CN107423797A - A kind of security code information generating method - Google Patents

A kind of security code information generating method Download PDF

Info

Publication number
CN107423797A
CN107423797A CN201710641825.5A CN201710641825A CN107423797A CN 107423797 A CN107423797 A CN 107423797A CN 201710641825 A CN201710641825 A CN 201710641825A CN 107423797 A CN107423797 A CN 107423797A
Authority
CN
China
Prior art keywords
value
false proof
picture
numerical value
isn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710641825.5A
Other languages
Chinese (zh)
Other versions
CN107423797B (en
Inventor
黄利民
张川
刘锋
伍逵
何浩
胡娟
宋俊杉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu New Profit Electronics Co Ltd
Original Assignee
Chengdu New Profit Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu New Profit Electronics Co Ltd filed Critical Chengdu New Profit Electronics Co Ltd
Priority to CN201710641825.5A priority Critical patent/CN107423797B/en
Publication of CN107423797A publication Critical patent/CN107423797A/en
Application granted granted Critical
Publication of CN107423797B publication Critical patent/CN107423797B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention discloses a kind of security code information generating method, comprise the following steps:Step 1: establishment value color table and picture library;Step 2: external system starts anti-counterfeiting information generating process by parameter call, the parameter includes ISN, Url and prefix;Step 3: Url, prefix and ISN are merged, and its check code is calculated, then combined Url, prefix, ISN and check code, and form Quick Response Code;Step 4: generate false proof numerical information list;Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof picture sum modulus in picture library, obtain picture indices, corresponding false proof picture is then obtained from picture library;Step 6: the false proof picture combination producing security code information that the false proof numerical information list that the Quick Response Code that step 3 is formed, step 4 are formed obtains with step 5.The security code information generating method of the present invention, call simply, data storage pressure is small.

Description

A kind of security code information generating method
Technical field
The invention belongs to anti-counterfeiting information technical field, and in particular to a kind of security code information generating method.
Background technology
With it is scientific and technical it is constantly progressive, economical continue to develop, increasing counterfeit and shoddy goods have become through The outstanding problem presented in Ji evolution, the presence of counterfeit and shoddy goods, has not only encroached on the interests of consumers in general, simultaneously Also serious economic loss is brought to manufacture, sale manufacturer, very disruptive civil order, therefore, on many products all Meeting antiforge code, the mark to be used as identification counterfeit and shoddy goods.But the method for generating security code at present, data be present Amount of storage is big, calls the problem of complicated.
The content of the invention
It is an object of the invention to:For problems of the prior art, there is provided a kind of security code information generating method, Memory data output pressure is small, it is simple to call.
To achieve these goals, the technical solution adopted by the present invention is:
A kind of security code information generating method, comprises the following steps:
Step 1: establishment value color table and picture library, described value color table be used to describing false proof numerical value, false proof numerical value color with It is worth the syntagmatic of color index numerical value three, picture library prestores several false proof pictures;
Step 2: external system by parameter call, starts anti-counterfeiting information generating process, the parameter include ISN, Url and Prefix;
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification Code character is closed, and forms Quick Response Code;
Step 4: taking one group to specify place value from the Quick Response Code of step 3, calculated and by result of calculation by being worth color index Value color corresponding to obtaining after the item number modulus of numerical value is indexed to value color table intermediate value color respectively and indexes numerical value, the according to value color in color table is worth Index scans for, and obtains indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and False proof numerical value color forms the false proof numerical information list with color data;
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof in picture library Picture sum modulus, obtains picture indices, and corresponding false proof picture is then obtained from picture library;
Step 6: false proof numerical information list and step 5 that the Quick Response Code that step 3 is formed, step 4 are formed obtain False proof picture combination producing security code information.
Preferably, the external system described in step 2 is false proof operation system, and ISN is to be pre-stored within false proof business Decimal value in system, Url, prefix and ISN are merged in step 3, and before calculating its check code, by described ten The code comversion of system is multibit code.
Preferably, in step 3, the computational methods of check code are:The original character string that prefix and ISN form is added Close calculating, character string ASCII after then being encrypted and, by ASCII and to the item number modulus of false proof numerical value and add 1, obtain Described check code.
Preferably, described value color index computational methods are:From the prefix of the Quick Response Code of step 3, ISN and verification code character Into character string calculating is encrypted, then from i-th, i+j from the character string1-1、...、i+jn-1Position, common n positions take respectively ASCII value carries out ASCII calculating, and result of calculation respectively obtains n value color index number to the item number modulus of value color index numerical value Value;Wherein, i is integer-bit character, j are integer bit interval from left to right from character string.
It is further preferred that specifically,
I-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, obtain ASCII value summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
Preferably, the process that picture indices calculate in step 5 is included the prefix of the Quick Response Code of step 3, ISN and school Test code composition character string calculatings is encrypted, the ASCII of the character string after being encrypted with, then picture sum is taken Mould, obtain described picture indices.
Preferably, the character string id information that the security code information of step 6 generation also includes prefix and ISN forms.
By adopting the above-described technical solution, the beneficial effects of the invention are as follows:
The false proof code generating method of the present invention, enumerate tag ID, two-dimensional code data, fake certification numeral and color, prevent The information such as pseudo- picture, Cipher Strength is high, is not easy to crack;Only need to provide Url, prefix, ISN during calling, the algorithm can generate All anti-counterfeiting information, call simply, generation is convenient;The corresponding relation that need not be established between ISN, bar code and anti-counterfeiting information Data, considerably reduce data storage pressure.
Brief description of the drawings
Fig. 1 is three groups of security code hum patterns of the present invention.
Fig. 2 is the false proof numerical information list figure of the present invention.
Fig. 3 is the false proof picture figure of the present invention.
Fig. 4 is the security code information each several part pie graph of the present invention.
Embodiment
A kind of security code information generating method as shown in Figure 1 of the present invention, comprises the following steps:
Step 1: establishment value color table and picture library, described value color table be used to describing false proof numerical value, false proof numerical value color with It is worth the syntagmatic of color index numerical value three, picture library prestores several false proof pictures.
By a two-dimensional table, the combination of value and color can be described, the table is referred to as value color table, as shown in table 1.
Table 1. is worth color table
1 2 3 4 5 6 7 8 9
It is black 0 1 2 3 4 5 6 7 8
Orange 9 10 11 12 13 14 15 16 17
It is yellow 18 19 20 21 22 23 24 25 26
It is red 27 28 29 30 31 32 33 34 35
It is purple 36 37 38 39 40 41 42 43 44
It is blue 45 46 47 48 49 50 51 52 53
It is green 54 55 56 57 58 59 60 61 62
It is blue or green 63 64 65 66 67 68 69 70 71
The 1st false proof numerical value of behavior in table 1, the 1st is classified as false proof numerical value color, and other numerical value index numerical value for value color, such as 30 represent that the color that false proof numerical value is 4 and 4 is red.
Step 2: external system by parameter call start anti-counterfeiting information generating process, the parameter include ISN, Url and Prefix.System is false proof operation system, and ISN is the decimal value being pre-stored within false proof operation system in the present embodiment, from ISN can obtain all anti-counterfeiting information by algorithm.Url is website information, and prefix is self-defined, such as SC, is four valleies Abridge in area.
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification Code character is closed, and forms Quick Response Code.
Before again merging Url, prefix and ISN, ISN is subjected to multi-system conversion first, multi-system is in each numerical digit Represent that number, such as A represent that 10, B represents 11 etc. using more character, code length can be effectively compressed.Enter when using 33 System, can only with 4 character cans represent it is maximum up to 1185920 decimal number.
For example, call parameters are respectively:
ISN:3267944;
Url:http://www.cdxdl.com/Id=;
Prefix:SC;
By decimal system code comversion it is 33 systems in this example, 33 ary codes 11113RXVM is obtained by ISN 3267944;
The algorithm of check code is:Prefix, multibit code are encrypted, ASCII value is then taken to encrypted result and is added, Finally pair and modulus and add 1.
Original character string:SC11113RXVM;
After encryption:268804160B380F41188BFE41448A8521, the computations process are counted using conventional encryption Calculation method, is no longer specifically described in this example;
ASCII and:1759;
To 9 modulus and 1 is added to obtain check code:5;Wherein 9 be the item number of false proof numerical value, is worth color table the first behavior 1-9, is 9 The false proof numerical value of item.
The two-dimentional digital content ultimately generated is:
http://www.cdxdl.com/Id=SC11113RXVM5.
Step 4: taking one group to specify place value from the Quick Response Code of step 3, calculated and by result of calculation by being worth color index Value color corresponding to obtaining after the item number modulus of numerical value is indexed to value color table intermediate value color respectively and indexes numerical value, the according to value color in color table is worth Index scans for, and obtains indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and False proof numerical value color forms the false proof numerical information list with color data.
Calculating is encrypted from the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition, then from this From i-th, i+j in character string1-1、...、i+jn-1Position, common n positions take ASCII value to carry out ASCII calculating respectively, and result of calculation is to value Color indexes the item number modulus of numerical value, respectively obtains n value color index numerical value;Wherein, i is from character string integer-bit character from left to right, j For integer bit interval.
Specifically, i-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, obtain ASCII value summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
In this example:
Prefix, multibit code and check code are encrypted, then from encrypted characters string respectively from 34,36,38,40, 42 start to take ASCII value to be calculated, and obtain value color index list.
Original character string:SC11113RXVM5;
After encryption:
2B174C09F56606D9963F6163FBBE8C23FC17CF01C6F49A333757ABB2AF8BE0CA31C4492FD5F1B 08;
Take ASCII (so that first value color indexes as an example):34-36 positions are respectively 67,49,55
ASCII is added (so that first is worth color index as an example):67*1+49*2+55*3+1=331;
To 72 modulus (so that first is worth color index as an example):43 (72 index numerical value item number amount for value color table intermediate value color)
The five value colors index numerical value finally obtained is respectively 43,17,2,67,51.
By obtained value color index numerical value index value color table 1, value color index list as shown in table 2 is established.
Table 2. is worth color index list
According to value color index list, false proof numerical information list as shown in Figure 2 is obtained.
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof in picture library Picture sum modulus, obtains picture indices, and corresponding false proof picture is then obtained from picture library.
The process that picture indices calculate includes the character string for forming the prefix of the Quick Response Code of step 3, ISN and check code Calculating is encrypted, the ASCII of the character string after being encrypted and, modulus then is carried out to picture sum, obtains described figure Piece indexes.
In this example:
Original character string:SC11113RXVM5;
After encryption:268804160B380F41B81B1609F06ED677
ASCII and:1777;
To 6 modulus:1 (6 be picture sum);
1 is the 1st pictures as shown in Figure 3.
Step 6: false proof numerical information list and step 5 that the Quick Response Code that step 3 is formed, step 4 are formed obtain False proof picture combination producing security code information, as shown in Figure 4.
The character string id information that the security code information of generation also includes prefix and ISN forms.

Claims (7)

1. a kind of security code information generating method, it is characterised in that comprise the following steps:
Step 1: establishment value color table and picture library, described value color table is used to describe false proof numerical value, false proof numerical value color and value color The syntagmatic of numerical value three is indexed, picture library prestores several false proof pictures;
Step 2: external system is called by parameter, start anti-counterfeiting information generating process, the parameter include ISN, Url and Prefix;
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification code character Close, and form Quick Response Code;
Step 4: one group is taken to specify place value from the Quick Response Code of step 3, by being worth the calculating of color index and distinguishing result of calculation To obtaining corresponding value color index numerical value after the item number modulus of value color table intermediate value color index numerical value, according to value color indexes in color table is worth Scan for, obtain indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and false proof Numerical value color forms the false proof numerical information list with color data;
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof picture in picture library Total modulus, picture indices are obtained, corresponding false proof picture is then obtained from picture library;
Step 6: the false proof numerical information list that the Quick Response Code that step 3 is formed, step 4 are formed is prevented with what step 5 obtained Pseudo- picture combination producing security code information.
2. security code information generating method according to claim 1, it is characterised in that the external system described in step 2 For false proof operation system, ISN is the decimal value being pre-stored within false proof operation system, by Url, prefix in step 3 Merge with ISN, and be multibit code by described metric code comversion before calculating its check code.
3. security code information generating method according to claim 1 or 2, it is characterised in that in step 3, the meter of check code Calculation method is:Calculating is encrypted in the original character string that prefix and ISN form, the character string ASCII after then being encrypted With by ASCII and to the item number modulus of false proof numerical value and add 1, obtain described check code.
4. security code information generating method according to claim 1, it is characterised in that described value color index computational methods For:Calculating is encrypted from the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition, then from the character string In from i-th, i+j1-1、...、i+jn-1Position, common n positions take ASCII value to carry out ASCII calculating respectively, and result of calculation is to value color index The item number modulus of numerical value, respectively obtain n value color index numerical value;Wherein, i is integer-bit character, j are integer from left to right from character string Bit interval.
5. security code information generating method according to claim 4, it is characterised in that specifically,
I-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, ASCII value is obtained Summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
6. security code information generating method according to claim 1, it is characterised in that picture indices calculate in step 5 Process includes the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition calculating is encrypted, and is encrypted The ASCII of character string afterwards and, modulus then is carried out to picture sum, obtains described picture indices.
7. security code information generating method according to claim 1, it is characterised in that the security code information of step 6 generation Also include the character string id information of prefix and ISN composition.
CN201710641825.5A 2017-07-31 2017-07-31 Anti-counterfeiting code information generation method Active CN107423797B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710641825.5A CN107423797B (en) 2017-07-31 2017-07-31 Anti-counterfeiting code information generation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710641825.5A CN107423797B (en) 2017-07-31 2017-07-31 Anti-counterfeiting code information generation method

Publications (2)

Publication Number Publication Date
CN107423797A true CN107423797A (en) 2017-12-01
CN107423797B CN107423797B (en) 2020-11-06

Family

ID=60431766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710641825.5A Active CN107423797B (en) 2017-07-31 2017-07-31 Anti-counterfeiting code information generation method

Country Status (1)

Country Link
CN (1) CN107423797B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324349A (en) * 2019-07-08 2019-10-11 喻汝成 A kind of block chain big data security processing system and method
CN111382820A (en) * 2020-02-25 2020-07-07 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method
CN111612476A (en) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070115499A1 (en) * 2005-11-18 2007-05-24 Fuji Xerox Co., Ltd. Method and apparatus for making tags, tag, and system for managing articles
JP2009160089A (en) * 2007-12-28 2009-07-23 Daito Giken:Kk Game machine, game medium for game machine, and method of displaying code
CN102779456A (en) * 2011-05-11 2012-11-14 郑进 Anti-counterfeiting method through covering
CN103065177A (en) * 2012-12-14 2013-04-24 苏州阔地网络科技有限公司 Coding method and system of two-dimension code
CN103264529A (en) * 2013-04-25 2013-08-28 童丽娜 Production process of color digital-formatted numerological change corresponded tracing label
CN105117918A (en) * 2011-11-02 2015-12-02 李华容 Anti-counterfeit method based on two-dimensional code
CN105930892A (en) * 2016-04-22 2016-09-07 深圳活悦网络科技有限公司 Variable logo two-dimensional code anti-counterfeiting method and system
CN106204058A (en) * 2016-06-23 2016-12-07 合肥学院 A kind of colorful digital matrix two-dimensional code and method for anti-counterfeit thereof
CN206134114U (en) * 2016-08-31 2017-04-26 广州科琳电子科技有限公司 Colored two -dimensional code texture antifalsification label
CN106935131A (en) * 2017-03-30 2017-07-07 成都印钞有限公司 A kind of anti-fake two-dimension code
CN106952104A (en) * 2017-04-01 2017-07-14 厦门星码科技有限公司 It is a kind of to improve the method for anti-counterfeit and system of examination true and false efficiency

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070115499A1 (en) * 2005-11-18 2007-05-24 Fuji Xerox Co., Ltd. Method and apparatus for making tags, tag, and system for managing articles
JP2009160089A (en) * 2007-12-28 2009-07-23 Daito Giken:Kk Game machine, game medium for game machine, and method of displaying code
CN102779456A (en) * 2011-05-11 2012-11-14 郑进 Anti-counterfeiting method through covering
CN105117918A (en) * 2011-11-02 2015-12-02 李华容 Anti-counterfeit method based on two-dimensional code
CN103065177A (en) * 2012-12-14 2013-04-24 苏州阔地网络科技有限公司 Coding method and system of two-dimension code
CN103264529A (en) * 2013-04-25 2013-08-28 童丽娜 Production process of color digital-formatted numerological change corresponded tracing label
CN105930892A (en) * 2016-04-22 2016-09-07 深圳活悦网络科技有限公司 Variable logo two-dimensional code anti-counterfeiting method and system
CN106204058A (en) * 2016-06-23 2016-12-07 合肥学院 A kind of colorful digital matrix two-dimensional code and method for anti-counterfeit thereof
CN206134114U (en) * 2016-08-31 2017-04-26 广州科琳电子科技有限公司 Colored two -dimensional code texture antifalsification label
CN106935131A (en) * 2017-03-30 2017-07-07 成都印钞有限公司 A kind of anti-fake two-dimension code
CN106952104A (en) * 2017-04-01 2017-07-14 厦门星码科技有限公司 It is a kind of to improve the method for anti-counterfeit and system of examination true and false efficiency

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324349A (en) * 2019-07-08 2019-10-11 喻汝成 A kind of block chain big data security processing system and method
CN110324349B (en) * 2019-07-08 2020-11-24 天聚地合(苏州)数据股份有限公司 Block chain big data safety processing system
CN111382820A (en) * 2020-02-25 2020-07-07 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method
CN111382820B (en) * 2020-02-25 2021-10-12 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method
CN111612476A (en) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium
CN111612476B (en) * 2020-05-09 2023-04-07 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN107423797B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN108154208B (en) Article identification method, article identification method and article identification system based on two-dimensional code
CN107423797A (en) A kind of security code information generating method
CN101847225B (en) A kind of method based on CN39 code managing commodity circulation
CN104915847A (en) Double-code anti-counterfeiting bottle cap and manufacturing method thereof
CN108416223B (en) Information label encryption method and system based on chaos theory
CN112001467B (en) Commodity anti-counterfeiting code generation and identification method based on picture encryption and decryption
CN104794619B (en) Anti-channel conflict digital information mapping code method for commodity packaging
CN107944527A (en) A kind of encryption of anti-fake two-dimension code and coding/decoding method
CN108154207B (en) Anti-counterfeiting unique code generation and anti-counterfeiting verification method
CN105512523B (en) The digital watermark embedding and extracting method of a kind of anonymization
CN102855578A (en) Anti-counterfeiting method and anti-counterfeiting mark
CN104616389A (en) Stamp recognition method and device
CN103259621A (en) Encoding method and device of colorized three-dimensional codes and application method and system of colorized three-dimensional codes
CN108491915A (en) Commodity Quick Response Code application method and system
Liu et al. Secure KNN classification scheme based on homomorphic encryption for cyberspace
Majhi et al. Secure content‐based image retrieval using modified Euclidean distance for encrypted features
CN106250941A (en) Quick Response Code processing method, Apparatus and system
CN111881444B (en) Identity verification system based on encrypted tag algorithm and working method thereof
Bhatnagar et al. Product traceability using blockchain
CN104715382A (en) Product anti-fake method
CN111030810B (en) Anti-counterfeiting encryption method based on image local random transformation technology
US8714438B2 (en) Method for interactive false checking of a product by using colored 2 dimensional bar codes and a system for performing the same
US20160189015A1 (en) Data exchange methods, systems and apparatus using color images
CN115860768A (en) Tracing method and device based on block chain and electronic equipment thereof
CN107993079A (en) A kind of anti-channel conflict querying method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant