CN108763939A - The encryption method and encryption system of security code - Google Patents

The encryption method and encryption system of security code Download PDF

Info

Publication number
CN108763939A
CN108763939A CN201810410129.8A CN201810410129A CN108763939A CN 108763939 A CN108763939 A CN 108763939A CN 201810410129 A CN201810410129 A CN 201810410129A CN 108763939 A CN108763939 A CN 108763939A
Authority
CN
China
Prior art keywords
security code
section
module
code
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810410129.8A
Other languages
Chinese (zh)
Inventor
刘建盾
刘加寿
王捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Open Source Internet Of Things (guangzhou) Co Ltd
Original Assignee
Open Source Internet Of Things (guangzhou) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Open Source Internet Of Things (guangzhou) Co Ltd filed Critical Open Source Internet Of Things (guangzhou) Co Ltd
Priority to CN201810410129.8A priority Critical patent/CN108763939A/en
Publication of CN108763939A publication Critical patent/CN108763939A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encryption method of security code and encryption system, which includes:1, security code is chosen in section;2, it since the next section for taking out security code section, takes out at least one section in turn, at least generates a security code, store into database;3, security code carries out mapping encrypting;4, security code is decrypted;5, security code is verified;6, Quick Response Code is generated.The system includes that security code module, database storage module, security code mapping encrypting module and security code authentication module are chosen in section;It chooses security code module and is used to carry out section selection to security code in the section;The database storage module is for the storage to security code;The security code mapping encrypting module is used for the mapping encrypting to security code;The security code authentication module is for the verification to the security code true and false.The invention reside in providing, a kind of encryption intensity is high, is not easy to crack, and operational rule is high, occupies the lower security code encryption method in data system space and system.

Description

The encryption method and encryption system of security code
Technical field
The present invention relates to the encryption method of security code and encryption systems, more particularly to a kind of realized by computer system should The encryption method and encryption system of security code.
Background technology
For a long time, fake and inferior commodities jeopardize the vital interests of business and consumer, drastically influence the warp of country Ji development.To protect business and consumer's interests, ensure that market economy develops in a healthy way, country and enterprise will spend largely every year Manpower and financial resources crack down on counterfeit goods for anti-fake.However, be limited by anti-counterfeiting technology, anti-fake mode it is single, ordinary consumer lacks anti- The factors such as pseudo- tool, antifalse effect are undesirable.And the appearance of security code compensates for this disadvantage just, it has multiple anti-fake special Property, the modes such as cipher counterfeit-proof, software cryptography may be used and carry out to more security and antiforge purpose.
A part of the security code as technology of Internet of things, increasingly obtains the welcome of consumers in general.Consumer is by sweeping Software scans security code identification merchandise news is retouched, experience commodity counterfeit prevention system can enhance loyalty of the consumer to product, improve Confidence level of the product in the minds of consumer.By the security code Application in Anti-counterfeiting based on Internet of Things, the stream of fake products is technically chopped off Thorough fare diameter, security code is anti-fake to allow seller of the fake goods to have no place to hide.With the further development of science and technology, based on anti-fake on the basis of Internet of Things Code anti-counterfeiting technology will become strike counterfeit and shoddy goods, illegal entry and retrospect defective product and flow to strong " weapon ".
Although there are many security code currently on the market, the encrypted method of security code emerges one after another, or by illegal point Son is cracked.Consumer it is expected a kind of level of encryption height occur, is not easy the anti-fake code encryption generation method cracked.
Invention content
It is high purpose of the present invention is to overcome the deficiencies of the prior art and provide a kind of encryption intensity, it is not easy to crack, operational rule is high, Occupy the lower security code encryption method in data system space.
Another object of the present invention is to provide a kind of encrypted system of above-mentioned security code.
In order to realize first purpose of the invention, following technical scheme can be taken:
A kind of encryption method of security code, the step include:
Choose security code in step 1) section;
Step 2) takes out at least one a section in turn since the next section for taking out security code section, at least raw At security code one by one, store into database;
Step 3) carries out mapping encrypting to security code;
Security code is decrypted in step 4);
Step 5) verifies security code;
Step 6) generates Quick Response Code.
It is that the operable digit of security code is set as 16 that security code is chosen in the step 1) section, wherein needing totally 10 hundred million Security code is chosen, by the 10th to the 16th digit, 7 digits are divided into 1,000,000,000 sections, this totally when generation when security code using section Totally 7 digits obtain 7 of a completely random using random device to 10 to the 16th numbers as completely random position, completely random position Number, irregularities;And preceding 1st to the 9th digit is then used as section code, totally 10 hundred million sections code, i.e., each section occurs and only Occur primary.
The step 3) carries out mapping encrypting method to security code:
Step 31) is pre-designed 10 kinds of corresponding number 0-9 of security code mapping,;
Last position of step 32) checking security code;
Step 33) determines mapping that start bit uses with the value of security code last digit;
Step 34) then by step 3) sequence, 9 digits before security code are once subjected to upper the next of one digit number mapping and are reflected It penetrates;
Step 35) exports encrypted security code.
It is described to security code carry out verification be by retrieve encrypting database carry out retrieval comparison, obtain the true of the security code It is pseudo-.
It is described to carry out retrieval to compare being that section is combined inspection with numerical value by retrieving encrypting database.
In order to realize second purpose of the invention, following technical scheme can be taken:
A kind of security code encryption system, including section are chosen security code module, database storage module, security code and are mapped and add Close module and security code authentication module;It chooses security code module and is used to carry out section selection to security code in the section;The database Memory module is for the storage to security code;The security code mapping encrypting module is used for the mapping encrypting to security code;This is anti-fake Code authentication module is for the verification to the security code true and false.
The security code authentication module includes security code deciphering module and database retrieval module;The security code deciphering module Decryption for the security code;The database retrieval module carries out retrieval comparison for security code by encrypting database, obtains The true and false of the security code.
The beneficial effects of the invention are as follows:1, security code is encrypted since present invention employs computer systems, Good confidentiality, it is highly reliable, it is not easy to crack;2, the present invention is more intelligent, and verification security code is more convenient, and working efficiency is significantly It improves;3, security code encryption method operational rule of the present invention is high, and the security code obtained has encryption layer, and does not repeat, occupied space phase To relatively low.
Description of the drawings
Fig. 1 is security code encryption method flow chart of the embodiment of the present invention;
Fig. 2 is the mapping encrypting method flow diagram of security code encryption method of the embodiment of the present invention;
Fig. 3 is security code encryption system block diagram of the embodiment of the present invention
Fig. 4 is the authentication module Fang Ku figures of security code encryption system of the embodiment of the present invention.
Specific implementation mode
Below in conjunction with the accompanying drawings and the embodiment of the present invention is described in further detail invention.
Embodiment 1
Referring to Fig. 1, the encryption method of the security code, the step includes:
Step S1) start;
Step S2) section selection security code;
Step S3) since the next section for taking out security code section, take out at least one a section in turn, it is at least raw At security code one by one, store into database;
Step S4) mapping encrypting is carried out to security code;
Step S5) security code is decrypted;
Step S6) security code is verified;
Step S7) generate Quick Response Code.
The step S2) security code is chosen in section is that the operable digit of security code is set as 16, wherein needing totally 10 hundred million A security code is chosen when generation when security code using section, and by the 10th to the 16th digit, totally 7 digits are divided into 1,000,000,000 sections, should Totally 7 digits obtain the 7 of a completely random using random device to 10th to the 16th number as completely random position, completely random position Digit, irregularities;And preceding 1st to the 9th digit is then used as section code, totally 10 hundred million sections code, i.e., each section occur and Only occur primary.
Since the operable digit of security code shares 16, wherein needing totally 10 hundred million security codes, then section is used when generating It chooses, by the 10th to the 16th digit, totally 7 digits are divided into 1,000,000,000 sections, and being finally left the 10th to the 16th number, totally 7 digits are made For completely random position, completely random position obtains 7 digits of a completely random, irregularities using random device, if wanting to crack It so far can only can not be cracked substantially by colliding trial completely, due to being provided with amount detection management.And preceding 9 then conducts Section code, totally 10 hundred million section codes, i.e., each section occur and only occur primary.In this, this algorithm can generate 1,000,000,000 Unduplicated security code.
It is described to include to security code progress mapping encrypting method referring to Fig. 2:
Step S41) 10 kinds of corresponding number 0-9 of security code mapping are pre-designed,;
Step S42) last position of checking security code;
Step S43) mapping that start bit uses determined with the value of security code last digit;
Step 44) then by step 3) sequence, 9 digits before security code are once subjected to upper the next of one digit number mapping and are reflected It penetrates;
Step 45) exports encrypted security code.
It is to carry out retrieval comparison by retrieving encrypting database that the present invention carries out verification to security code, obtains the security code The true and false.It is described to carry out retrieval to compare being that section is combined inspection with numerical value by retrieving encrypting database.
When the present invention takes out security code, to improve efficiency, improve Information Security and ensure data completely for principle, by making With taking out in turn security code is taken out plus mapping encrypting method.For example, this batch of product needs to correspond to n security code, raw n anti-fake Code takes out n section (n security code) in turn, stores into data then since last time takes out next section in section Library carries out mapping encrypting when coming into operation, reused after obtaining encryption anti-counterfeiting code.When other side is verified using security code, we Just first encryption anti-counterfeiting code is decrypted, then searching database is compared, then can show whether this security code is true.Retrieval mode It is that section is combined inspection with numerical value.
The mapping encrypting method is pre-designed 10 kinds of corresponding number 0-9 of security code mapping first, then verifies that security code most One-bit digital afterwards determines mapping that start bit uses with the value of last one-bit digital, then carries out one-bit digital in order Next bit digital mapping of mapping.Preceding 9 bit digital once carries out next bit digital mapping of one-bit digital mapping, last defeated Go out encrypted security code.
It illustrates, it is assumed that the security code of the generation in some section is 2456328974002845, last position is 5, then The 5th kind of mapping of first use, second are mapped using the 6th kind, and so on, the 9th kind of mapping of the 5th use, the 6th makes It is mapped with the 0th kind, the 1st kind of mapping of the 7th use, until preceding nine section bit mappings finish, is finally exported encrypted anti-fake Code be:7024229104002845, then this 16 password numbers are added up into 20 passwords, such as certain production for 4 plus stem product code Product security code is set as 2018, then all 20 passwords are 20187024229104002845, and all data are all advised according to this It then generates, then the Quick Response Code of password Mass production uniqueness accordingly.
Embodiment 2
Referring to Fig. 3, security code module 2, database storage module are chosen in security code encryption system 1 of the present invention, including section 3, security code mapping encrypting module 4 and security code authentication module 5;Security code module 2 is chosen for being carried out to security code in the section It chooses in section;The database storage module 3 is for the storage to security code;The security code mapping encrypting module 4 is used for anti-fake The mapping encrypting of code;The security code authentication module 5 is for the verification to the security code true and false.
Embodiment 3
Referring to Fig. 4, the security code verifies mould 5, including security code deciphering module 51 and database retrieval module 52;This is anti- Pseudo-code deciphering module 51 is used for the decryption of the security code;The database retrieval module 52 for security code by encrypting database into Row retrieval comparison, obtains the true and false of the security code.
Security code encryption method of the present invention, mode is unique, and securely and reliably, ultrahigh in efficiency when algorithm is run, what is obtained is anti-fake Code has encryption layer, and does not repeat, and occupied space is relatively low.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (7)

1. a kind of encryption method of security code, it is characterised in that:The step includes:
Choose security code in step 1) section;
Step 2) takes out at least one section in turn since the next section for taking out security code section, at least generates one Security code is stored into database;
Step 3) carries out mapping encrypting to security code;
Security code is decrypted in step 4);
Step 5) verifies security code;
Step 6) generates Quick Response Code.
2. the encryption method of security code according to claim 1, it is characterised in that:Choose security code in the step 1) section It is that the operable digit of security code is set as 16, wherein need totally 10 hundred million security codes, when generation when security code, is selected using section Take, by the 10th to the 16th digit, totally 7 digits are divided into 1,000,000,000 sections, the 10th to the 16th number totally 7 digits as completely random Position, completely random position obtains 7 digits of a completely random, irregularities using random device;And preceding 1st to the 9th digit is then As section code, totally 10 hundred million section codes, i.e., each section occur and only occur primary.
3. the encryption method of the security code according to claim 1, it is characterised in that:The step 3) is to security code Carry out mapping encrypting process include:
Step 31) is pre-designed 10 kinds of corresponding number 0-9 of security code mapping,;
Last position of step 32) checking security code;
Step 33) determines mapping that start bit uses with the value of security code last digit;
Step 34) then by step 3) sequence, 9 digits before security code are once carried out to next mapping of upper one digit number mapping;
Step 35) exports encrypted security code.
4. the encryption method of the security code according to claim 1, it is characterised in that:It is described that security code is tested Card is to carry out retrieval comparison by retrieving encrypting database, obtains the true and false of the security code.
5. the encryption method of the security code according to claim 4, it is characterised in that:It is described that number is encrypted by retrieval It is that section is combined inspection with numerical value to carry out retrieval comparison according to library.
6. a kind of security code encryption system, it is characterised in that:Security code module is chosen including section, database storage module, is prevented Pseudo-code mapping encrypting module and security code authentication module;It chooses security code module and is used to carry out section choosing to security code in the section It takes;The database storage module is for the storage to security code;The security code mapping encrypting module is for the mapping to security code Encryption;The security code authentication module is for the verification to the security code true and false.
7. security code encryption system according to claim 6, it is characterised in that:The security code authentication module includes anti-fake Code deciphering module and database retrieval module;The security code deciphering module is used for the decryption of the security code;The database retrieval mould Block carries out retrieval comparison for security code by encrypting database, obtains the true and false of the security code.
CN201810410129.8A 2018-05-02 2018-05-02 The encryption method and encryption system of security code Pending CN108763939A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810410129.8A CN108763939A (en) 2018-05-02 2018-05-02 The encryption method and encryption system of security code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810410129.8A CN108763939A (en) 2018-05-02 2018-05-02 The encryption method and encryption system of security code

Publications (1)

Publication Number Publication Date
CN108763939A true CN108763939A (en) 2018-11-06

Family

ID=64008750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810410129.8A Pending CN108763939A (en) 2018-05-02 2018-05-02 The encryption method and encryption system of security code

Country Status (1)

Country Link
CN (1) CN108763939A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333625A (en) * 2001-08-27 2002-01-30 王小钢 Network code based commodity anti-counterfeit system
CN103218723A (en) * 2013-04-11 2013-07-24 深圳大学 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333625A (en) * 2001-08-27 2002-01-30 王小钢 Network code based commodity anti-counterfeit system
CN103218723A (en) * 2013-04-11 2013-07-24 深圳大学 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal

Similar Documents

Publication Publication Date Title
US9374224B2 (en) System and methods for encrypting data
US10657231B2 (en) Providing an authenticating service of a chip
EP3917075B1 (en) Method and apparatus for encrypting and decrypting product information
CN108599930B (en) Firmware encryption and decryption system and method
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
US8429720B2 (en) Method and apparatus for camouflaging of data, information and functional transformations
KR100961737B1 (en) Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer
US20060181397A1 (en) Method and apparatus for associating randomized identifiers with tagged assets
CN100481120C (en) Production RFID false proof method with logic control unit
CN111639734B (en) Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code
US20090315686A1 (en) Rfid tag using encrypted value
CN103886469A (en) Product two-dimension code generation and query system
US20020083327A1 (en) Method and apparatus for camouflaging of data, information and functional transformations
CN103281386A (en) Method for providing safety protection for item identification and an item resolution service
CN104239944A (en) Commodity information identification method
CN110704858A (en) Data security storage method and system under distributed environment
WO2014140009A2 (en) A process for obtaining candidate data from a remote storage server for comparison to a data to be identified
CN115511019A (en) Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code
CN106408069B (en) User data write-in and read method and the system of EPC card
CN105590227A (en) Dynamic verification method, apparatus, and system of authenticity of commodity
CN103544511A (en) Anti-counterfeiting identification
CN116669025B (en) Safety anti-counterfeiting method and system for ultrahigh frequency RFID chip
CN105117917A (en) Artwork safety identification method based on RFID coding
CN1398401A (en) Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such method
CN108763939A (en) The encryption method and encryption system of security code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106