CN106934633A - A kind of novel film coating two-dimension code anti-counterfeit traceability system and method - Google Patents

A kind of novel film coating two-dimension code anti-counterfeit traceability system and method Download PDF

Info

Publication number
CN106934633A
CN106934633A CN201710051749.2A CN201710051749A CN106934633A CN 106934633 A CN106934633 A CN 106934633A CN 201710051749 A CN201710051749 A CN 201710051749A CN 106934633 A CN106934633 A CN 106934633A
Authority
CN
China
Prior art keywords
commodity
quick response
response code
overlay film
database
Prior art date
Application number
CN201710051749.2A
Other languages
Chinese (zh)
Inventor
李智虎
Original Assignee
李智虎
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 李智虎 filed Critical 李智虎
Priority to CN201710051749.2A priority Critical patent/CN106934633A/en
Publication of CN106934633A publication Critical patent/CN106934633A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Abstract

The invention belongs to planar bar code technology field, disclose it is a kind of the false proof method and system traced to the source are carried out to commodity based on overlay film Quick Response Code, be attached to overlay film Quick Response Code on commodity by methods described(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics peel off, the unique sequence numbers and its corresponding cipher feature value of Quick Response Code commodity comprising associated by.The scheme low cost, safe, barcode scanning reads faster than manually entering speed, friendly with internet can access, the fast-developing trend of current mobile Internet is adapted to, adds the air brushing of intermediate transit point Quick Response Code to be traced to the source with realizing route, application prospect is widely.

Description

A kind of novel film coating two-dimension code anti-counterfeit traceability system and method
Technical field
The invention belongs to areas of information technology, and in particular to planar bar code technology field and password field, particularly Quick Response Code Anti-counterfeit field.
Background technology
Current anti-counterfeiting technology, is mostly based on material, physical characteristic, technique, chemistry, numeral, material technology and chemistry False proof, it is high to there is design and manufacture cost, the characteristics of differentiating difficult, and quickly cannot incorporate internet;Digital anti-counterfeiting is divided into high-grade Chip, inferior grade chip, without hardware(Chip)Deng, wherein using the high-grade chip of high cost, due to that cannot replicate chip in Data, can be good with off-line verification, antifalse effect, but high cost and cannot large-scale promotion;Using low without hardware anti-counterfeiting cost But be easily replicated, can only online verification, online verification there is also two problems, one be can infinite copy, during online verification only Can determine that first verifier is that true other are false, even if first is can only also judging by accident for vacation, and genuine piece will be mistaken for False product;Two is if identifying code generating mode is very simple, even if it is true that the equally possible personation of identifying code is not seen after being obtained by others Product are by checking.
Therefore, we devise one, that is, plus overlay film, can not be wanted due to verifying arbitrarily by people to the method for background authentication Destruction, common people will not go arbitrarily checking, in addition, employing cryptographic technique realizes that security code is unpredictable.
The content of the invention
Commodity are carried out with the false proof method traced to the source the invention discloses a kind of use overlay film Quick Response Code, including:Set up one On-line authentication center, sets up product database of tracing to the source, and the database comprises at least the unique sequence numbers of each commodity, Duo Gehuan Section(Logistics website, multistage whole seller, consumer)Whether mark etc. was queried.
The product false proof to each needs, according to logistics terminal points, multistage wholesale quotient, consumer's number, if printing Dry Quick Response Code.It is attached to after overlay film(Or be attached to using other modes)On commodity and cannot, physics complete with commodity peel off.
Quick Response Code comprises at least the unique sequence numbers of the commodity, and
1:The electronic signature of manufacturer or authoritative department to above- mentioned information;Or
2:The information that manufacturer or authoritative department are encrypted to above- mentioned information by symmetric cryptographic algorithm;Or
3:The Hash Value that manufacturer or authoritative department are calculated by the hash cryptographic algorithm with key(Cryptographic Hash);Or
4:Unpredictable random number R more long.
Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape covering for its correspondence Quick Response Code off On-line authentication center applications system is sent to after film, the mobile phone or terminal scanning Quick Response Code, for 1, system is to digital A.L.S. Breath is verified that, for 2, system is decrypted to ciphertext, and for 3, system contains unique sequence code according to original rule to commodity bundle Number essential information calculate Hash Value, for 4, system searches corresponding unpredictable random number R in database, if above-mentioned Calculated value(Or random number R)To matching and should not being queried in the record of unique sequence numbers commodity, then return mobile phone or The end of scan commodity are genuine pieces;Mistake in computation does not return to false product then in database this record;Calculate correctly or in number According to storehouse, but it has been queried, has informed and be queried, has there will more than likely be personation risk.
Received the commodity of inquiry, and the commodity were marked in authentication center's database and has been queried.If inquiring about first And issuer is certification user, and the user and commodity relation can be marked in database(For example certain user is as consumption Person carried out inquiry), and generate correspondence signature value, be passed back to user, on commodity air brushing contain user and commodity relation and its The Quick Response Code of signature value content, forms traceability mechanism, in case subsequent query.
Safe due to program low cost, barcode scanning is read than manually entering speed soon, can be connect with internet close friend Enter, be adapted to the fast-developing trend of current mobile Internet, add the air brushing of intermediate transit point Quick Response Code to be traced back with realizing route Source, application prospect is widely.
Brief description of the drawings
Fig. 1 is the FB(flow block) that the present invention carries out the false proof method traced to the source using overlay film Quick Response Code to commodity.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with drawings and Examples, to this hair It is bright to be explained in further detail.It should be appreciated that specific embodiment described herein is used only for explaining of the invention, and without It is of the invention in limiting.
Conversely, the present invention covers any replacement done in spirit and scope of the invention being defined by the claims, repaiies Change, equivalent method and scheme.Further, in order that the public has a better understanding to the present invention, below to of the invention thin It is detailed to describe some specific detail sections in section description.Part without these details for a person skilled in the art Description can also completely understand the present invention.
A kind of use overlay film Quick Response Code carries out the false proof method traced to the source to commodity, and the method is based on overlay film, wherein will be unique Characteristic value, unpredictable not reproducible Quick Response Code are attached on commodity, and the Quick Response Code cannot realize complete, physics with commodity Peel off, the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, just visible Quick Response Code after only the overlay film is struck off should Two-dimentional digital content includes the unique sequence numbers and its corresponding cipher feature value of associated commodity, and the wherein unique sequence numbers can be with Prediction is disclosed, and the cipher feature value can be by the key that only has authentication center's system just to know to comprising unique sequence numbers Multiple elements are encrypted(Or signature or hash)Calculate and obtain, or matching one is complete in authentication center's system database Complete unpredictable random number R is obtained.
Referring to accompanying drawing 1, methods described following steps:
Step 1:Set up an on-line authentication centring system, the centring system is traced to the source product database, the data including foundation Storehouse comprises at least:The unique sequence numbers of each commodity, and multiple links(Logistics transfer website, multistage whole seller, consumption Person)Whether mark of the commodity etc. was inquired about.
Step 2:To each false proof commodity of needs, according to logistics terminal points, multistage wholesale quotient, consumer number Mesh, prints several Quick Response Codes.It is attached to after overlay film(Or be attached to using other modes, for example can not after overlay film but opening commodity See)On commodity and cannot, physics complete with commodity peel off.
The Quick Response Code is comprised at least:
1) unique sequence numbers of the commodity, and manufacturer or authoritative department are to commodity essential information(Date of manufacture, production firm, The information such as production batch)Electronic signature or 2)The encryption information 3 of manufacturer or authoritative department to above- mentioned information)Or manufacturer or authority Department calculates the Hash Value with key to above- mentioned information;Or unpredictable random number R more long.
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding two dimension off Code overlay film, it is described with the computation subsystem that on-line authentication centring system is sent to after mobile phone or the terminal scanning Quick Response Code Subsystem is calculated(For above-mentioned to 1), 2), 3))Or search(To 4))Commodity comprising the unique sequence numbers and cipher feature value Whether in database and it was not queried;
1. if so, then returning to genuine piece,
If 2. mistake in computation or not in database, false product are returned to,
3. if calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
Wherein, judge that the standard that the commodity were queried is:Unique sequence of the commodity is found in product database of tracing to the source The encryption that signing messages is correct, manufacturer or authoritative department are to above- mentioned information of row number, manufacturer or authoritative department to above- mentioned information is believed Breath is correct, manufacturer or authoritative department above- mentioned information is calculated the Hash Value with key it is correct or through search it is unpredictable compared with Random number R long is matching.
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried.If first Inquiry and issuer is certification user, can mark the user and commodity relation in database, and generate correspondence signature value, User is passed back to, air brushing contains user and commodity relation and its Quick Response Code of signature value content on commodity, forms traceability mechanism, In case subsequent query.
Quick Response Code signature value calculating method is specially wherein in step 2:
1)To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, using in computing subsystem Private key is digitally signed(For example with cryptographic algorithms such as SM2 or RSA)
2)Quick Response Code encrypts value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem is using symmetrical close Key carries out one-level or carries out multilevel symmetrical encryption(For example with cryptographic algorithms such as SM1, SM4, SM7 or AES).
Wherein one-level disperses computational methods:Using system root key to dispersion factor(Such as commodity unique sequence numbers)Added It is close to obtain merchandise news encryption key;
Multistage dispersion computational methods(By taking level Four key as an example):
System root key is to one-level dispersion factor(Such as vendor code)It is encrypted and obtains two grades of root keys;
Two grades of root keys are to the secondary breakup factor(Such as production batch)It is encrypted and obtains three-level root key;
Three-level root key is to three-level dispersion factor(Such as commodity unique sequence numbers)It is encrypted and obtains level Four key(Merchandise news adds Key);
3)Quick Response Code hash value calculating method:
To information such as Quick Response Code unique sequence numbers, date of manufacture, production firm, production batch, computing subsystem uses root key Carry out one-level(It is multistage)Distributed key carries out hash(For example with cryptographic algorithms such as SM3 or SHA)
Key Multistage dispersion method is ibid
4)Quick Response Code random value R acquisition methods:
Generation batch random number, distributes to each commodity, and recorded in database.

Claims (8)

1. a kind of that commodity are carried out with the false proof method traced to the source based on overlay film Quick Response Code, overlay film Quick Response Code is attached to business by methods described On product, it is characterised in that the overlay film Quick Response Code is comprising one layer of overlay film and can scan Quick Response Code, with commodity cannot completely, physics Peel off, the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity.
2. method according to claim 1, it is characterised in that the unique sequence numbers can predict or open, the password Characteristic value can be carried out by the key for only having authentication center's system just to know to the multiple information elements comprising unique sequence numbers Encryption(Or signature or hash)Calculate obtain, or in the database of the system match one completely it is unpredictable with Machine number R is obtained.
3. method according to claim 2, methods described is specifically included:
Step 1:An on-line authentication centring system is set up, the centring system includes a product database of tracing to the source, the data Storehouse comprises at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
Step 2:Several are printed on the false proof commodity of each needs and scrapes just visible Quick Response Code off;The Quick Response Code is carried out Encryption(Or signature or hash)Calculate, or a complete unpredictable random number R is matched in the database of the system Obtain cipher feature value;And be attached on commodity after overlay film and cannot, physics complete with commodity peel off;Or not overlay film but nothing Method is directly scanned out, for example, to take commodity packaging apart;
Step 3:Logistics intermediate transit point, whole seller, ultimate consumer will recognize authenticity of products, it is necessary to scrape its corresponding Quick Response Code off and cover The computation subsystem of on-line authentication centring system, the subsystem are sent to after film, the mobile phone or terminal scanning Quick Response Code It is computed or looked up whether the commodity comprising the unique sequence numbers and cipher feature value in database and were not queried;
Step 4:Received inquiry, and the commodity were marked in the database of authentication center and has been queried;If inquiring about first And issuer is certification user, the user and commodity relation can be marked in database, and generate correspondence signature value, loopback To user, user's air brushing on commodity contains user and commodity relation and its Quick Response Code of signature value content, forms traceability mechanism, In case subsequent query.
4. method according to claim 3, it is characterised in that the Quick Response Code is comprised at least:The unique sequence code of the commodity Number and the electronic signature of merchandise news including sequence number or the encryption information of the merchandise news or the merchandise news Key Hash Value;Or unpredictable random number more long.
5. method according to claim 3, it is characterised in that the specific judgement wherein in step 3 is:
1)If in database and not being queried, then genuine piece is returned to,
2)It is middle to return to false product if calculate there is mistake or not in database,
3)If calculating correctly or in database, but it has been queried, has then informed and be queried, has there will more than likely be personation risk.
6. method according to claim 3, it is characterised in that Quick Response Code encryption value calculating method wherein in step 2:
To Quick Response Code merchandise news(The information such as unique sequence numbers, date of manufacture, production firm, production batch)Using symmetric key Carry out one or more levels symmetric cryptography;
Wherein one-level computational methods:System symmetric key is encrypted to dispersion factor and obtains merchandise news encryption key;
Multistage dispersion computational methods:
This grade of root key of system is encrypted subordinate's dispersion factor and obtains subordinate(Root)Key;
Wherein Quick Response Code hash value calculating method is:
To Quick Response Code merchandise news, using root key, one or more levels dispersion carries out hash;
The random value-acquiring method of Quick Response Code:
Generation batch random number, distributes to each commodity, and recorded in database.
7. method according to claim 1, it is characterised in that methods described can be replaced with and for Quick Response Code be attached to commodity On, Quick Response Code top not overlay film, but Quick Response Code cannot be directly scanned out and arrived, it is necessary to take commodity packaging apart and could scan, and it is described Quick Response Code and commodity cannot completely, physics peel off, Quick Response Code unique sequence numbers of commodity and its corresponding close comprising associated by Code characteristic value.
8. it is a kind of that the false proof system traced to the source is carried out to commodity based on overlay film Quick Response Code, it is characterised in that the overlay film Quick Response Code is attached On commodity(Or not overlay film, but cannot be directly scanned out, for example to take commodity packaging apart), the overlay film Quick Response Code include one Layer and can scan Quick Response Code at overlay film, and the Quick Response Code includes the unique sequence numbers and its corresponding cipher feature value of associated commodity;
The system includes online authentication center's system, and the on-line authentication centring system includes a product database of tracing to the source, The database is comprised at least:Whether the unique sequence numbers of each commodity, and multiple links inquired about the mark of the commodity;
On-line authentication centring system also includes a computation subsystem, wherein the subsystem is computed or looked up comprising this only Whether the commodity of one sequence number and cipher feature value in database and were not queried;Received inquiry, in the data The commodity are marked in storehouse to be queried;If inquiry first and issuer is certification user, can be marked in database The user and commodity relation, and correspondence signature value is generated, user is passed back to, and air brushing contains user and commodity relation on commodity And its Quick Response Code of signature value content, traceability mechanism is formed, in case subsequent query.
CN201710051749.2A 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method CN106934633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710051749.2A CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710051749.2A CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Publications (1)

Publication Number Publication Date
CN106934633A true CN106934633A (en) 2017-07-07

Family

ID=59423502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710051749.2A CN106934633A (en) 2017-01-20 2017-01-20 A kind of novel film coating two-dimension code anti-counterfeit traceability system and method

Country Status (1)

Country Link
CN (1) CN106934633A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977434A (en) * 2017-12-01 2018-05-01 珠海市魅族科技有限公司 Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN103400270A (en) * 2013-07-03 2013-11-20 陕西科技大学 Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN104574119A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Commodity identifying and tracing method
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN103400270A (en) * 2013-07-03 2013-11-20 陕西科技大学 Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN104574119A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Commodity identifying and tracing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977434A (en) * 2017-12-01 2018-05-01 珠海市魅族科技有限公司 Method for pushing, terminal device, computer installation and the readable storage medium storing program for executing of bar code
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods
CN108694429B (en) * 2018-05-11 2021-03-02 张玉 Two-dimensional code generation method and identification method

Similar Documents

Publication Publication Date Title
CN106452756B (en) Can the safe Quick Response Code construction verification method of off-line verification and device
US9641338B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US20180308098A1 (en) Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
JP6557349B2 (en) Tracking integration that occurs in the supply chain
CN104854642B (en) For the method and apparatus using physical features mark manufacture article
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
JP5680725B2 (en) Method and apparatus for providing low complexity device authentication and confidentiality
Van Herrewege et al. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
US20150012444A1 (en) Mobile peer-to-peer authenticated transfers
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
JP4718843B2 (en) System and method for encoding randomly distributed features in an object
CN102932148B (en) Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification
Bhargav-Spantzel et al. Privacy preserving multi-factor authentication with biometrics
US7188362B2 (en) System and method of user and data verification
US8347091B2 (en) Authenticator apparatus
US7711152B1 (en) System and method for authenticated and privacy preserving biometric identification systems
Lee et al. Untraceable RFID authentication protocols: Revision of EC-RAC
Camenisch Efficient anonymous fingerprinting with group signatures
US9887989B2 (en) Protecting passwords and biometrics against back-end security breaches
US7580895B2 (en) Product protection gateway and method for checking the authenticity of products
Wazid et al. Secure authentication scheme for medicine anti-counterfeiting system in IoT environment
JP4276259B2 (en) Mobile communication terminal having tag reading function and authentic authentication service providing method
US7822200B2 (en) Method and system for asymmetric key security
CN101331706B (en) Secure threshold decryption protocol computation
AU601935B2 (en) Public key/signature cryptosystem with enhanced digital signature certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination