address maps.Wherein, step 109 is comprised and being copied by the micro-point of black and white micro-some mapping ruler by least one binary number value expression " 01000001010011100101110 ", and does redundancy process.
Step 301: the frame address maps that the ordinary two dimensional code figure generated in step 202 and step 109 generate is modulated through shadow tone site, adopt I, Q orthogonal modulation technique, carries out the modulation of shadow tone orthogonal vector to image in 2 D code, generates secure two-dimensional code (step 302).That is, the implicit enciphered message of " National Industrial and Commercial Bank of China " is comprised in this secure two-dimensional code of generation.
The present embodiment is in Quick Response Code planar range, normally represent outside symbol ability at Quick Response Code, utilize the micro-space of Quick Response Code, open up the free memory made new advances in addition, be i.e. the Free Region of Quick Response Code, and will identification information be implanted, as product coding, network reference address etc. are implanted in this free memory, realize the expansion to ordinary two dimensional code storage capacity, form third dimension storage space, comparatively ordinary two dimensional code, improves antifalsification and security.In addition, this secure two-dimensional code, owing to being carry out editing and configuration information at the third dimension storage space of free time, therefore, does not affect the recognition of former ordinary two dimensional code information.
The present invention also discloses a kind of secure two-dimensional code coding/decoding method, and corresponding to a kind of secure two-dimensional code method for making in previous embodiment, as shown in Figure 4, described coding/decoding method comprises:
Step S210: be separated secure two-dimensional code, obtains and the micro-point of black corresponding to described secure two-dimensional code and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof.
Wherein, be separated secure two-dimensional code and obtain ordinary two dimensional code, the micro-point of several black and by the micro-structure formed of these black, and several white micro-points and by these white micro-structures formed.Described step S210 is by device scan secure two-dimensional code, adopt certain position and image definition to differentiate that scheduling algorithm is separated, realize the micro-point resolution collection of secure two-dimensional code, image rectification and information extraction, demodulates information, information EDC error detect correction and decrypts information process.Step S130 in this step and previous embodiment implants the micro-point of black, white micro-point and reciprocal by the consitutional operation of relative position.
Step S220: to the micro-point of described black and the structure that is made up of relative position thereof, and the micro-point of described white and the structure that is made up of relative position thereof are resolved, and obtain mapping ruler.According to the micro-point of black of separation, the quantity of white micro-point and the some position regularity of distribution, screening and the mapping ruler corresponding to it, the step S123 of this step S220 correspondence and previous embodiment.
Step S230: according to resolved mapping ruler by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the cooperating measure that is made up of relative position thereof are that the third dimension implants information coding.By resolving the mapping ruler of black, white point position, micro-for black in secure two-dimensional code point or white micro-point are converted to the third dimension and implant information coding, the wherein said third dimension is implanted information coding and is combined according to certain mapping ruler by the micro-point of a string black or white micro-point and the structure that is made up of relative position thereof, and the described third dimension implants information coding can be expressed as a basic symbol, as numeral, character etc., or represent an expression character string etc.
Step S240: implant the third dimension text message corresponding to information coding according to the acquisition of described third dimension implantation information coding and this third dimension.
Translate described third dimension implantation information coding and obtain third dimension text message, obtain the implantation information of user.Translate each described character string respectively, obtain and the third dimension text message corresponding to described each character string.Wherein, by address maps Static-state Space vector algorithm, arrange and quote version information and cipher key index information, realize the correct acquisition to third dimension spatial information, parsing and the meaning of one's words and understand.
The present embodiment achieves the decoding to secure two-dimensional code by step S210 to step S240, obtain the third dimension text message in secure two-dimensional code or implantation information, and can by the third dimension text message of deciphering and the text message pre-set be compared, judge that whether the information source of this secure two-dimensional code is identical with implantation text message, if two groups identical, then illustrate it is same information source, and then corresponding to article or the information security of this secure two-dimensional code, more common Quick Response Code is safer and reliable.
In above-mentioned steps S240, as shown in Figure 5, in step S240, implant according to the described third dimension third dimension text message that information coding obtains and this third dimension is implanted corresponding to information coding and comprise:
Step S241: information coding is implanted to the described third dimension and verifies, reject mistake, or reduction is compensated to missing information, generates the third dimension and implant message code, implant the third dimension text message corresponding to information password with this third dimension guaranteeing correctly to parse.Usually, verify or detect the third dimension by computer program and whether correctly to implant information coding, and whether detection third dimension implantation message code lacks, or omit.
Step S242: resolve the described third dimension and implant message code, obtain described third dimension text message.
In addition, also comprise in step S241: judge whether the length of the third dimension implantation message code of current parse exceedes preset length, and wherein, described preset length is the code length that user implants information.If the length that the third dimension of current parse implants message code exceedes code implant length, message code is implanted to this third dimension and resolves into two or more character strings.Usually, it is longer that the third dimension of being resolved by mapping ruler implants information coding, and the information of expression is more, and direct parsing can expend time in, and easily makes mistakes, and therefore, first the third dimension is implanted message code and carries out segmentation fractionation.Wherein, can split according to the length implanting message code, such as code implant length is 8, the code of length more than 8, splits according to every 8 one group, to improve the efficiency and accuracy of resolving coding.
In another preferred embodiment, described method can also be used to whether the decoded Quick Response Code of inspection is secure two-dimensional code.Step comprises particularly:
Step S211: obtain a Quick Response Code by specific scanning device.
Step S212: whether the Quick Response Code judging described acquisition is secure two-dimensional code; Namely judge in the Quick Response Code that scans, whether to be isolated a common Quick Response Code, the micro-point of black and the structure be made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and whether meet default mapping ruler by the structure of resolving this and slightly put and being made up of relative position.
If be separated described Quick Response Code, can obtain and the micro-point of the black corresponding to described Quick Response Code and the structure that is made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and meet mapping ruler, then this Quick Response Code is secure two-dimensional code.Continue to perform step S210 to step S230.Otherwise this Quick Response Code is non-security Quick Response Code.
In addition, also comprise after step S240: judge whether described secure two-dimensional code is true.
Be specially: judge whether the third dimension text message parsed matches with the information of the ordinary two dimensional code separated from described secure two-dimensional code, namely whether third dimension text message is identical with the information implanted in advance, if described third dimension text message is identical with implantation information in advance, then prove that described third dimension text message is identical with the issue object of the information of implantation.Such as, the third dimension text message obtained in secure two-dimensional code is " National Industrial and Commercial Bank of China ", and implants text message for " Agricutural Bank of China ", and the content of text messages that both understand is different, and therefore, this is false by the secure two-dimensional code understood.If two groups of text messages understood are identical, then illustrate that the secure two-dimensional code of this scanning is true.
A kind of secure two-dimensional code coding/decoding method that the present embodiment provides, by the separation of secure two-dimensional code and parsing, obtains the third dimension text message of its representative, and then judges the true and false of secure two-dimensional code by this third dimension text message.Owing to containing third dimension text message in secure two-dimensional code, text information implants information coding by the special third dimension to be translated into, therefore, can not because of copying or the mode such as scanning and obtain the third dimension text message that secure two-dimensional code hides, so than the security of ordinary two dimensional code and antifalsification higher.
In a specific embodiment, as shown in Figure 6, be the particular flow sheet of a kind of secure two-dimensional code decoding that the present embodiment provides, corresponding to the secure two-dimensional code Making programme of accompanying drawing 3, the concrete steps of decoding are as follows:
Step 3001: obtain a secure two-dimensional code, wherein, before any one Quick Response Code of acquisition, also need first to judge whether this Quick Response Code is secure two-dimensional code, be specially: by identifying that the equipment of secure two-dimensional code scans any one Quick Response Code, if can obtain having the micro-point of black of certain mapping ruler after scanning in the data storage areas of detected Quick Response Code, the micro-point of white and the structure be made up of relative position thereof, and the mapping ruler of resolving belongs to the one of the multiple mapping ruler stored in database, then prove that the Quick Response Code of this detection is secure two-dimensional code.Then this secure two-dimensional code is carried out separation to resolve, obtain a common Quick Response Code 2001, and with the graphical information of black color dots position, the distribution of white point position.
Step 2002: resolve ordinary two dimensional code, obtains the Quick Response Code text message on ordinary two dimensional code, and specifically by mobile phone A PP, the equipment such as scanner obtain this Quick Response Code text message.
Step 1001: the configuration parameter obtaining separated secure two-dimensional code figure.Wherein, the micro-point of black and the distribution rule corresponding to the micro-point of white in each little module that described configuration parameter refers to Quick Response Code, these distribution rules obtain by configuration parameter, therefore, the distribution rule corresponding to black-white point is found in distribution, and quantity is can obtain the mapping (step 1002) of frame address, this step corresponding with an aforementioned embodiment in generate step 109 in secure two-dimensional code, a series of coded strings be made up of binary code 1/0 can be obtained by address maps, such as this coded strings obtained after step 1002 is " 01000001010011100101110 ", then step 1003 is performed, information Error Control, whether the coded strings namely in checking procedure 1002 is correct, mode specifically by comparison or calculating judges that whether coded strings is wrong, if check errorless, then perform step 1004, otherwise, jump to step 1001, again resolve secure two-dimensional code.Step 1004: coded character is changed, and converts character string to, such as, convert coded strings " 01000001010011100101110 " to " 2UVWXYZ " character string by coded strings.It should be noted that, under normal circumstances, for ensureing the information security hidden in secure two-dimensional code, generally in making secure two-dimensional code, can be encrypted to each character string, therefore, before the content of character string is resolved, first to be decrypted this character string, i.e. step 1005: obtain cipher key.Due to the cryptographic algorithm that different coded strings is corresponding different, therefore, need to find the index of encryption to decode.Step 1006, decodes to character string after finding cipher key index.Such as, to generating new character string after character string " 2UVWXYZ " deciphering for " 1ABCDEF ", preferably, can be numeral, letter, symbol or above several combination in described character string.Step 1007: decompose third dimension information.Wherein said third dimension information refers to the character string on the free space being stored in ordinary two dimensional code, or message identification.Normally, the information that will carry due to character string is more, so the character string after deciphering generally all can be very long.Such as, described new character string " 1ABCDEF " be decomposed into " 1 " and " ABCDEF ", concrete decomposition rule can designed, designed as required.Step 1008: understand the implication often organizing character string after decomposing, obtain third dimension text message.Such as, the implication that " ABCDEF " represents in the present embodiment is " National Industrial and Commercial Bank of China ", and " 1 " represents this bank's sequence number.The third dimension text message that user can be read out by solution, the i.e. National Industrial and Commercial Bank of China and its sequence number, and then judge the information that this secure two-dimensional code carries or the true and false of commodity, and then more common Quick Response Code, security and the antifalsification of this secure two-dimensional code are higher.
A secure two-dimensional code mark, is applied to a kind of secure two-dimensional code method for making of previous embodiment, and as shown in Figure 8, this secure two-dimensional code mark comprises: secure two-dimensional code and printing mark, wherein, described secure two-dimensional code is printed on described printing mark.
A kind of secure two-dimensional code mark that present invention also offers, by being arranged on printing mark by having the secure two-dimensional code implanting message identification, form secure two-dimensional code mark, this secure two-dimensional code is identified and can paste or be applied in much information service system.In addition, this secure two-dimensional code mark also can be added unique identification or the trade mark of user, further increasing application and the antifalsification of secure two-dimensional code.
In addition, a kind of secure two-dimensional code method for making provided by the invention, coding/decoding method and secure two-dimensional code mark also has following beneficial effect:
1, safety, anti-copying, false proof anti-channeling, attack resistance.
2, off-line can be realized and differentiate that there is non repudiation.
3, safe multidimensional code can be generated based on any Quick Response Code, as DM, PDF417 etc.
4, be widely used, the secure two-dimensional code that the embodiment of the present invention provides or secure two-dimensional code mark can directly use, for recording circulation and transfer of goods information etc. under electronic edition form." one yard of multiple-effect " facilitates the Design and implementation of marketing program, in addition, can also expand code and do false proof link of tracing to the source.
5, can analog RF ID identification function.Using ordinary two dimensional code as product coding, coding can be expanded and encodes as chip.
6, change digital code anti-false and inquire about traditional discriminant approach, not to inquire about as differentiating true and false foundation first, differentiating true and false to expand coded message, avoiding fake products true code head to look into as genuine embarrassment.In addition, the secure two-dimensional code during the present embodiment provides secure two-dimensional code to identify does not need to hide, and does not need to scrape checking off yet.
7, entrance link is convenient: if consumer-user scans multidimensional code, then directly enter marketing link; If supvr's scanning input multidimensional code, then directly enter management link, and then can reduce marketing management cost, reduce marketing management personnel and time input
8, " one yard of multiple-effect " saves mark area, alternative uncovering label, reduces mark cost, can arbitrary number of times inquire about, and does not affect true and false character and judges.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
The above is only the specific embodiment of the present invention, those skilled in the art is understood or realizes the present invention.To be apparent to one skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. a secure two-dimensional code method for making, is characterized in that, described method comprises:
Obtain the data storage areas of Quick Response Code;
Form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
By micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, form secure two-dimensional code.
2. method according to claim 1, is characterized in that, the module of described Quick Response Code coding comprises at least one black module and at least one white module;
The micro-point of described configuration black and the structure be made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof, comprising:
The structure each described black module configuring the micro-point of described white and is made up of relative position, with, the structure each described white module configuring the micro-point of described black and is made up of relative position, wherein, the size of the micro-point of described white is less than the size of described black module, and the size of the micro-point of described black is less than the size of described white module.
3. method according to claim 2, it is characterized in that, the structure each described black module configuring the micro-point of described white and is made up of relative position, and, the structure each described white module configuring the micro-point of described black and is made up of relative position, comprising:
Obtain implantation information, wherein, described implantation information comprises third dimension text message;
Described implantation information is converted to the third dimension and implants information coding;
Choose the described third dimension and implant information coding, with the micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the mapping ruler corresponding to structure that is made up of relative position thereof;
According to the structure that described mapping ruler configures the micro-point of described white and is made up of relative position in each described black module, and, the structure each described white module configuring the micro-point of described black and is made up of relative position.
4. method according to claim 3, is characterized in that, described implantation information is converted to after the third dimension implants information coding and also comprises:
Implant information coding to the described third dimension to be encrypted;
Choose with described encryption after the third dimension implant mapping ruler corresponding to information coding;
The third dimension stored after described and encryption implants the mapping ruler corresponding to information coding.
5. the method according to any one of claim 1-4, is characterized in that, the data storage areas of described acquisition Quick Response Code comprises:
Obtain the coding rule of any one Quick Response Code;
Obtain the data storage areas of this Quick Response Code according to the coding rule of described Quick Response Code, wherein, described data storage areas is for storing user data.
6. a secure two-dimensional code coding/decoding method, be applied to the secure two-dimensional code described in any one of claim 1 to 5, it is characterized in that, described method comprises:
Secure two-dimensional code is separated, obtains and the micro-point of black corresponding to described secure two-dimensional code and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
To the micro-point of described black and the structure that is made up of relative position thereof, and the micro-point of described white and the structure that is made up of relative position thereof are resolved, and obtain mapping ruler;
According to described mapping ruler by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the cooperating measure that is made up of relative position thereof are that the third dimension implants information coding;
The third dimension text message corresponding to information coding is implanted according to the acquisition of described third dimension implantation information coding and this third dimension.
7. method according to claim 6, is characterized in that, obtains the third dimension text message implanted corresponding to information coding with this third dimension and comprises:
Implant information coding to the described third dimension to verify, reject mistake, or reduction is compensated to missing information, generate the third dimension and implant message code;
Resolve the described third dimension and implant message code, obtain described third dimension text message.
8. the method according to claim 6 or 7, is characterized in that, described method also comprises:
Judge whether a Quick Response Code is secure two-dimensional code;
If be separated described Quick Response Code, can obtain and the micro-point of the black corresponding to described Quick Response Code and the structure that is made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and meet mapping ruler, then this Quick Response Code is secure two-dimensional code.
9. the method according to claim 6 or 7, is characterized in that, described method also comprises:
Judge whether described secure two-dimensional code is true;
If the information match of described third dimension text message and the ordinary two dimensional code separated from described secure two-dimensional code, then described secure two-dimensional code is true; Otherwise described secure two-dimensional code is false.
10. a secure two-dimensional code mark, be applied to the secure two-dimensional code adopting the method described in any one of claim 1 to 5 to make, it is characterized in that, described secure two-dimensional code mark comprises: secure two-dimensional code and printing mark, wherein, described secure two-dimensional code is printed on described printing mark.
CN201610060527.2A 2016-01-28 2016-01-28 Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier Active CN105550730B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610060527.2A CN105550730B (en) 2016-01-28 2016-01-28 Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610060527.2A CN105550730B (en) 2016-01-28 2016-01-28 Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier

Publications (2)

Publication Number Publication Date
CN105550730A true CN105550730A (en) 2016-05-04
CN105550730B CN105550730B (en) 2017-02-08

Family

ID=55829913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610060527.2A Active CN105550730B (en) 2016-01-28 2016-01-28 Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier

Country Status (1)

Country Link
CN (1) CN105550730B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384143A (en) * 2016-09-20 2017-02-08 北京兆信信息技术股份有限公司 Dynamic electronic two-dimensional code generation and recognition method
CN107578079A (en) * 2017-09-18 2018-01-12 臧戈平 A kind of method for anti-counterfeit that high-fidelity is carried out in information code region and hides figure
CN107832824A (en) * 2017-11-28 2018-03-23 广州真知码信息科技有限公司 It is a kind of to show the method, system and device and Method of printing for closing source Quick Response Code
CN108229627A (en) * 2017-12-25 2018-06-29 刘世洪 Agricultural product quality and safety whole process is traced to the source space-time hybrid coding and coding method
CN110009080A (en) * 2018-02-07 2019-07-12 安讯奔有限责任公司 Two-dimensional code generation method, verification method, server and two dimensional code
CN110222800A (en) * 2019-04-30 2019-09-10 浙江大学 A kind of two-dimension code anti-counterfeit mark image and its recognition methods based on dot matrix
WO2021022501A1 (en) * 2019-08-07 2021-02-11 罗伯特·博世有限公司 Anti-counterfeiting product having random microdot characteristics, and manufacturing method and verification method therefor

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN104715275A (en) * 2015-04-02 2015-06-17 矽照光电(厦门)有限公司 Generating method and generating device for grey two-dimensional code
CN104778489A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Combined anti-counterfeit label, and generation method and generation device of combined anti-counterfeit label

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN104778489A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Combined anti-counterfeit label, and generation method and generation device of combined anti-counterfeit label
CN104715275A (en) * 2015-04-02 2015-06-17 矽照光电(厦门)有限公司 Generating method and generating device for grey two-dimensional code

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384143A (en) * 2016-09-20 2017-02-08 北京兆信信息技术股份有限公司 Dynamic electronic two-dimensional code generation and recognition method
CN106384143B (en) * 2016-09-20 2020-03-17 北京兆信信息技术股份有限公司 Dynamic electronic two-dimensional code generation method and identification method
CN107578079A (en) * 2017-09-18 2018-01-12 臧戈平 A kind of method for anti-counterfeit that high-fidelity is carried out in information code region and hides figure
CN107578079B (en) * 2017-09-18 2020-04-21 臧戈平 Anti-counterfeiting method for high-fidelity hidden picture in information code area
CN107832824A (en) * 2017-11-28 2018-03-23 广州真知码信息科技有限公司 It is a kind of to show the method, system and device and Method of printing for closing source Quick Response Code
CN108229627A (en) * 2017-12-25 2018-06-29 刘世洪 Agricultural product quality and safety whole process is traced to the source space-time hybrid coding and coding method
CN110009080A (en) * 2018-02-07 2019-07-12 安讯奔有限责任公司 Two-dimensional code generation method, verification method, server and two dimensional code
CN110222800A (en) * 2019-04-30 2019-09-10 浙江大学 A kind of two-dimension code anti-counterfeit mark image and its recognition methods based on dot matrix
WO2021022501A1 (en) * 2019-08-07 2021-02-11 罗伯特·博世有限公司 Anti-counterfeiting product having random microdot characteristics, and manufacturing method and verification method therefor

Also Published As

Publication number Publication date
CN105550730B (en) 2017-02-08

Similar Documents

Publication Publication Date Title
CN105550730A (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
US6871789B2 (en) Document printed with graphical symbols which encode information
CN103761799B (en) A kind of bill anti-counterfeit method based on texture image feature and device
CN105706107A (en) Two dimensional barcode and method of authentication of such barcode
CN102194137A (en) Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN103310344B (en) CCQR (Colorful Coded Quick Response) anti-counterfeiting method
US7107453B2 (en) Authenticatable graphical bar codes
CN102225671A (en) Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
US20200074130A1 (en) Item identification
US9934457B2 (en) Method of securing a two-dimensional barcode
JP2020516092A (en) Composite two-dimensional barcode, electronic certificate medium, generation, reading device and method
US9064138B2 (en) Method for detecting reorgination of barcodes
Villán et al. Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods
CN102999771B (en) Commodity anti-counterfeiting code construction and verification method
CN109299763B (en) Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain
CN108875870B (en) Method and system for creating and authenticating binary graphic code
Teraura et al. Implementation of digital signature on QR symbol by area division using rhombic sub-cells
CN102013208A (en) Anti-counterfeit method and product of bar code and safety line
CN110335189A (en) Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information
CN109325568A (en) Anti-fake two-dimension code and its modulation encryption method and identifying system
Teraura et al. A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells
CN111428532A (en) Encryptable three-dimensional code and encoding and decoding method
CN109754037A (en) A kind of one yard of commodity counterfeit prevention of an object and traceability system based on digital watermarking two dimensional code
AU2002229923B2 (en) Document printed with graphical symbols which encode information

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
C14 Grant of patent or utility model
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier

Effective date of registration: 20190704

Granted publication date: 20170208

Pledgee: Beijing first financing Company limited by guarantee

Pledgor: Beijing Pan-pass Info Tech Co., Ltd.

Registration number: 2019990000659

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20210601

Granted publication date: 20170208

Pledgee: Beijing first financing Company limited by guarantee

Pledgor: BEIJING PANPASS INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2019990000659

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: The invention relates to a safe two-dimensional code making method, a decoding method and a safe two-dimensional code identification

Effective date of registration: 20210707

Granted publication date: 20170208

Pledgee: Beijing first financing Company limited by guarantee

Pledgor: BEIJING PANPASS INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2021990000588

PE01 Entry into force of the registration of the contract for pledge of patent right