CN107423797A - A kind of security code information generating method - Google Patents
A kind of security code information generating method Download PDFInfo
- Publication number
- CN107423797A CN107423797A CN201710641825.5A CN201710641825A CN107423797A CN 107423797 A CN107423797 A CN 107423797A CN 201710641825 A CN201710641825 A CN 201710641825A CN 107423797 A CN107423797 A CN 107423797A
- Authority
- CN
- China
- Prior art keywords
- value
- false proof
- picture
- numerical value
- isn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/5866—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention discloses a kind of security code information generating method, comprise the following steps:Step 1: establishment value color table and picture library;Step 2: external system starts anti-counterfeiting information generating process by parameter call, the parameter includes ISN, Url and prefix;Step 3: Url, prefix and ISN are merged, and its check code is calculated, then combined Url, prefix, ISN and check code, and form Quick Response Code;Step 4: generate false proof numerical information list;Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof picture sum modulus in picture library, obtain picture indices, corresponding false proof picture is then obtained from picture library;Step 6: the false proof picture combination producing security code information that the false proof numerical information list that the Quick Response Code that step 3 is formed, step 4 are formed obtains with step 5.The security code information generating method of the present invention, call simply, data storage pressure is small.
Description
Technical field
The invention belongs to anti-counterfeiting information technical field, and in particular to a kind of security code information generating method.
Background technology
With it is scientific and technical it is constantly progressive, economical continue to develop, increasing counterfeit and shoddy goods have become through
The outstanding problem presented in Ji evolution, the presence of counterfeit and shoddy goods, has not only encroached on the interests of consumers in general, simultaneously
Also serious economic loss is brought to manufacture, sale manufacturer, very disruptive civil order, therefore, on many products all
Meeting antiforge code, the mark to be used as identification counterfeit and shoddy goods.But the method for generating security code at present, data be present
Amount of storage is big, calls the problem of complicated.
The content of the invention
It is an object of the invention to:For problems of the prior art, there is provided a kind of security code information generating method,
Memory data output pressure is small, it is simple to call.
To achieve these goals, the technical solution adopted by the present invention is:
A kind of security code information generating method, comprises the following steps:
Step 1: establishment value color table and picture library, described value color table be used to describing false proof numerical value, false proof numerical value color with
It is worth the syntagmatic of color index numerical value three, picture library prestores several false proof pictures;
Step 2: external system by parameter call, starts anti-counterfeiting information generating process, the parameter include ISN, Url and
Prefix;
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification
Code character is closed, and forms Quick Response Code;
Step 4: taking one group to specify place value from the Quick Response Code of step 3, calculated and by result of calculation by being worth color index
Value color corresponding to obtaining after the item number modulus of numerical value is indexed to value color table intermediate value color respectively and indexes numerical value, the according to value color in color table is worth
Index scans for, and obtains indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and
False proof numerical value color forms the false proof numerical information list with color data;
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof in picture library
Picture sum modulus, obtains picture indices, and corresponding false proof picture is then obtained from picture library;
Step 6: false proof numerical information list and step 5 that the Quick Response Code that step 3 is formed, step 4 are formed obtain
False proof picture combination producing security code information.
Preferably, the external system described in step 2 is false proof operation system, and ISN is to be pre-stored within false proof business
Decimal value in system, Url, prefix and ISN are merged in step 3, and before calculating its check code, by described ten
The code comversion of system is multibit code.
Preferably, in step 3, the computational methods of check code are:The original character string that prefix and ISN form is added
Close calculating, character string ASCII after then being encrypted and, by ASCII and to the item number modulus of false proof numerical value and add 1, obtain
Described check code.
Preferably, described value color index computational methods are:From the prefix of the Quick Response Code of step 3, ISN and verification code character
Into character string calculating is encrypted, then from i-th, i+j from the character string1-1、...、i+jn-1Position, common n positions take respectively
ASCII value carries out ASCII calculating, and result of calculation respectively obtains n value color index number to the item number modulus of value color index numerical value
Value;Wherein, i is integer-bit character, j are integer bit interval from left to right from character string.
