CN106934633A - A kind of novel film coating two-dimension code anti-counterfeit traceability system and method - Google Patents
A kind of novel film coating two-dimension code anti-counterfeit traceability system and method Download PDFInfo
- Publication number
- CN106934633A CN106934633A CN201710051749.2A CN201710051749A CN106934633A CN 106934633 A CN106934633 A CN 106934633A CN 201710051749 A CN201710051749 A CN 201710051749A CN 106934633 A CN106934633 A CN 106934633A
- Authority
- CN
- China
- Prior art keywords
- commodity
- quick response
- response code
- overlay film
- database
- Prior art date
Links
- 238000009501 film coating Methods 0.000 title description 2
- 239000007888 film coatings Substances 0.000 title description 2
- 230000000875 corresponding Effects 0.000 claims abstract description 8
- 239000003570 air Substances 0.000 claims abstract description 6
- 230000001680 brushing Effects 0.000 claims abstract description 6
- 239000010410 layers Substances 0.000 claims abstract description 4
- 238000004519 manufacturing process Methods 0.000 claims description 17
- 239000006185 dispersions Substances 0.000 claims description 9
- 238000005516 engineering processes Methods 0.000 abstract description 6
- 239000000463 materials Substances 0.000 description 2
- 238000000034 methods Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
Abstract
The invention belongs to planar bar code technology field, disclose it is a kind of the false proof method and system traced to the source are carried out to commodity based on overlay film Quick Response Code, be attached to overlay film Quick Response Code on commodity by methods described(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics peel off, the unique sequence numbers and its corresponding cipher feature value of Quick Response Code commodity comprising associated by.The scheme low cost, safe, barcode scanning reads faster than manually entering speed, friendly with internet can access, the fast-developing trend of current mobile Internet is adapted to, adds the air brushing of intermediate transit point Quick Response Code to be traced to the source with realizing route, application prospect is widely.
Description
Technical field
The invention belongs to areas of information technology, and in particular to planar bar code technology field and password field, particularly Quick Response Code
Anti-counterfeit field.
Background technology
Current anti-counterfeiting technology, is mostly based on material, physical characteristic, technique, chemistry, numeral, material technology and chemistry
False proof, it is high to there is design and manufacture cost, the characteristics of differentiating difficult, and quickly cannot incorporate internet;Digital anti-counterfeiting is divided into high-grade
Chip, inferior grade chip, without hardware(Chip)Deng, wherein using the high-grade chip of high cost, due to that cannot replicate chip in
Data, can be good with off-line verification, antifalse effect, but high cost and cannot large-scale promotion;Using low without hardware anti-counterfeiting cost
But be easily replicated, can only online verification, online verification there is also two problems, one be can infinite copy, during online verification only
Can determine that first verifier is that true other are false, even if first is can only also judging by accident for vacation, and genuine piece will be mistaken for
False product;Two is if identifying code generating mode is very simple, even if it is true that the equally possible personation of identifying code is not seen after being obtained by others
Product are by checking.
Therefore, we devise one, that is, plus overlay film, can not be wanted due to verifying arbitrarily by people to the method for background authentication
Destruction, common people will not go arbitrarily checking, in addition, employing cryptographic technique realizes that security code is unpredictable.
The content of the invention
Commodity are carried out with the false proof method traced to the source the invention discloses a kind of use overlay film Quick Response Code, including:Set up one
On-line authentication center, sets up product database of tracing to the source, and the database comprises at least the unique sequence numbers of each commodity, Duo Gehuan
Section(Logistics website, multistage whole seller, consumer)Whether mark etc. was queried.
The product false proof to each needs, according to logistics terminal points, multistage wholesale quotient, consumer's number, if printing
Dry Quick Response Code.It is attached to after overlay film(Or be attached to using other modes)On commodity and cannot, physics complete with commodity peel off.
Quick Response Code comprises at least the unique sequence numbers of the commodity, and
1:The electronic signature of manufacturer or authoritative department to above- mentioned information;Or
2:The information that manufacturer or authoritative department are encrypted to above- mentioned information by symmetric cryptographic algorithm;Or
3:The Hash Value that manufacturer or authoritative department are calculated by the hash cryptographic algorithm with key(Cryptographic Hash);Or
4:Unpredictable random number R more long.
Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape covering for its correspondence Quick Response Code off
On-line authentication center applications system is sent to after film, the mobile phone or terminal scanning Quick Response Code, for 1, system is to digital A.L.S.
Breath is verified that, for 2, system is decrypted to ciphertext, and for 3, system contains unique sequence code according to original rule to commodity bundle
Number essential information calculate Hash Value, for 4, system searches corresponding unpredictable random number R in database, if above-mentioned
Calculated value(Or random number R)To matching and should not being queried in the record of unique sequence numbers commodity, then return mobile phone or
The end of scan commodity are genuine pieces;Mistake in computation does not return to false product then in database this record;Calculate correctly or in number
According to storehouse, but it has been queried, has informed and be queried, has there will more than likely be personation risk.
Received the commodity of inquiry, and the commodity were marked in authentication center's database and has been queried.If inquiring about first
And issuer is certification user, and the user and commodity relation can be marked in database(For example certain user is as consumption
Person carried out inquiry), and generate correspondence signature value, be passed back to user, on commodity air brushing contain user and commodity relation and its
The Quick Response Code of signature value content, forms traceability mechanism, in case subsequent query.
Safe due to program low cost, barcode scanning is read than manually entering speed soon, can be connect with internet close friend
Enter, be adapted to the fast-developing trend of current mobile Internet, add the air brushing of intermediate transit point Quick Response Code to be traced back with realizing route
Source, application prospect is widely.
Brief description of the drawings
Fig. 1 is the FB(flow block) that the present invention carries out the false proof method traced to the source using overlay film Quick Response Code to commodity.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with drawings and Examples, to this hair
It is bright to be explained in further detail.It should be appreciated that specific embodiment described herein is used only for explaining of the invention, and without
It is of the invention in limiting.
Conversely, the present invention covers any replacement done in spirit and scope of the invention being defined by the claims, repaiies
Change, equivalent method and scheme.Further, in order that the public has a better understanding to the present invention, below to of the invention thin
It is detailed to describe some specific detail sections in section description.Part without these details for a person skilled in the art
Description can also completely understand the present invention.
A kind of use overlay film Quick Response Code carries out the false proof method traced to the source to commodity, and the method is based on overlay film, wherein will be unique
Characteristic value, unpredictable not reproducible Quick Response Code are attached on commodity, and the Quick Response Code cannot realize complete, physics with commodity
Peel off, the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, just visible Quick Response Code after only the overlay film is struck off should
Two-dimentional digital content includes the unique sequence numbers and its corresponding cipher feature value of associated commodity, and the wherein unique sequence numbers can be with
Prediction is disclosed, and the cipher feature value can be by the key that only has authentication center's system just to know to comprising unique sequence numbers
Multiple elements are encrypted(Or signature or hash)Calculate and obtain, or matching one is complete in authentication center's system database
Complete unpredictable random number R is obtained.
Referring to accompanying drawing 1, methods described following steps:
Step 1:Set up an on-line authentication centring system, the centring system is traced to the source product database, the data including foundation
Storehouse comprises at least:The unique sequence numbers of each commodity, and multiple links(Logistics transfer website, multistage whole seller, consumption
Person)Whether mark of the commodity etc. was inquired about.
Step 2:To each false proof commodity of needs, according to logistics terminal points, multistage wholesale quotient, consumer number
Mesh, prints several Quick Response Codes.It is attached to after overlay film(Or be attached to using other modes, for example can not after overlay film but opening commodity
See)On commodity and cannot, physics complete with commodity peel off.
The Quick Response Code is comprised at least:
1) unique sequence numbers of the commodity, and manufacturer or authoritative department are to commodity essential information(Date of manufacture, production firm,
The information such as production batch)Electronic signature or 2)The encryption information 3 of manufacturer or authoritative department to above- mentioned information)Or manufacturer or authority
Department calculates the Hash Value with key to above- mentioned information;Or unpredictable random number R more long.
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding two dimension off
Code overlay film, it is described with the computation subsystem that on-line authentication centring system is sent to after mobile phone or the terminal scanning Quick Response Code
Subsystem is calculated(For above-mentioned to 1), 2), 3))Or search(To 4))Commodity comprising the unique sequence numbers and cipher feature value
Whether in database and it was not queried;
1. if so, then returning to genuine piece,
If 2. mistake in computation or not in database, false product are returned to,
3. if calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
Wherein, judge that the standard that the commodity were queried is:Unique sequence of the commodity is found in product database of tracing to the source
The encryption that signing messages is correct, manufacturer or authoritative department are to above- mentioned information of row number, manufacturer or authoritative department to above- mentioned information is believed
Breath is correct, manufacturer or authoritative department above- mentioned information is calculated the Hash Value with key it is correct or through search it is unpredictable compared with
Random number R long is matching.
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried.If first
Inquiry and issuer is certification user, can mark the user and commodity relation in database, and generate correspondence signature value,
User is passed back to, air brushing contains user and commodity relation and its Quick Response Code of signature value content on commodity, forms traceability mechanism,
In case subsequent query.
Quick Response Code signature value calculating method is specially wherein in step 2:
1)To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, using in computing subsystem
Private key is digitally signed(For example with cryptographic algorithms such as SM2 or RSA)
2)Quick Response Code encrypts value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem is using symmetrical close
Key carries out one-level or carries out multilevel symmetrical encryption(For example with cryptographic algorithms such as SM1, SM4, SM7 or AES).
Wherein one-level disperses computational methods:Using system root key to dispersion factor(Such as commodity unique sequence numbers)Added
It is close to obtain merchandise news encryption key;
Multistage dispersion computational methods(By taking level Four key as an example):
System root key is to one-level dispersion factor(Such as vendor code)It is encrypted and obtains two grades of root keys;
Two grades of root keys are to the secondary breakup factor(Such as production batch)It is encrypted and obtains three-level root key;
Three-level root key is to three-level dispersion factor(Such as commodity unique sequence numbers)It is encrypted and obtains level Four key(Merchandise news adds
Key);
3)Quick Response Code hash value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem uses root key
Carry out one-level(It is multistage)Distributed key carries out hash(For example with cryptographic algorithms such as SM3 or SHA)
Key Multistage dispersion method is ibid
4)Quick Response Code random value R acquisition methods:
Generation batch random number, distributes to each commodity, and recorded in database.
Claims (8)
1. a kind of that commodity are carried out with the false proof method traced to the source based on overlay film Quick Response Code, overlay film Quick Response Code is attached to business by methods described
On product, it is characterised in that the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics
Peel off, the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity.
2. method according to claim 1, it is characterised in that the unique sequence numbers can predict or open, the password
Characteristic value can be carried out by the key for only having authentication center's system just to know to the multiple information elements comprising unique sequence numbers
Encryption(Or signature or hash)Calculate obtain, or in the database of the system match one completely it is unpredictable with
Machine number R is obtained.
3. method according to claim 2, methods described is specifically included:
Step 1:An on-line authentication centring system is set up, the centring system includes a product database of tracing to the source, the data
Storehouse comprises at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
Step 2:Several are printed on the false proof commodity of each needs and scrapes just visible Quick Response Code off;The Quick Response Code is carried out
Encryption(Or signature or hash)Calculate, or a complete unpredictable random number R is matched in the database of the system
Obtain cipher feature value;And be attached on commodity after overlay film and cannot, physics complete with commodity peel off;Or not overlay film but nothing
Method is directly scanned out, for example, to take commodity packaging apart;
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding Quick Response Code off and cover
The computation subsystem of on-line authentication centring system, the subsystem are sent to after film, the mobile phone or terminal scanning Quick Response Code
It is computed or looked up whether the commodity comprising the unique sequence numbers and cipher feature value in database and were not queried;
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried;If inquiring about first
And issuer is certification user, the user and commodity relation can be marked in database, and generate correspondence signature value, loopback
To user, user's air brushing on commodity contains user and commodity relation and its Quick Response Code of signature value content, forms traceability mechanism,
In case subsequent query.
4. method according to claim 3, it is characterised in that the Quick Response Code is comprised at least:The unique sequence code of the commodity
Number and the electronic signature of merchandise news including sequence number or the encryption information of the merchandise news or the merchandise news
Key Hash Value;Or unpredictable random number more long.
5. method according to claim 3, it is characterised in that the specific judgement wherein in step 3 is:
1)If in database and not being queried, then genuine piece is returned to,
2)It is middle to return to false product if calculate there is mistake or not in database,
3)If calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
6. method according to claim 3, it is characterised in that Quick Response Code encryption value calculating method wherein in step 2:
To Quick Response Code merchandise news(The information such as unique sequence numbers, date of manufacture, production firm, production batch)Using symmetric key
Carry out one or more levels symmetric cryptography;
Wherein one-level computational methods:System symmetric key is encrypted to dispersion factor and obtains merchandise news encryption key;
Multistage dispersion computational methods:
This grade of root key of system is encrypted subordinate's dispersion factor and obtains subordinate(Root)Key;
Wherein Quick Response Code hash value calculating method is:
To Quick Response Code merchandise news, using root key, one or more levels dispersion carries out hash;
The random value-acquiring method of Quick Response Code:
Generation batch random number, distributes to each commodity, and recorded in database.
7. method according to claim 1, it is characterised in that methods described can be replaced with and for Quick Response Code be attached to commodity
On, Quick Response Code top not overlay film, but Quick Response Code cannot be directly scanned out and arrived, it is necessary to take commodity packaging apart and could scan, and it is described
Quick Response Code and commodity cannot completely, physics peel off, Quick Response Code unique sequence numbers of commodity and its corresponding close comprising associated by
Code characteristic value.
8. it is a kind of that the false proof system traced to the source is carried out to commodity based on overlay film Quick Response Code, it is characterised in that the overlay film Quick Response Code is attached
On commodity(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code include one
Layer and can scan Quick Response Code at overlay film, and the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity;
The system includes online authentication center's system, and the on-line authentication centring system includes a product database of tracing to the source,
The database is comprised at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
On-line authentication centring system also includes a computation subsystem, wherein the subsystem is computed or looked up comprising this only
Whether the commodity of one sequence number and cipher feature value in database and were not queried;Received inquiry, in the data
The commodity are marked in storehouse to be queried;If inquiry first and issuer is certification user, can be marked in database
The user and commodity relation, and correspondence signature value is generated, user is passed back to, and air brushing contains user and commodity relation on commodity
And its Quick Response Code of signature value content, traceability mechanism is formed, in case subsequent query.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710051749.2A CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710051749.2A CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106934633A true CN106934633A (en) | 2017-07-07 |
Family
ID=59423502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710051749.2A CN106934633A (en) | 2017-01-20 | 2017-01-20 | A kind of novel film coating two-dimension code anti-counterfeit traceability system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106934633A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977434A (en) * | 2017-12-01 | 2018-05-01 | 珠海市魅族科技有限公司 | Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code |
CN108694429A (en) * | 2018-05-11 | 2018-10-23 | 张玉 | A kind of generation method of Quick Response Code and recognition methods |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496114A (en) * | 2011-11-22 | 2012-06-13 | 成都天钥科技有限公司 | Method and system for product counterfeiting prevention and method and device for identity information generation |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN104574119A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Commodity identifying and tracing method |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
-
2017
- 2017-01-20 CN CN201710051749.2A patent/CN106934633A/en active Search and Examination
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496114A (en) * | 2011-11-22 | 2012-06-13 | 成都天钥科技有限公司 | Method and system for product counterfeiting prevention and method and device for identity information generation |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
CN104574119A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Commodity identifying and tracing method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977434A (en) * | 2017-12-01 | 2018-05-01 | 珠海市魅族科技有限公司 | Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code |
CN108694429A (en) * | 2018-05-11 | 2018-10-23 | 张玉 | A kind of generation method of Quick Response Code and recognition methods |
CN108694429B (en) * | 2018-05-11 | 2021-03-02 | 张玉 | Two-dimensional code generation method and identification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106452756B (en) | Can the safe Quick Response Code construction verification method of off-line verification and device | |
US9641338B2 (en) | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items | |
US20180308098A1 (en) | Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices | |
JP6557349B2 (en) | Tracking integration that occurs in the supply chain | |
CN104854642B (en) | For the method and apparatus using physical features mark manufacture article | |
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
JP5680725B2 (en) | Method and apparatus for providing low complexity device authentication and confidentiality | |
Van Herrewege et al. | Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs | |
US20150012444A1 (en) | Mobile peer-to-peer authenticated transfers | |
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
JP4718843B2 (en) | System and method for encoding randomly distributed features in an object | |
CN102932148B (en) | Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification | |
Bhargav-Spantzel et al. | Privacy preserving multi-factor authentication with biometrics | |
US7188362B2 (en) | System and method of user and data verification | |
US8347091B2 (en) | Authenticator apparatus | |
US7711152B1 (en) | System and method for authenticated and privacy preserving biometric identification systems | |
Lee et al. | Untraceable RFID authentication protocols: Revision of EC-RAC | |
Camenisch | Efficient anonymous fingerprinting with group signatures | |
US9887989B2 (en) | Protecting passwords and biometrics against back-end security breaches | |
US7580895B2 (en) | Product protection gateway and method for checking the authenticity of products | |
Wazid et al. | Secure authentication scheme for medicine anti-counterfeiting system in IoT environment | |
JP4276259B2 (en) | Mobile communication terminal having tag reading function and authentic authentication service providing method | |
US7822200B2 (en) | Method and system for asymmetric key security | |
CN101331706B (en) | Secure threshold decryption protocol computation | |
AU601935B2 (en) | Public key/signature cryptosystem with enhanced digital signature certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |