Summary of the invention
A kind of secure two-dimensional code method for making, coding/decoding method and secure two-dimensional code mark is provided, to solve the low problem of two-dimension code safe of the prior art in the embodiment of the present invention.
In order to solve the problems of the technologies described above, the embodiment of the invention discloses following technical scheme:
A kind of secure two-dimensional code method for making, described method comprises:
Obtain the data storage areas of Quick Response Code;
Form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
By micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, form secure two-dimensional code.
Preferably, the module that described Quick Response Code is encoded comprises at least one black module and at least one white module;
The micro-point of described configuration black and the structure be made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof, comprising:
The structure each described black module configuring the micro-point of described white and is made up of relative position, with, the structure each described white module configuring the micro-point of described black and is made up of relative position, wherein, the size of the micro-point of described white is less than the size of described black module, and the size of the micro-point of described black is less than the size of described white module.
Preferably, the structure each described black module configuring the micro-point of described white and is made up of relative position, and the structure configuring the micro-point of described black and be made up of relative position in each described white module, comprising:
Obtain implantation information, wherein, described implantation information comprises third dimension text message;
Described implantation information is converted to the third dimension and implants information coding;
Choose the described third dimension and implant information coding, with the micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the mapping ruler corresponding to structure that is made up of relative position thereof;
According to the structure that described mapping ruler configures the micro-point of described white and is made up of relative position in each described black module, and, the structure each described white module configuring the micro-point of described black and is made up of relative position.
Preferably, described implantation information is converted to after the third dimension implants information coding and also comprises:
Implant information coding to the described third dimension to be encrypted;
Choose with described encryption after the third dimension implant mapping ruler corresponding to information coding;
The third dimension stored after described and encryption implants the mapping ruler corresponding to information coding.
Preferably, the data storage areas of described acquisition Quick Response Code comprises:
Obtain the coding rule of any one Quick Response Code;
Obtain the data storage areas of this Quick Response Code according to the coding rule of described Quick Response Code, wherein, described data storage areas is for storing user data.
A kind of secure two-dimensional code coding/decoding method, described method comprises:
Secure two-dimensional code is separated, obtains and the micro-point of black corresponding to described secure two-dimensional code and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof;
To the micro-point of described black and the structure that is made up of relative position thereof, and the micro-point of described white and the structure that is made up of relative position thereof are resolved, and obtain mapping ruler;
According to described mapping ruler by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the cooperating measure that is made up of relative position thereof are that the third dimension implants information coding;
The third dimension text message corresponding to information coding is implanted according to the acquisition of described third dimension implantation information coding and this third dimension.
Preferably, obtain the third dimension text message implanted corresponding to information coding with this third dimension to comprise:
Implant information coding to the described third dimension to verify, reject mistake, or reduction is compensated to missing information, generate the third dimension and implant message code;
Resolve the described third dimension and implant message code, obtain described third dimension text message.
Preferably, described method also comprises:
Judge whether a Quick Response Code is secure two-dimensional code;
If be separated described Quick Response Code, can obtain and the micro-point of the black corresponding to described Quick Response Code and the structure that is made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and meet mapping ruler, then this Quick Response Code is secure two-dimensional code.
Preferably, described method also comprises:
Judge whether described secure two-dimensional code is true;
If the information match of described third dimension text message and the ordinary two dimensional code separated from described secure two-dimensional code, then described secure two-dimensional code is true; Otherwise described secure two-dimensional code is false.
A secure two-dimensional code mark, described secure two-dimensional code mark comprises: secure two-dimensional code and printing mark, wherein, described secure two-dimensional code is printed on described printing mark.
From above technical scheme, a kind of secure two-dimensional code method for making that the embodiment of the present invention provides, the structure data storage areas of common Quick Response Code configuring black, white micro-point and is made up of relative position, and this to be put slightly and structure is implanted on the data storage areas of Quick Response Code, form secure two-dimensional code.This secure two-dimensional code is in modulates information, Image Coding, printout and image acquisition, demodulates information and information extraction; the modulation of Application of composite present information and the multinomial advanced technology such as information coding, information security and digital code anti-false, shadow tone vector screening; achieve the dimension expansion of Quick Response Code storage space; and complete compatible original ordinary two dimensional code; solve ordinary two dimensional code and not there is the defect such as security and anti-copying, intellectual property protection, article authentication, false proof that much information service system such as to trace to the source can be widely used in.
In addition, present invention also offers a kind of secure two-dimensional code coding/decoding method, by the separation of secure two-dimensional code and parsing, obtain the third dimension text message of its representative, and then judge the true and false of secure two-dimensional code by this third dimension text message.Owing to containing third dimension text message in secure two-dimensional code, text information implants information coding by the special third dimension to be translated into, therefore, can not because of copying or the mode such as scanning and obtain the third dimension text message that secure two-dimensional code hides, so than the security of ordinary two dimensional code and antifalsification higher.
A kind of secure two-dimensional code mark that present invention also offers, by being arranged on printing mark by having the secure two-dimensional code implanting message identification, form secure two-dimensional code mark, this secure two-dimensional code is identified and can paste or be applied in much information service system.In addition, this secure two-dimensional code mark also can be added unique identification or the trade mark of user, further increasing application and the antifalsification of secure two-dimensional code.
Embodiment
Technical scheme in the present invention is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
Below in conjunction with Fig. 1 to Fig. 8, a kind of secure two-dimensional code method for making, coding/decoding method and the secure two-dimensional code mark that the embodiment of the present invention provides is specifically described.
See Fig. 1, be the process flow diagram of a kind of secure two-dimensional code method for making that the embodiment of the present invention provides, concrete the method comprises:
Step S110: the data storage areas obtaining Quick Response Code.
Wherein, the data storage areas obtaining Quick Response Code is specially: the Quick Response Code first obtaining any one, the data storage areas of this Quick Response Code is obtained according to the coding rule of this Quick Response Code, such as by searching the instructions of Quick Response Code, or obtained the coding rule of this Quick Response Code by scanning device scanning.Wherein, described data storage areas is the storage of subscriber data region except locating information, system information.For QR code, the region beyond 3 postings, version information and format informations, for storing the region of user data, these regions and data storage areas.
Wherein, represent a coding at the described white micro-point or the micro-point of black and structure thereof often organized, the code set of the micro-point of all described white or the micro-point of black and structure thereof represents implantation information.
Step S120: form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof.
Normally, Quick Response Code forms by the little module that several sizes are identical is regularly arranged, and the gray scale of each lattice is different, presents black and white two kinds of colors.The module of described Quick Response Code coding comprises at least one black module and at least one white module;
Step S120 specifically comprises: the structure configuring the micro-point of described white and be made up of relative position in each described black module, with, the structure each described white module configuring the micro-point of described black and is made up of relative position, wherein, the size of the micro-point of described white is less than the size of described black module, and the size of the micro-point of described black is less than the size of described white module.
Form in the module of Quick Response Code coding in described data storage areas, the position of black little module configures or embeds the micro-point of white with certain structure distribution, namely the structure of white micro-point and the micro-composition of adularescent thereof is configured, with, configuration or embed with the micro-point of black of certain structure distribution on the position of white little module, namely configures the micro-point of black and by the micro-structure formed of black.
Micro-some composition coding unit on several wherein adjacent little modules, the information that the representative of this coding unit is implanted, and, in coding unit, the quantity of micro-point and position can present various permutation and combination, often kind of permutation and combination, can represent a basic symbol, as numeral, character etc., a series of unit then can represent a character string or information.
In addition, the present invention is described except configuration on Free Region or other coding embedding the micro-point of black and white and structure, and such as, symbol, the mark such as geometric configuration also belongs in the scope that the present invention protects.
Step S130: by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, form secure two-dimensional code.
Particularly, by orthogonal (or shadow tone) modulation technique, and I, Q orthogonal modulation technique, the modulation of shadow tone orthogonal vector is carried out to image in 2 D code, realizes modulates information and vast capacity modulates information.The implantable data being equivalent to its two-dimensional code data total amount 10 to 1000 times in ordinary two dimensional code, to form secure two-dimensional code, as shown in Figure 7.
As shown in Figure 2, in a preferred embodiment, in above-mentioned steps S120: form in the module of Quick Response Code coding in described data storage areas, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof specifically comprise:
Step S121: obtain implantation information, wherein, described implantation information is third dimension text message.Data storage areas in the corresponding ordinary two dimensional code of this third dimension text message or third dimension information space, this third dimension text message can record the identity information such as fingerprint, watermark of Quick Response Code publisher, authenticity annotation is carried out to the information that ordinary two dimensional code is issued, stop other people to copy, thus make ordinary two dimensional code become secure two-dimensional code.
Step S122: described implantation information is converted to the third dimension and implants information coding.Usual implantation message identification is word or character string, this word or character string is converted to N number of 1 or 0 message code represented, so that by this implantation Information Embedding or be embedded in ordinary two dimensional code.
Step S123: choose the described third dimension and implant information coding, with the micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and the mapping ruler corresponding to structure that is made up of relative position thereof.
Such as, in the coding table of comparisons, store many group micro-points of black and by the micro-structure formed of black, and, white micro-point and by the micro-structure formed of white.Often kind of mapping ruler represent one group of micro-point of white quantity and by the micro-structure formed that distributes of white, and the quantity of the micro-point of black and the structure that is made up of the micro-distribution of black thereof.
For ensureing the uniqueness of secure two-dimensional code, in the secure two-dimensional code of each generation, the micro-point of black is not identical with the micro-point of white minute other mapping ruler and quantity in little module, but in same secure two-dimensional code, in all little modules, the distribution rule of the micro-point of black and quantity are identical, the corresponding micro-point of institute's adularescent and by micro-structure form of white, divides other regular and quantity to be also identical in little module.
Step S124: the structure configuring the micro-point of described white according to described mapping ruler and be made up of relative position in each described black module, and, the structure each described white module configuring the micro-point of described black and is made up of relative position.In step S123, choose the micro-point of black in current little module in data storage areas, and after the mapping ruler of the micro-point of white and quantity, micro-for black point and the micro-point of white are configured respectively or are implanted on each self-corresponding little module.Now, the making of the micro-point of black to be implanted and the micro-point of white is completed.Afterwards, perform abovementioned steps S130, by micro-for black point and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof are implanted on the data storage areas of described Quick Response Code, to form the step of secure two-dimensional code.
In addition, for ensureing security and the antifalsification of implantation information further, at above-mentioned steps S122: described implantation information is converted to after the third dimension implants information coding and also comprises:
Step S1221: information coding is implanted to the described third dimension and is encrypted.Such as, implant information coding by special algorithm to the third dimension to be encrypted.It should be noted that, generally, third dimension space encoding is generally underground, therefore can carry out multi-enciphering, and then the information privacy that can realize under naked state and safety.
Step S1222: choose with described encryption after the third dimension implant mapping ruler corresponding to information coding.Can be particularly, choose by computer random, or the mapping ruler of artificial setting current safety Quick Response Code, and according to this locating rule, the third dimension after encryption is implanted the configuration that information coding carries out black color dots position and white point position, namely choose one group of micro-point of black quantity and by the micro-structure formed of these black, and the quantity of the micro-point of white and by these white micro-structure formed.
Step S1223: described in computing machine or system storage with encryption after the third dimension implants mapping ruler corresponding to information coding, so that search or resolve the third dimension implantation information coding of current safety Quick Response Code, to obtain implantation information.
In the present embodiment, being encrypted by implanting information coding to the third dimension, adding the complicacy implanting information coding, further increasing the difficulty understood or decode information coding, improve antifalsification and the security of secure two-dimensional code.
In addition, in above-mentioned steps S120: in the module of Quick Response Code coding, the configuration micro-point of black and the structure that is made up of relative position thereof, and the micro-point of white and be made up of relative position structure time, also comprise: redundancy process is carried out to the pre-implantation information implanted.
Be specially: the mapping ruler according to the micro-point of the black of described selection, white micro-point configures at least one group of third dimension information coding on described data storage areas, wherein, each group third dimension information coding is by the micro-point of a series of black or white micro-point and the Structure composing that is made up of relative position thereof.Because the free space (data storage areas) of ordinary two dimensional code is more, therefore, the methods such as verification, compensation can be adopted on free space, mistake is there is when making or edit to prevent single one group of implantation message identification, or there is error, cause the implantation message identification of None-identified or reading secure two-dimensional code.Therefore, the free space of ordinary two dimensional code arranges redundancy, prevent single implantation message identification None-identified, and affect identification and the use of secure two-dimensional code.
A kind of secure two-dimensional code method for making that the embodiment of the present invention provides, the structure data storage areas of common Quick Response Code configuring black, white micro-point and is made up of relative position, and this to be put slightly and structure is implanted on the data storage areas of Quick Response Code, form secure two-dimensional code.This secure two-dimensional code is in modulates information, Image Coding, printout and image acquisition, demodulates information and information extraction; the modulation of Application of composite present information and the multinomial advanced technology such as information coding, information security and digital code anti-false, shadow tone vector screening; achieve the dimension expansion of Quick Response Code storage space; and complete compatible original ordinary two dimensional code; solve ordinary two dimensional code and not there is the defect such as security and anti-copying, intellectual property protection, article authentication, false proof that much information service system such as to trace to the source can be widely used in.
In a specific embodiment, as shown in Figure 3, the process flow diagram of another the secure two-dimensional code method for making provided for the embodiment of the present invention.The method is specially:
Step 201: be embedded into by the text message of Quick Response Code in ordinary two dimensional code (for QR code), generates ordinary two dimensional code figure (step 202).
Step 101: select the pre-third dimension text message implanting ordinary two dimensional code, such as, the content of this third dimension text message is: " National Industrial and Commercial Bank of China ".Step 102: the parameter configuration device in system or processor selection or a configuration parameter are in third dimension text message, 3rd text message conversion is generated third dimension information coding (step 103), such as, configuration is " 1 " to the configuration parameter of described third dimension text message, character corresponding to described " National Industrial and Commercial Bank of China " is respectively " ABCDEF ", then the third dimension information coding generated for " 1; ABCDEF ".Third dimension information coding in step 104 pair step 103 carries out cipher key, namely selects one or more encryption rules to " 1; ABCDEF " be encrypted, the information generated after encryption is " 2UVWXYZ " (step 105); Then, the conversion of step 106 character code is performed, such as, according to certain rule, " 2, U, V; W, X, Y; Z " corresponding is respectively " 01,000,001; 010,011,100; 101,110 " with binary coding, then " 2UVWXYZ " is converted to the expression formula of the binary numeral only comprising 0 or 1 for " 01000001010011100101110 ".Step 107, carries out information Error Control to the character code generated in step 106, namely checks that whether binary expression formula is correct.If the binary number value expression after conversion is correct, then perform step 108, configuration mapping ruler; Otherwise re-execute step 106.The mapping ruler that processor selection in system configures well, the i.e. quantity of black color dots position and the distribution rule of black color dots position on little module of current quantity, with the quantity of white point position and the white point position of current quantity after the distribution rule on little module, micro-for the black and white configured point and the structure that is made up of relative position thereof are implanted on the little module of Quick Response Code coding in data storage areas, i.e. step 109: frame address maps.Wherein, step 109 is comprised and being copied by the micro-point of black and white micro-some mapping ruler by least one binary number value expression " 01000001010011100101110 ", and does redundancy process.
Step 301: the frame address maps that the ordinary two dimensional code figure generated in step 202 and step 109 generate is modulated through shadow tone site, adopt I, Q orthogonal modulation technique, carries out the modulation of shadow tone orthogonal vector to image in 2 D code, generates secure two-dimensional code (step 302).That is, the implicit enciphered message of " National Industrial and Commercial Bank of China " is comprised in this secure two-dimensional code of generation.
The present embodiment is in Quick Response Code planar range, normally represent outside symbol ability at Quick Response Code, utilize the micro-space of Quick Response Code, open up the free memory made new advances in addition, be i.e. the Free Region of Quick Response Code, and will identification information be implanted, as product coding, network reference address etc. are implanted in this free memory, realize the expansion to ordinary two dimensional code storage capacity, form third dimension storage space, comparatively ordinary two dimensional code, improves antifalsification and security.In addition, this secure two-dimensional code, owing to being carry out editing and configuration information at the third dimension storage space of free time, therefore, does not affect the recognition of former ordinary two dimensional code information.
The present invention also discloses a kind of secure two-dimensional code coding/decoding method, and corresponding to a kind of secure two-dimensional code method for making in previous embodiment, as shown in Figure 4, described coding/decoding method comprises:
Step S210: be separated secure two-dimensional code, obtains and the micro-point of black corresponding to described secure two-dimensional code and the structure that is made up of relative position thereof, and the micro-point of white and the structure that is made up of relative position thereof.
Wherein, be separated secure two-dimensional code and obtain ordinary two dimensional code, the micro-point of several black and by the micro-structure formed of these black, and several white micro-points and by these white micro-structures formed.Described step S210 is by device scan secure two-dimensional code, adopt certain position and image definition to differentiate that scheduling algorithm is separated, realize the micro-point resolution collection of secure two-dimensional code, image rectification and information extraction, demodulates information, information EDC error detect correction and decrypts information process.Step S130 in this step and previous embodiment implants the micro-point of black, white micro-point and reciprocal by the consitutional operation of relative position.
Step S220: to the micro-point of described black and the structure that is made up of relative position thereof, and the micro-point of described white and the structure that is made up of relative position thereof are resolved, and obtain mapping ruler.According to the micro-point of black of separation, the quantity of white micro-point and the some position regularity of distribution, screening and the mapping ruler corresponding to it, the step S123 of this step S220 correspondence and previous embodiment.
Step S230: according to resolved mapping ruler by micro-for described black point and the structure that is made up of relative position thereof, and the micro-point of white and the cooperating measure that is made up of relative position thereof are that the third dimension implants information coding.By resolving the mapping ruler of black, white point position, micro-for black in secure two-dimensional code point or white micro-point are converted to the third dimension and implant information coding, the wherein said third dimension is implanted information coding and is combined according to certain mapping ruler by the micro-point of a string black or white micro-point and the structure that is made up of relative position thereof, and the described third dimension implants information coding can be expressed as a basic symbol, as numeral, character etc., or represent an expression character string etc.
Step S240: implant the third dimension text message corresponding to information coding according to the acquisition of described third dimension implantation information coding and this third dimension.
Translate described third dimension implantation information coding and obtain third dimension text message, obtain the implantation information of user.Translate each described character string respectively, obtain and the third dimension text message corresponding to described each character string.Wherein, by address maps Static-state Space vector algorithm, arrange and quote version information and cipher key index information, realize the correct acquisition to third dimension spatial information, parsing and the meaning of one's words and understand.
The present embodiment achieves the decoding to secure two-dimensional code by step S210 to step S240, obtain the third dimension text message in secure two-dimensional code or implantation information, and can by the third dimension text message of deciphering and the text message pre-set be compared, judge that whether the information source of this secure two-dimensional code is identical with implantation text message, if two groups identical, then illustrate it is same information source, and then corresponding to article or the information security of this secure two-dimensional code, more common Quick Response Code is safer and reliable.
In above-mentioned steps S240, as shown in Figure 5, in step S240, implant according to the described third dimension third dimension text message that information coding obtains and this third dimension is implanted corresponding to information coding and comprise:
Step S241: information coding is implanted to the described third dimension and verifies, reject mistake, or reduction is compensated to missing information, generates the third dimension and implant message code, implant the third dimension text message corresponding to information password with this third dimension guaranteeing correctly to parse.Usually, verify or detect the third dimension by computer program and whether correctly to implant information coding, and whether detection third dimension implantation message code lacks, or omit.
Step S242: resolve the described third dimension and implant message code, obtain described third dimension text message.
In addition, also comprise in step S241: judge whether the length of the third dimension implantation message code of current parse exceedes preset length, and wherein, described preset length is the code length that user implants information.If the length that the third dimension of current parse implants message code exceedes code implant length, message code is implanted to this third dimension and resolves into two or more character strings.Usually, it is longer that the third dimension of being resolved by mapping ruler implants information coding, and the information of expression is more, and direct parsing can expend time in, and easily makes mistakes, and therefore, first the third dimension is implanted message code and carries out segmentation fractionation.Wherein, can split according to the length implanting message code, such as code implant length is 8, the code of length more than 8, splits according to every 8 one group, to improve the efficiency and accuracy of resolving coding.
In another preferred embodiment, described method can also be used to whether the decoded Quick Response Code of inspection is secure two-dimensional code.Step comprises particularly:
Step S211: obtain a Quick Response Code by specific scanning device.
Step S212: whether the Quick Response Code judging described acquisition is secure two-dimensional code; Namely judge in the Quick Response Code that scans, whether to be isolated a common Quick Response Code, the micro-point of black and the structure be made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and whether meet default mapping ruler by the structure of resolving this and slightly put and being made up of relative position.
If be separated described Quick Response Code, can obtain and the micro-point of the black corresponding to described Quick Response Code and the structure that is made up of relative position thereof, with the micro-point of white and the structure that is made up of relative position thereof, and meet mapping ruler, then this Quick Response Code is secure two-dimensional code.Continue to perform step S210 to step S230.Otherwise this Quick Response Code is non-security Quick Response Code.
In addition, also comprise after step S240: judge whether described secure two-dimensional code is true.
Be specially: judge whether the third dimension text message parsed matches with the information of the ordinary two dimensional code separated from described secure two-dimensional code, namely whether third dimension text message is identical with the information implanted in advance, if described third dimension text message is identical with implantation information in advance, then prove that described third dimension text message is identical with the issue object of the information of implantation.Such as, the third dimension text message obtained in secure two-dimensional code is " National Industrial and Commercial Bank of China ", and implants text message for " Agricutural Bank of China ", and the content of text messages that both understand is different, and therefore, this is false by the secure two-dimensional code understood.If two groups of text messages understood are identical, then illustrate that the secure two-dimensional code of this scanning is true.
A kind of secure two-dimensional code coding/decoding method that the present embodiment provides, by the separation of secure two-dimensional code and parsing, obtains the third dimension text message of its representative, and then judges the true and false of secure two-dimensional code by this third dimension text message.Owing to containing third dimension text message in secure two-dimensional code, text information implants information coding by the special third dimension to be translated into, therefore, can not because of copying or the mode such as scanning and obtain the third dimension text message that secure two-dimensional code hides, so than the security of ordinary two dimensional code and antifalsification higher.
In a specific embodiment, as shown in Figure 6, be the particular flow sheet of a kind of secure two-dimensional code decoding that the present embodiment provides, corresponding to the secure two-dimensional code Making programme of accompanying drawing 3, the concrete steps of decoding are as follows:
Step 3001: obtain a secure two-dimensional code, wherein, before any one Quick Response Code of acquisition, also need first to judge whether this Quick Response Code is secure two-dimensional code, be specially: by identifying that the equipment of secure two-dimensional code scans any one Quick Response Code, if can obtain having the micro-point of black of certain mapping ruler after scanning in the data storage areas of detected Quick Response Code, the micro-point of white and the structure be made up of relative position thereof, and the mapping ruler of resolving belongs to the one of the multiple mapping ruler stored in database, then prove that the Quick Response Code of this detection is secure two-dimensional code.Then this secure two-dimensional code is carried out separation to resolve, obtain a common Quick Response Code 2001, and with the graphical information of black color dots position, the distribution of white point position.
Step 2002: resolve ordinary two dimensional code, obtains the Quick Response Code text message on ordinary two dimensional code, and specifically by mobile phone A PP, the equipment such as scanner obtain this Quick Response Code text message.
Step 1001: the configuration parameter obtaining separated secure two-dimensional code figure.Wherein, the micro-point of black and the distribution rule corresponding to the micro-point of white in each little module that described configuration parameter refers to Quick Response Code, these distribution rules obtain by configuration parameter, therefore, the distribution rule corresponding to black-white point is found in distribution, and quantity is can obtain the mapping (step 1002) of frame address, this step corresponding with an aforementioned embodiment in generate step 109 in secure two-dimensional code, a series of coded strings be made up of binary code 1/0 can be obtained by address maps, such as this coded strings obtained after step 1002 is " 01000001010011100101110 ", then step 1003 is performed, information Error Control, whether the coded strings namely in checking procedure 1002 is correct, mode specifically by comparison or calculating judges that whether coded strings is wrong, if check errorless, then perform step 1004, otherwise, jump to step 1001, again resolve secure two-dimensional code.Step 1004: coded character is changed, and converts character string to, such as, convert coded strings " 01000001010011100101110 " to " 2UVWXYZ " character string by coded strings.It should be noted that, under normal circumstances, for ensureing the information security hidden in secure two-dimensional code, generally in making secure two-dimensional code, can be encrypted to each character string, therefore, before the content of character string is resolved, first to be decrypted this character string, i.e. step 1005: obtain cipher key.Due to the cryptographic algorithm that different coded strings is corresponding different, therefore, need to find the index of encryption to decode.Step 1006, decodes to character string after finding cipher key index.Such as, to generating new character string after character string " 2UVWXYZ " deciphering for " 1ABCDEF ", preferably, can be numeral, letter, symbol or above several combination in described character string.Step 1007: decompose third dimension information.Wherein said third dimension information refers to the character string on the free space being stored in ordinary two dimensional code, or message identification.Normally, the information that will carry due to character string is more, so the character string after deciphering generally all can be very long.Such as, described new character string " 1ABCDEF " be decomposed into " 1 " and " ABCDEF ", concrete decomposition rule can designed, designed as required.Step 1008: understand the implication often organizing character string after decomposing, obtain third dimension text message.Such as, the implication that " ABCDEF " represents in the present embodiment is " National Industrial and Commercial Bank of China ", and " 1 " represents this bank's sequence number.The third dimension text message that user can be read out by solution, the i.e. National Industrial and Commercial Bank of China and its sequence number, and then judge the information that this secure two-dimensional code carries or the true and false of commodity, and then more common Quick Response Code, security and the antifalsification of this secure two-dimensional code are higher.
A secure two-dimensional code mark, is applied to a kind of secure two-dimensional code method for making of previous embodiment, and as shown in Figure 8, this secure two-dimensional code mark comprises: secure two-dimensional code and printing mark, wherein, described secure two-dimensional code is printed on described printing mark.
A kind of secure two-dimensional code mark that present invention also offers, by being arranged on printing mark by having the secure two-dimensional code implanting message identification, form secure two-dimensional code mark, this secure two-dimensional code is identified and can paste or be applied in much information service system.In addition, this secure two-dimensional code mark also can be added unique identification or the trade mark of user, further increasing application and the antifalsification of secure two-dimensional code.
In addition, a kind of secure two-dimensional code method for making provided by the invention, coding/decoding method and secure two-dimensional code mark also has following beneficial effect:
1, safety, anti-copying, false proof anti-channeling, attack resistance.
2, off-line can be realized and differentiate that there is non repudiation.
3, safe multidimensional code can be generated based on any Quick Response Code, as DM, PDF417 etc.
4, be widely used, the secure two-dimensional code that the embodiment of the present invention provides or secure two-dimensional code mark can directly use, for recording circulation and transfer of goods information etc. under electronic edition form." one yard of multiple-effect " facilitates the Design and implementation of marketing program, in addition, can also expand code and do false proof link of tracing to the source.
5, can analog RF ID identification function.Using ordinary two dimensional code as product coding, coding can be expanded and encodes as chip.
6, change digital code anti-false and inquire about traditional discriminant approach, not to inquire about as differentiating true and false foundation first, differentiating true and false to expand coded message, avoiding fake products true code head to look into as genuine embarrassment.In addition, the secure two-dimensional code during the present embodiment provides secure two-dimensional code to identify does not need to hide, and does not need to scrape checking off yet.
7, entrance link is convenient: if consumer-user scans multidimensional code, then directly enter marketing link; If supvr's scanning input multidimensional code, then directly enter management link, and then can reduce marketing management cost, reduce marketing management personnel and time input
8, " one yard of multiple-effect " saves mark area, alternative uncovering label, reduces mark cost, can arbitrary number of times inquire about, and does not affect true and false character and judges.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
The above is only the specific embodiment of the present invention, those skilled in the art is understood or realizes the present invention.To be apparent to one skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.