It is further preferred that specifically,
I-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, obtain
ASCII value summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
Preferably, the process that picture indices calculate in step 5 is included the prefix of the Quick Response Code of step 3, ISN and school
Test code composition character string calculatings is encrypted, the ASCII of the character string after being encrypted with, then picture sum is taken
Mould, obtain described picture indices.
Preferably, the character string id information that the security code information of step 6 generation also includes prefix and ISN forms.
By adopting the above-described technical solution, the beneficial effects of the invention are as follows:
The false proof code generating method of the present invention, enumerate tag ID, two-dimensional code data, fake certification numeral and color, prevent
The information such as pseudo- picture, Cipher Strength is high, is not easy to crack;Only need to provide Url, prefix, ISN during calling, the algorithm can generate
All anti-counterfeiting information, call simply, generation is convenient;The corresponding relation that need not be established between ISN, bar code and anti-counterfeiting information
Data, considerably reduce data storage pressure.
Brief description of the drawings
Fig. 1 is three groups of security code hum patterns of the present invention.
Fig. 2 is the false proof numerical information list figure of the present invention.
Fig. 3 is the false proof picture figure of the present invention.
Fig. 4 is the security code information each several part pie graph of the present invention.
Embodiment
A kind of security code information generating method as shown in Figure 1 of the present invention, comprises the following steps:
Step 1: establishment value color table and picture library, described value color table be used to describing false proof numerical value, false proof numerical value color with
It is worth the syntagmatic of color index numerical value three, picture library prestores several false proof pictures.
By a two-dimensional table, the combination of value and color can be described, the table is referred to as value color table, as shown in table 1.
Table 1. is worth color table
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | |
It is black | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
Orange | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 |
It is yellow | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 |
It is red | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 |
It is purple | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 |
It is blue | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 |
It is green | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 |
It is blue or green | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 |
The 1st false proof numerical value of behavior in table 1, the 1st is classified as false proof numerical value color, and other numerical value index numerical value for value color, such as
30 represent that the color that false proof numerical value is 4 and 4 is red.
Step 2: external system by parameter call start anti-counterfeiting information generating process, the parameter include ISN, Url and
Prefix.System is false proof operation system, and ISN is the decimal value being pre-stored within false proof operation system in the present embodiment, from
ISN can obtain all anti-counterfeiting information by algorithm.Url is website information, and prefix is self-defined, such as SC, is four valleies
Abridge in area.
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification
Code character is closed, and forms Quick Response Code.
Before again merging Url, prefix and ISN, ISN is subjected to multi-system conversion first, multi-system is in each numerical digit
Represent that number, such as A represent that 10, B represents 11 etc. using more character, code length can be effectively compressed.Enter when using 33
System, can only with 4 character cans represent it is maximum up to 1185920 decimal number.
For example, call parameters are respectively:
ISN:3267944;
Url:http://www.cdxdl.com/Id=;
Prefix:SC;
By decimal system code comversion it is 33 systems in this example, 33 ary codes 11113RXVM is obtained by ISN 3267944;
The algorithm of check code is:Prefix, multibit code are encrypted, ASCII value is then taken to encrypted result and is added,
Finally pair and modulus and add 1.
Original character string:SC11113RXVM;
After encryption:268804160B380F41188BFE41448A8521, the computations process are counted using conventional encryption
Calculation method, is no longer specifically described in this example;
ASCII and:1759;
To 9 modulus and 1 is added to obtain check code:5;Wherein 9 be the item number of false proof numerical value, is worth color table the first behavior 1-9, is 9
The false proof numerical value of item.
The two-dimentional digital content ultimately generated is:
http://www.cdxdl.com/Id=SC11113RXVM5.
Step 4: taking one group to specify place value from the Quick Response Code of step 3, calculated and by result of calculation by being worth color index
Value color corresponding to obtaining after the item number modulus of numerical value is indexed to value color table intermediate value color respectively and indexes numerical value, the according to value color in color table is worth
Index scans for, and obtains indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and
False proof numerical value color forms the false proof numerical information list with color data.
Calculating is encrypted from the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition, then from this
From i-th, i+j in character string1-1、...、i+jn-1Position, common n positions take ASCII value to carry out ASCII calculating respectively, and result of calculation is to value
Color indexes the item number modulus of numerical value, respectively obtains n value color index numerical value;Wherein, i is from character string integer-bit character from left to right, j
For integer bit interval.
Specifically, i-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, obtain
ASCII value summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
In this example:
Prefix, multibit code and check code are encrypted, then from encrypted characters string respectively from 34,36,38,40,
42 start to take ASCII value to be calculated, and obtain value color index list.
Original character string:SC11113RXVM5;
After encryption:
2B174C09F56606D9963F6163FBBE8C23FC17CF01C6F49A333757ABB2AF8BE0CA31C4492FD5F1B
08;
Take ASCII (so that first value color indexes as an example):34-36 positions are respectively 67,49,55
ASCII is added (so that first is worth color index as an example):67*1+49*2+55*3+1=331;
To 72 modulus (so that first is worth color index as an example):43 (72 index numerical value item number amount for value color table intermediate value color)
The five value colors index numerical value finally obtained is respectively 43,17,2,67,51.
By obtained value color index numerical value index value color table 1, value color index list as shown in table 2 is established.
Table 2. is worth color index list
According to value color index list, false proof numerical information list as shown in Figure 2 is obtained.
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof in picture library
Picture sum modulus, obtains picture indices, and corresponding false proof picture is then obtained from picture library.
The process that picture indices calculate includes the character string for forming the prefix of the Quick Response Code of step 3, ISN and check code
Calculating is encrypted, the ASCII of the character string after being encrypted and, modulus then is carried out to picture sum, obtains described figure
Piece indexes.
In this example:
Original character string:SC11113RXVM5;
After encryption:268804160B380F41B81B1609F06ED677
ASCII and:1777;
To 6 modulus:1 (6 be picture sum);
1 is the 1st pictures as shown in Figure 3.
Step 6: false proof numerical information list and step 5 that the Quick Response Code that step 3 is formed, step 4 are formed obtain
False proof picture combination producing security code information, as shown in Figure 4.
The character string id information that the security code information of generation also includes prefix and ISN forms.
Claims (7)
1. a kind of security code information generating method, it is characterised in that comprise the following steps:
Step 1: establishment value color table and picture library, described value color table is used to describe false proof numerical value, false proof numerical value color and value color
The syntagmatic of numerical value three is indexed, picture library prestores several false proof pictures;
Step 2: external system is called by parameter, start anti-counterfeiting information generating process, the parameter include ISN, Url and
Prefix;
Step 3: Url, prefix and ISN are merged, and its check code is calculated, then by Url, prefix, ISN and verification code character
Close, and form Quick Response Code;
Step 4: one group is taken to specify place value from the Quick Response Code of step 3, by being worth the calculating of color index and distinguishing result of calculation
To obtaining corresponding value color index numerical value after the item number modulus of value color table intermediate value color index numerical value, according to value color indexes in color table is worth
Scan for, obtain indexing the corresponding false proof numerical value of numerical value and false proof numerical value color with value color, according to false proof numerical value and false proof
Numerical value color forms the false proof numerical information list with color data;
Step 5: from the Quick Response Code of step 3, calculated by picture indices and by result of calculation to false proof picture in picture library
Total modulus, picture indices are obtained, corresponding false proof picture is then obtained from picture library;
Step 6: the false proof numerical information list that the Quick Response Code that step 3 is formed, step 4 are formed is prevented with what step 5 obtained
Pseudo- picture combination producing security code information.
2. security code information generating method according to claim 1, it is characterised in that the external system described in step 2
For false proof operation system, ISN is the decimal value being pre-stored within false proof operation system, by Url, prefix in step 3
Merge with ISN, and be multibit code by described metric code comversion before calculating its check code.
3. security code information generating method according to claim 1 or 2, it is characterised in that in step 3, the meter of check code
Calculation method is:Calculating is encrypted in the original character string that prefix and ISN form, the character string ASCII after then being encrypted
With by ASCII and to the item number modulus of false proof numerical value and add 1, obtain described check code.
4. security code information generating method according to claim 1, it is characterised in that described value color index computational methods
For:Calculating is encrypted from the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition, then from the character string
In from i-th, i+j1-1、...、i+jn-1Position, common n positions take ASCII value to carry out ASCII calculating respectively, and result of calculation is to value color index
The item number modulus of numerical value, respectively obtain n value color index numerical value;Wherein, i is integer-bit character, j are integer from left to right from character string
Bit interval.
5. security code information generating method according to claim 4, it is characterised in that specifically,
I-th bit manipulative indexing value is calculated as taking the i-th, ASCII value of i+1, i+2 position respectively;
According to (i-th bit ASCII value * 1)+(i+1 bit ASCII value * 2)+(i+1 bit ASCII value * 3)+1, ASCII value is obtained
Summation;
Item number modulus by above-mentioned ASCII value summation to value color index numerical value, obtains index value corresponding to i-th bit;
According to above-mentioned computational methods, remaining n-1 value color index numerical value is calculated successively.
6. security code information generating method according to claim 1, it is characterised in that picture indices calculate in step 5
Process includes the character string of the prefix of the Quick Response Code of step 3, ISN and check code composition calculating is encrypted, and is encrypted
The ASCII of character string afterwards and, modulus then is carried out to picture sum, obtains described picture indices.
7. security code information generating method according to claim 1, it is characterised in that the security code information of step 6 generation
Also include the character string id information of prefix and ISN composition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710641825.5A CN107423797B (en) | 2017-07-31 | 2017-07-31 | Anti-counterfeiting code information generation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710641825.5A CN107423797B (en) | 2017-07-31 | 2017-07-31 | Anti-counterfeiting code information generation method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107423797A true CN107423797A (en) | 2017-12-01 |
CN107423797B CN107423797B (en) | 2020-11-06 |
Family
ID=60431766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710641825.5A Active CN107423797B (en) | 2017-07-31 | 2017-07-31 | Anti-counterfeiting code information generation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107423797B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110324349A (en) * | 2019-07-08 | 2019-10-11 | 喻汝成 | A kind of block chain big data security processing system and method |
CN111382820A (en) * | 2020-02-25 | 2020-07-07 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
CN111612476A (en) * | 2020-05-09 | 2020-09-01 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070115499A1 (en) * | 2005-11-18 | 2007-05-24 | Fuji Xerox Co., Ltd. | Method and apparatus for making tags, tag, and system for managing articles |
JP2009160089A (en) * | 2007-12-28 | 2009-07-23 | Daito Giken:Kk | Game machine, game medium for game machine, and method of displaying code |
CN102779456A (en) * | 2011-05-11 | 2012-11-14 | 郑进 | Anti-counterfeiting method through covering |
CN103065177A (en) * | 2012-12-14 | 2013-04-24 | 苏州阔地网络科技有限公司 | Coding method and system of two-dimension code |
CN103264529A (en) * | 2013-04-25 | 2013-08-28 | 童丽娜 | Production process of color digital-formatted numerological change corresponded tracing label |
CN105117918A (en) * | 2011-11-02 | 2015-12-02 | 李华容 | Anti-counterfeit method based on two-dimensional code |
CN105930892A (en) * | 2016-04-22 | 2016-09-07 | 深圳活悦网络科技有限公司 | Variable logo two-dimensional code anti-counterfeiting method and system |
CN106204058A (en) * | 2016-06-23 | 2016-12-07 | 合肥学院 | A kind of colorful digital matrix two-dimensional code and method for anti-counterfeit thereof |
CN206134114U (en) * | 2016-08-31 | 2017-04-26 | 广州科琳电子科技有限公司 | Colored two -dimensional code texture antifalsification label |
CN106935131A (en) * | 2017-03-30 | 2017-07-07 | 成都印钞有限公司 | A kind of anti-fake two-dimension code |
CN106952104A (en) * | 2017-04-01 | 2017-07-14 | 厦门星码科技有限公司 | It is a kind of to improve the method for anti-counterfeit and system of examination true and false efficiency |
-
2017
- 2017-07-31 CN CN201710641825.5A patent/CN107423797B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070115499A1 (en) * | 2005-11-18 | 2007-05-24 | Fuji Xerox Co., Ltd. | Method and apparatus for making tags, tag, and system for managing articles |
JP2009160089A (en) * | 2007-12-28 | 2009-07-23 | Daito Giken:Kk | Game machine, game medium for game machine, and method of displaying code |
CN102779456A (en) * | 2011-05-11 | 2012-11-14 | 郑进 | Anti-counterfeiting method through covering |
CN105117918A (en) * | 2011-11-02 | 2015-12-02 | 李华容 | Anti-counterfeit method based on two-dimensional code |
CN103065177A (en) * | 2012-12-14 | 2013-04-24 | 苏州阔地网络科技有限公司 | Coding method and system of two-dimension code |
CN103264529A (en) * | 2013-04-25 | 2013-08-28 | 童丽娜 | Production process of color digital-formatted numerological change corresponded tracing label |
CN105930892A (en) * | 2016-04-22 | 2016-09-07 | 深圳活悦网络科技有限公司 | Variable logo two-dimensional code anti-counterfeiting method and system |
CN106204058A (en) * | 2016-06-23 | 2016-12-07 | 合肥学院 | A kind of colorful digital matrix two-dimensional code and method for anti-counterfeit thereof |
CN206134114U (en) * | 2016-08-31 | 2017-04-26 | 广州科琳电子科技有限公司 | Colored two -dimensional code texture antifalsification label |
CN106935131A (en) * | 2017-03-30 | 2017-07-07 | 成都印钞有限公司 | A kind of anti-fake two-dimension code |
CN106952104A (en) * | 2017-04-01 | 2017-07-14 | 厦门星码科技有限公司 | It is a kind of to improve the method for anti-counterfeit and system of examination true and false efficiency |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110324349A (en) * | 2019-07-08 | 2019-10-11 | 喻汝成 | A kind of block chain big data security processing system and method |
CN110324349B (en) * | 2019-07-08 | 2020-11-24 | 天聚地合(苏州)数据股份有限公司 | Block chain big data safety processing system |
CN111382820A (en) * | 2020-02-25 | 2020-07-07 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
CN111382820B (en) * | 2020-02-25 | 2021-10-12 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
CN111612476A (en) * | 2020-05-09 | 2020-09-01 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
CN111612476B (en) * | 2020-05-09 | 2023-04-07 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107423797B (en) | 2020-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108154208B (en) | Article identification method, article identification method and article identification system based on two-dimensional code | |
CN107423797A (en) | A kind of security code information generating method | |
CN101847225B (en) | A kind of method based on CN39 code managing commodity circulation | |
CN104915847A (en) | Double-code anti-counterfeiting bottle cap and manufacturing method thereof | |
CN108416223B (en) | Information label encryption method and system based on chaos theory | |
CN112001467B (en) | Commodity anti-counterfeiting code generation and identification method based on picture encryption and decryption | |
CN104794619B (en) | Anti-channel conflict digital information mapping code method for commodity packaging | |
CN107944527A (en) | A kind of encryption of anti-fake two-dimension code and coding/decoding method | |
CN108154207B (en) | Anti-counterfeiting unique code generation and anti-counterfeiting verification method | |
CN105512523B (en) | The digital watermark embedding and extracting method of a kind of anonymization | |
CN102855578A (en) | Anti-counterfeiting method and anti-counterfeiting mark | |
CN104616389A (en) | Stamp recognition method and device | |
CN103259621A (en) | Encoding method and device of colorized three-dimensional codes and application method and system of colorized three-dimensional codes | |
CN108491915A (en) | Commodity Quick Response Code application method and system | |
Liu et al. | Secure KNN classification scheme based on homomorphic encryption for cyberspace | |
Majhi et al. | Secure content‐based image retrieval using modified Euclidean distance for encrypted features | |
CN106250941A (en) | Quick Response Code processing method, Apparatus and system | |
CN111881444B (en) | Identity verification system based on encrypted tag algorithm and working method thereof | |
Bhatnagar et al. | Product traceability using blockchain | |
CN104715382A (en) | Product anti-fake method | |
CN111030810B (en) | Anti-counterfeiting encryption method based on image local random transformation technology | |
US8714438B2 (en) | Method for interactive false checking of a product by using colored 2 dimensional bar codes and a system for performing the same | |
US20160189015A1 (en) | Data exchange methods, systems and apparatus using color images | |
CN115860768A (en) | Tracing method and device based on block chain and electronic equipment thereof | |
CN107993079A (en) | A kind of anti-channel conflict querying method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |