CN107481013A - A kind of digital authentication method of one yard of multiple-effect - Google Patents

A kind of digital authentication method of one yard of multiple-effect Download PDF

Info

Publication number
CN107481013A
CN107481013A CN201710507542.1A CN201710507542A CN107481013A CN 107481013 A CN107481013 A CN 107481013A CN 201710507542 A CN201710507542 A CN 201710507542A CN 107481013 A CN107481013 A CN 107481013A
Authority
CN
China
Prior art keywords
information
quick response
response code
machine
yard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710507542.1A
Other languages
Chinese (zh)
Inventor
邱艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710507542.1A priority Critical patent/CN107481013A/en
Publication of CN107481013A publication Critical patent/CN107481013A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of digital authentication method of one yard of multiple-effect, and it is presented the checking character information for informationization application in the form of Quick Response Code+authentication secret area;The content of Quick Response Code is preposition guiding concatenation character+checking character string, by enterprise's AES preset in advance, subsequently further according to two-dimension code pattern corresponding to the generation of Quick Response Code create-rule;The checking content in authentication secret area is the various information-based information that can be extracted, and combined with the character information of preposition Quick Response Code, and content corresponds with Quick Response Code, turns into the assembly of verification mode;Validation region using coating cover or open-type material blocks by the way of stash, validation region is the important component of authentication secret, and its combined information can inquire about in the system for generating its content, verify and information processing.It is a kind of digital authentication method that can carry out having both one yard of multiple-effect of function such as logistics management, information tracing, integration realization while anti-counterfeit recognition again to product.

Description

A kind of digital authentication method of one yard of multiple-effect
Technical field
The invention belongs to digital authentication method technical field, particularly relates to a kind of digital authenticating side of one yard of multiple-effect Method.
Background technology
Want to realize both for the application mostly single application using numeral, character or both combination in industry at present Can anti-counterfeit recognition have both again logistics management, information tracing, integration realize etc. function, need by the recognition to multiple machine-readable codes more To complete, such as Quick Response Code adds combining form of logistics bar code etc., in this case, results in the face that carrier is presented in information Product is excessive, while the recognition between machine-readable code has interference.For enterprise, it is necessary to by multiple systems, a variety of recognition instruments, Operation is become complex, also considerably increase the expense cost of enterprise;Other software systems are complicated, cause the stabilization of system Property it is poor, for business administration also greatly inconvenience.
The content of the invention
The present invention is in order to overcome the shortcomings of the prior art, there is provided while one kind can carry out anti-counterfeit recognition to product Have both the digital authentication method of one yard of multiple-effect of function such as logistics management, information tracing, integration realization again.
The present invention is achieved by the following technical solutions:A kind of digital authentication method of one yard of multiple-effect, it will be used for letter The checking character information of breathization application is presented in the form of Quick Response Code+authentication secret area;
The content of Quick Response Code is to verify a part for character information, and the content of Quick Response Code is preposition guiding concatenation character+authenticator Symbol string, by enterprise's AES preset in advance, subsequently further according to two-dimension code pattern corresponding to the generation of Quick Response Code create-rule;
Authentication secret area is the part for verifying character information, and the checking content in authentication secret area is the various information that can be extracted Change information, and it is combined with the character information of preposition Quick Response Code, and content corresponds with Quick Response Code, turns into the group of verification mode It is fit;
Validation region is covered using coating or the Stealth Modus of open-type material blocks stashes, and validation region is authentication secret Important component, its combined information can inquire about in the system for generating its content, verify and information processing.
The realization of the digital authentication method of one yard of multiple-effect of the invention specifically comprises the following steps:
A, system software generation encrypted characters link:
Software systems are according to customer demand, and with multiple encryption algorithms, software systems generate one group of unduplicated character string, system Later stage reversely decrypts the unique string as needed, and after generating character string, software utilizes machine-readable code create-rule, then should Character string changes into the figure of machine-readable code form, and the figure of other machine-readable code forms, example can also be converted into according to transformation rule Such as Quick Response Code form;
B, endowed link:
The file of figure is provided by software systems, and transfers to that the machine-readable code is carried out under line to utilize coding, laser, mark, printing The endowed article in specified by enterprise of mode on, in combination with company information, company information is enterprise name, network address, phase Word description etc. is closed, so, enterprise is specified on article or commodity a unduplicated machine-readable code figure;
C, information loading operation:
Software systems produce the information needed for the pre-defined enterprise of machine sensible information, or are distinguished subsequently through machine-readable device scan After gather enter row information into software systems after define, the figure can be identified by the machine-readable equipment such as mobile phone or scanner;
D, the true and false is checked:
When the article that the product of customer scans purchase or mandate scan, software systems can be according to the corresponding word received Information is accorded with, after system differentiates authenticity of products result, by object information immediate feedback to consumer.
The machine-readable code is applied to fake certification, falsifying management, warehousing management, material flow tracking, logistics retrospect, product by enterprise The fields such as integration, the character information after the scanning patter can be updated interaction by network and software systems server, it As enterprise software system leading information gather figure, with reference to software systems support can complete one machine-readable code of client it is a variety of should Use demand.Software systems are provided or developed by software house and realized.
The maximum difference of the machine-readable code of the present invention is to win out by the encryption information of part, is separately hidden on carrier, Last combination application.Consumer, can be by scanning the machine-readable code plus local after buying or obtaining article examination and authorize The information combination of hidden parts, obtains rapidly true and false information.Meanwhile the machine-readable code does not have to cover because taking into account antiforge function With stash, this is can not to take into account completion before single machine-readable code to complete, it is necessary to close by increasing other machine-readable code character.It is existing Can in this way realized with a machine-readable code false proof and other information and purposes.In the whole thing of client Stream process, business promotion process, enterprise information system management during serve as one yard of a thing figure collection effect, can be fast Speed realizes customer demand.
The beneficial effects of the invention are as follows:The present invention uses the digital authentication method of one yard of multiple-effect, and most critical is light reality Showed the copy-resistant effect of Quick Response Code, also achieve have both logistics management again while being identified to product false proof, information chases after Trace back, integrate the functions such as realization, the collection of the digital identity of warehousing management can be achieved with the scanning of machine-readable decoding apparatus, and then complete out Be put in storage, the foundation of the Data-Link of information system management, the situation for avoiding the mutual recognition interference of multiple machine-readable codes occurs, and adds simultaneously The carrier area of carrier aircraft reading code significantly reduces, and system operatio is simple, enterprise can be greatly reduced production cost, and easy to operate, The quick loading of management information that is more convenient and then realizing enterprise's Internet of Things application field.
Checking character information purpose in the present invention is extensive, and different functions can be realized for different objects:Function one: To consumer's object, this Quick Response Code can be scanned, and combine authentication secret area to carry out the fake certification of product;Function two:To enterprise Industry object, this Quick Response Code can be scanned, and combine authentication secret area to carry out the material flow tracking of product, carry out dealer management, thing Anti-channel conflict application etc. is flowed, while can also realize the information tracing to product;Function three:, can to consumer, channel reseller's object Scan this number and participate in prize drawing, the marketing activity such as accumulated point exchanging that enterprise holds;Function four:To Enterprise Object, can easily pass through The digital identification authentication loading that the Quick Response Code realizes in-out-storehouse management is gathered, enterprise's self information systematic difference can be all based on The gathering of the Quick Response Code, multiple information definition are realized.
Brief description of the drawings
Fig. 1 is the loading area schematic diagram of two or more machine-readable codes in traditional approach;
The present invention omits the citing of other combining forms more than two or more multiple machine-readable codes;
Fig. 2 is the loading area schematic diagram of the machine-readable code of only one in digital authentication method of the present invention:
Form:Security code character information (Quick Response Code, not hiding)+identifying code(Short character information, it need to hide).
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
As shown in Fig. 2 a kind of digital authentication method of one yard of multiple-effect, its checking character information that will be applied for informationization Presented in the form of Quick Response Code+authentication secret area;
The content of Quick Response Code is to verify a part for character information, and the content of Quick Response Code is preposition guiding concatenation character+authenticator Symbol string, by enterprise's AES preset in advance, subsequently further according to two-dimension code pattern corresponding to the generation of Quick Response Code create-rule;
Authentication secret area is the part for verifying character information, and the checking content in authentication secret area is the various information that can be extracted Change information, and it is combined with the character information of preposition Quick Response Code, and content corresponds with Quick Response Code, turns into the group of verification mode It is fit;
Validation region is covered using coating or the Stealth Modus of open-type material blocks stashes, and validation region is authentication secret Important component, its combined information can inquire about in the system for generating its content, verify and information processing.
The realization of the digital authentication method of one yard of multiple-effect of the invention specifically comprises the following steps:
A, system software generation encrypted characters link:
Software systems are according to customer demand, and with multiple encryption algorithms, software systems generate one group of unduplicated character string, system Later stage reversely decrypts the unique string as needed, and after generating character string, software utilizes machine-readable code create-rule, then should Character string changes into the figure of machine-readable code form, and the figure of other machine-readable code forms, example can also be converted into according to transformation rule Such as Quick Response Code form;
B, endowed link:
The file of figure is provided by software systems, and transfers to that the machine-readable code is carried out under line to utilize coding, laser, mark, printing The endowed article in specified by enterprise of mode on, in combination with company information, company information is enterprise name, network address, phase Word description etc. is closed, so, enterprise is specified on article or commodity a unduplicated machine-readable code figure;
C, information loading operation:
Software systems produce the information needed for the pre-defined enterprise of machine sensible information, or are distinguished subsequently through machine-readable device scan After gather enter row information into software systems after define, the figure can be identified by the machine-readable equipment such as mobile phone or scanner;
D, the true and false is checked:
When the article that the product of customer scans purchase or mandate scan, software systems can be according to the corresponding word received Accord with information, differentiate authenticity of products result after by object information immediate feedback to consumer.
The machine-readable code is applied to fake certification, falsifying management, warehousing management, material flow tracking, logistics retrospect, product by enterprise The fields such as integration, the character information after the scanning patter can be updated interaction by network and software systems server, it Figure is gathered as the leading information of enterprise software system, a series of demands of client can be completed with reference to software background support.Software System is provided or developed by software house and realized.
Finally it should be noted that above content is merely illustrative of the technical solution of the present invention, rather than the present invention is protected The limitation of scope, the simple modification or equivalent substitution that one of ordinary skill in the art is carried out to technical scheme, All without departing from the spirit and scope of technical solution of the present invention.

Claims (4)

  1. A kind of 1. digital authentication method of one yard of multiple-effect, it is characterised in that:The digital authentication method will be used for information-based application Checking character information presented in the form of Quick Response Code+authentication secret area;
    The content of the Quick Response Code is to verify a part for character information, and the content of Quick Response Code is preposition guiding concatenation character+test Character string is demonstrate,proved, by enterprise's AES preset in advance, subsequently further according to Quick Response Code corresponding to the generation of Quick Response Code create-rule Figure;
    The authentication secret area is the part for verifying character information, and the checking content in authentication secret area is various for that can extract Information-based information, and it is combined with the character information of preposition Quick Response Code, and content corresponds with Quick Response Code, turns into verification mode Assembly;
    Validation region is stashed by the way of coating covering or open-type material blocks, and validation region is the weight of authentication secret Part is wanted, its combined information can be inquired about in the system for generating its content, verified and information processing.
  2. A kind of 2. digital authentication method of one yard of multiple-effect according to claim 1, it is characterised in that:One yard of multiple-effect The realization of digital authentication method specifically comprises the following steps:
    A, system software generation encrypted characters link:
    Software systems are according to customer demand, and with multiple encryption algorithms, software systems generate one group of unduplicated character string, system Later stage reversely decrypts the unique string as needed, and after generating character string, software utilizes machine-readable code create-rule, then should Character string changes into the figure of machine-readable code form;
    B, endowed link:
    The file of figure is provided by software systems, and transfers to that the machine-readable code is carried out under line to utilize coding, laser, mark, printing The endowed article in specified by enterprise of mode on, enterprise is specified on article or commodity in combination with company information has one Individual unduplicated machine-readable code figure;
    C, information loading operation:
    Software systems generate variable machine sensible information, can pre-define the information needed for enterprise, or pass through machine-readable device scan Information is gathered after recognition, is defined after row information is entered inside software systems, the figure that the information is generated can by mobile phone or The machine-readable equipment such as scanner is identified;
    D, the true and false is checked:
    When the article that the product of customer scans purchase or mandate scan, software systems can be according to the corresponding word received Information is accorded with, after differentiating authenticity of products result, by object information immediate feedback to consumer.
  3. A kind of 3. digital authentication method of one yard of multiple-effect according to claim 1 or 2, it is characterised in that:It is described more than one yard The digital authentication method of effect is by a machine-readable code simultaneously applied to fake certification, falsifying management, warehousing management, material flow tracking, thing Stream traces and product integration field, and the character information after scanning patter is updated friendship by network and software systems server Mutually;Machine-readable code turns into the leading information collection figure of enterprise software system, with reference to the background support of software systems, disclosure satisfy that visitor The demand of the machine-readable a variety of applications of code in one, family.
  4. A kind of 4. digital authentication method of one yard of multiple-effect according to claim 1 or 2, it is characterised in that:It is described more than one yard The software systems of the digital authentication method of effect are provided or developed by software house and realized.
CN201710507542.1A 2017-06-28 2017-06-28 A kind of digital authentication method of one yard of multiple-effect Pending CN107481013A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710507542.1A CN107481013A (en) 2017-06-28 2017-06-28 A kind of digital authentication method of one yard of multiple-effect

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710507542.1A CN107481013A (en) 2017-06-28 2017-06-28 A kind of digital authentication method of one yard of multiple-effect

Publications (1)

Publication Number Publication Date
CN107481013A true CN107481013A (en) 2017-12-15

Family

ID=60594917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710507542.1A Pending CN107481013A (en) 2017-06-28 2017-06-28 A kind of digital authentication method of one yard of multiple-effect

Country Status (1)

Country Link
CN (1) CN107481013A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764420A (en) * 2018-04-24 2018-11-06 中国人民银行印制科学技术研究所 A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods
CN113627578A (en) * 2021-08-09 2021-11-09 中国物品编码中心 Two-dimensional code generation method, two-dimensional code recognition device, two-dimensional code, equipment and medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722824A (en) * 2012-06-06 2012-10-10 李利民 Method for distinguishing authenticity of goods by using bar codes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722824A (en) * 2012-06-06 2012-10-10 李利民 Method for distinguishing authenticity of goods by using bar codes

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764420A (en) * 2018-04-24 2018-11-06 中国人民银行印制科学技术研究所 A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods
CN113627578A (en) * 2021-08-09 2021-11-09 中国物品编码中心 Two-dimensional code generation method, two-dimensional code recognition device, two-dimensional code, equipment and medium
CN113627578B (en) * 2021-08-09 2024-02-09 中国物品编码中心 Two-dimensional code generation method, identification device, two-dimensional code, device and medium

Similar Documents

Publication Publication Date Title
US20210342957A1 (en) Secure and traceable manufactured parts
JP7387596B2 (en) safety tag
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
JP6214771B2 (en) System and method for verifying clock synchronous dynamic password forgery prevention label legality in real time
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
EP3721578A1 (en) Methods and systems for recovering data using dynamic passwords
CN107431622A (en) The blocking tracking in supply chain occurs
US20150012444A1 (en) Mobile peer-to-peer authenticated transfers
CN107430755A (en) The encrypted authentication in source in supply chain
CN107230050B (en) Method and system for paying digital currency based on visible digital currency chip card
CN107636662A (en) Web content certification
CN107316381A (en) A kind of sales counter information processing method, terminal and business handling system
CN104463647A (en) Electronic invoice-based electronic posting method and system and electronic invoice client
CN102238193A (en) Data authentication method and system using same
CN104766113A (en) Plain and secret code type anti-fake label and anti-fake method thereof
CN105184590A (en) Laser on-line efficient etching and product anti-fake traceability system applied to steels
JP2017117301A (en) Ticket issuing system
CN107240010B (en) Method and system for transferring digital currency to digital currency chip card
US20210272107A1 (en) Digital currency payment system, payment method and payment apparatus
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
CN109146528A (en) Antiforge method for commodities and system based on block chain
CN104361494A (en) Bank counter authorization and certification method and system based on fingerprint recognition
CN104794515A (en) Code pattern capable of distinguishing display content and generation and reading methods thereof
CN106067121A (en) A kind of product off-line false distinguishing method based on NFC technique
CN107230054B (en) Method and system for depositing digital currency into a deposit account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination