CN107944526B - Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method - Google Patents

Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method Download PDF

Info

Publication number
CN107944526B
CN107944526B CN201710976043.7A CN201710976043A CN107944526B CN 107944526 B CN107944526 B CN 107944526B CN 201710976043 A CN201710976043 A CN 201710976043A CN 107944526 B CN107944526 B CN 107944526B
Authority
CN
China
Prior art keywords
code
information
dimensional code
counterfeiting
resistant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710976043.7A
Other languages
Chinese (zh)
Other versions
CN107944526A (en
Inventor
祝国龙
许田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Maboshi Anti Counterfeiting Technology Co ltd
Original Assignee
Zhejiang Maboshi Anti Counterfeiting Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Maboshi Anti Counterfeiting Technology Co ltd filed Critical Zhejiang Maboshi Anti Counterfeiting Technology Co ltd
Priority to CN201710976043.7A priority Critical patent/CN107944526B/en
Publication of CN107944526A publication Critical patent/CN107944526A/en
Application granted granted Critical
Publication of CN107944526B publication Critical patent/CN107944526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06075Constructional details the marking containing means for error correction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to the technical field of anti-counterfeiting, and discloses a tamper-resistant anti-copying two-dimensional code anti-counterfeiting method, which comprises the following steps: (1) editing information; (2) merging the information; (3) attached to a support; (4) verifying the two-dimension code; (5) and acquiring anti-counterfeiting information. The two-dimensional code comprises a main code of anti-counterfeiting information and an auxiliary code of anti-copying information, whether the two-dimensional code graph is copied or not is confirmed by checking the anti-copying information during verification, and the anti-counterfeiting information can be encrypted in order to prevent the anti-counterfeiting information from being tampered. The copy-proof information can be information which is not disclosed or content after encryption, and is converted into a graph according to an encoding rule, and the size of the printed graph is adjusted according to the precision of printing equipment, so that the graph generates distortion during printing. And recording the current time and the current geographic position during each verification, accumulating the verification times, setting an upper limit of the verification times, and copying the alarm two-dimensional code when the verification times exceed the times.

Description

Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method.
Background
Symmetric encryption is the fastest and simplest encryption method, and the same key (secret key) is used for encryption (encryption) and decryption (decryption). Rijndael algorithm was selected by the National Institute of Standards and Technology (NIST-American National Institute of Standards and Technology) as a new Advanced Encryption Standard (AES-Advanced Encryption Standard) at 2.10.2000.
Asymmetric encryption provides a very secure method for encryption and decryption of data, using a pair of keys, a public key and a private key. The private key can only be safely kept by one party and cannot be leaked out, while the public key can be sent to any person who requests it. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key. For example, you request a public key from the bank, the bank sends the public key to you, you encrypt the message using the public key, and then only the holder of the private key, the bank, can decrypt your message. Different from symmetric encryption, the bank does not need to send out the private key through the network, so that the security is greatly improved. The most common asymmetric encryption algorithm at present is the RSA algorithm.
Because the two-dimensional code is convenient to use and low in cost, the two-dimensional code anti-counterfeiting and tracing are widely used. However, the traditional two-dimensional code is only a plaintext (generally a verification website and a serial number of a product), so that a counterfeiter can easily replace an official verification website with a fake website, thereby realizing low-cost mass counterfeiting. In order to make the two-dimensional code really have an ideal anti-counterfeiting effect, two problems need to be solved simultaneously:
1) tamper-proofing: the anti-counterfeiting information (including verification website) of the two-dimensional code can not be forged;
2) copy prevention: the two-dimensional code content is prevented from being copied and reused.
Disclosure of Invention
Aiming at the defects of easy tampering and easy copying in the prior art, the invention provides a tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method.
In order to solve the above technical problems, the present invention is solved by the following technical solutions.
A tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method comprises the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
Preferably, the step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
Preferably, in step (1), the copy protection information data is a ciphertext obtained by encrypting fixed data or randomly generated data.
Preferably, in the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
Preferably, in the step (4), when the two-dimensional code information is scanned, a decoding process is further included, the decoding process decrypts the encrypted primary code information and the encrypted secondary code information, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
Preferably, in the step (4), the scanning device is an intelligent terminal or a scanning gun.
Preferably, in step (4), after the verification is successful, the scanning time and the scanning location of the scanning operation are returned, and the number of times of verification is increased to the scanning device.
Preferably, in step (5), the anti-counterfeiting information includes authentication feedback information, product information, a place of manufacture, a date of manufacture, and a type of label.
Preferably, the step (5) further comprises an upper verification limit warning, the number of times of verification is set to be the highest, and if the number of times of verification is exceeded, a warning that the two-dimensional code is copied is given out during scanning.
Due to the adoption of the technical scheme, the invention has the remarkable technical effects that:
1. the anti-counterfeiting information in the two-dimensional code is encrypted, so that a counterfeiter is prevented from tampering and counterfeiting;
2. the anti-counterfeiting information of the two-dimensional code can be digitally signed or encrypted by using a digital certificate, so that the information contained in the anti-counterfeiting two-dimensional code cannot be tampered, and meanwhile, the corresponding identity information of a generator can be obtained by inquiring the information of the digital certificate, so that the aim of real-name authentication is fulfilled, and a counterfeiter can be invisibly made;
3. each two-dimensional code is provided with an anti-copy auxiliary code, the information contained in the auxiliary code can be private information or encrypted ciphertext, so that a counterfeiter cannot obtain the original information of the auxiliary code and can only copy the auxiliary code by a scanning or photographing method;
4. the anti-counterfeiting function can be efficiently realized by printing the anti-tampering and anti-copying two-dimensional code, so that the anti-counterfeiting cost is greatly reduced, and the anti-counterfeiting code can be widely applied to various commodities. If the anti-counterfeiting object is a graph, an enlarged image of some local details of the graph can also be used as an anti-copying auxiliary code, the graph details can be stored in a main code or a cloud end, when whether the graph is an original graph or not needs to be verified, the verified graph and the original graph can be compared, and if the distortion ratio of the verified graph and the original graph is larger than a set threshold value, the verified graph is judged not to be the original graph.
Drawings
FIG. 1 is a schematic flow chart of a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method according to the invention;
fig. 2 is a schematic diagram of positions of a primary code and a secondary code of a two-dimensional code in the tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
As shown in fig. 1 to fig. 2, a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method includes the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value; the method aims to distort the original auxiliary code two-dimensional code with normal proportion, so that the purposes that the scanning of original auxiliary code two-dimensional picture data is effective, the accurate degree of a two-dimensional code picture cannot be achieved by simple copying simulation, the distortion degree is high, the accurate content of the auxiliary code cannot be scanned, meanwhile, the scanning of the reduced auxiliary code two-dimensional code can read a certain amount of accurate data, the authenticity can be conveniently judged, and the purpose that the copying cannot be achieved is achieved; the printing positions of the two-dimensional codes of the auxiliary codes can be various and can be set according to requirements, as shown in fig. 2;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
The step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
In the step (1), the anti-copy information data is a ciphertext obtained by encrypting fixed data or data generated randomly.
In the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
And (4) when the two-dimensional code information is scanned, a decoding process is also included, the encrypted main code information and the encrypted auxiliary code information are decrypted in the decoding process, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
In the step (4), the scanning device is an intelligent terminal or a scanning gun.
In the step (4), after the verification is successful, the scanning time and the scanning place of the scanning operation are returned, and the verification times are increased to the scanning equipment.
In the step (5), the anti-counterfeiting information comprises verification feedback information, product information, a production place, a production date and a label type.
And (5) further comprising a verification upper limit warning, wherein the verification times are set to be the highest times, and if the verification times are exceeded, a warning that the two-dimensional code is copied is sent out during scanning.
The two-dimensional code comprises a main code of anti-counterfeiting information and an auxiliary code of anti-copying information, whether the two-dimensional code graph is copied or not is confirmed by checking the anti-copying information during verification, and the anti-counterfeiting information can be encrypted in order to prevent the anti-counterfeiting information from being tampered. The copy-proof information can be non-public information, randomly generated content or encrypted content, and is converted into a pattern according to a certain coding rule, and the size of the printed pattern is adjusted according to the precision of the printing equipment, so that the pattern generates distortion during printing, and the distortion ratio is below a threshold value. And recording the current time and the current geographic position during each verification, accumulating the verification times, setting an upper limit of the verification times, and when the verification times exceed the times, even if the verification is passed, still warning that the two-dimensional code is copied.
Example 1
The anti-counterfeiting label is sprayed on the outer package of a certain white spirit, and after the anti-counterfeiting information of the product is obtained, the implementation steps are as follows:
step 1: encrypting the anti-counterfeiting information by using the USB-Key and encoding to generate a tamper-proof main code;
step 2: encrypting the copy-prevention information by using the USB-Key and coding to generate a copy-prevention auxiliary code;
and step 3: splicing the main code and the auxiliary code to obtain an anti-counterfeiting code which is anti-falsified and anti-copying;
and 4, step 4: before printing of the anti-counterfeiting code, setting a distortion threshold value of an auxiliary code to be 15%, controlling the distortion proportion to be smaller than the set threshold value in the operation process, and then completing packaging of a certain white spirit product;
and 5: when a customer verifies the anti-counterfeiting code, a scanning gun is used for reading the main code information and the auxiliary code information of the verified anti-counterfeiting code;
step 6: decrypting the main code information, and if the main code information is correct, executing the step 7;
and 7: comparing the sub-code information read in the step 5 with the original sub-code information generated in the step 2, if the distortion is lower than the threshold set in the step 4, prompting that the verification is successful, and displaying anti-counterfeiting information of the liquor product; if the distortion is higher than the threshold set in step 4, a failure in verification is prompted.
In summary, the above-mentioned embodiments are only preferred embodiments of the present invention, and all equivalent changes and modifications made in the claims of the present invention should be covered by the claims of the present invention.

Claims (9)

1. A tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method is characterized by comprising the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
2. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: the step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
3. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (1), the anti-copy information data is a ciphertext obtained by encrypting fixed data or data generated randomly.
4. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
5. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: and (4) when the two-dimensional code information is scanned, a decoding process is also included, the encrypted main code information and the encrypted auxiliary code information are decrypted in the decoding process, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
6. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (4), the scanning device is an intelligent terminal or a scanning gun.
7. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (4), after the verification is successful, the scanning time and the scanning place of the scanning operation are returned, and the verification times are increased to the scanning equipment.
8. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (5), the anti-counterfeiting information comprises verification feedback information, product information, a production place, a production date and a label type.
9. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: and (5) further comprising a verification upper limit warning, wherein the verification times are set to be the highest times, and if the verification times are exceeded, a warning that the two-dimensional code is copied is sent out during scanning.
CN201710976043.7A 2017-10-19 2017-10-19 Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method Active CN107944526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710976043.7A CN107944526B (en) 2017-10-19 2017-10-19 Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710976043.7A CN107944526B (en) 2017-10-19 2017-10-19 Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method

Publications (2)

Publication Number Publication Date
CN107944526A CN107944526A (en) 2018-04-20
CN107944526B true CN107944526B (en) 2021-02-23

Family

ID=61936304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710976043.7A Active CN107944526B (en) 2017-10-19 2017-10-19 Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method

Country Status (1)

Country Link
CN (1) CN107944526B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960387B (en) * 2018-07-12 2021-10-12 南京林业大学 Anti-counterfeiting two-dimensional code and generation and identification method thereof
CN109614805B (en) * 2018-11-30 2023-03-28 南京林业大学 Document anti-counterfeiting image generation and identification method and system
CN110427580B (en) * 2019-09-05 2023-05-30 睿芯(大连)股份有限公司 System for realizing variable optical direct-reading identification code by passive silicon-free chip radio frequency technology
CN111931890A (en) * 2020-08-17 2020-11-13 福州智闽科技有限公司 Method and system for realizing anti-theft and anti-fake dynamic two-dimensional code
CN112865972B (en) * 2021-03-31 2023-03-14 深圳市巽震科技孵化器有限公司 Initialization method, device and system based on digital certificate platform and storage device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103794135A (en) * 2014-02-17 2014-05-14 立德高科(北京)数码科技有限责任公司 Mark formed by dot matrixes and two-dimensional code and generation and identification method of mark
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299245A (en) * 2008-06-20 2008-11-05 王立国 Bar code false proof card
CN102236810A (en) * 2010-04-23 2011-11-09 富港电子(昆山)有限公司 QR (Quick Response) code with hidden codes, and formation and identification methods of hidden codes
CN102887003B (en) * 2011-07-21 2017-09-05 天津阿波罗电子有限公司 A kind of laser beam marking method of New Two Dimensional bar code
CN102842053B (en) * 2012-08-21 2015-08-19 吉林省通程科技有限公司 A kind of false proof figure code label and manufacture method thereof
CN103226723B (en) * 2013-04-26 2015-12-23 鸿博股份有限公司 A kind of can the combined two-dimension code anti-counterfeiting method of anti-copying
CN104700139A (en) * 2013-12-06 2015-06-10 北京慧眼智行科技有限公司 Method and device for generating bar code groups
CN105335858B (en) * 2014-08-13 2019-03-15 北大方正集团有限公司 The method for anti-counterfeit and system of anti-copying QR code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103794135A (en) * 2014-02-17 2014-05-14 立德高科(北京)数码科技有限责任公司 Mark formed by dot matrixes and two-dimensional code and generation and identification method of mark
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information

Also Published As

Publication number Publication date
CN107944526A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
CN107944526B (en) Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
CN105229965B (en) Equipment identification system and equipment authenticating method
US6111953A (en) Method and apparatus for authenticating a document
WO2017016318A1 (en) Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN102164037B (en) Digital signing system and method
TWI718567B (en) Two-dimensional code generation method, data processing method, device, server and computer readable storage medium
CN107613316B (en) Live network push stream verification method and system
CN102750510A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN106953732B (en) Key management system and method for chip card
KR101450291B1 (en) Server for authenticating smart chips and method thereof
CN104680202A (en) Methods for generating and verifying two-dimension code of invoice
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN102004986A (en) Product anti-counterfeiting method based on digital signature and public key system and verifying method
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN109635610A (en) The read-write system and method for RFID tag data
CN106529977A (en) Anti-counterfeiting method and system with support of terminal memory based on WeChat public account
CN111539496A (en) Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
US7916863B2 (en) Security printing method and system for enhancing security printing
CN111866547B (en) Novel video tamper-proofing method
CN110224810A (en) A kind of method for anti-counterfeit of two dimensional code
CN113486998A (en) Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp
CN117527419A (en) Safety transmission method for identification data
CN105490814A (en) Ticket real name authentication method and system based on three-dimensional code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant