CN109978115A - A kind of security code and its construction method - Google Patents

A kind of security code and its construction method Download PDF

Info

Publication number
CN109978115A
CN109978115A CN201910272266.4A CN201910272266A CN109978115A CN 109978115 A CN109978115 A CN 109978115A CN 201910272266 A CN201910272266 A CN 201910272266A CN 109978115 A CN109978115 A CN 109978115A
Authority
CN
China
Prior art keywords
region
identification
information
fake
identification region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910272266.4A
Other languages
Chinese (zh)
Other versions
CN109978115B (en
Inventor
陈成楷
陈庆伟
缪小微
黄伟忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Baoshan Science And Technology Application Co Ltd
Original Assignee
Guangzhou Baoshan Science And Technology Application Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Baoshan Science And Technology Application Co Ltd filed Critical Guangzhou Baoshan Science And Technology Application Co Ltd
Priority to CN201910272266.4A priority Critical patent/CN109978115B/en
Priority to PCT/CN2019/093586 priority patent/WO2020199394A1/en
Publication of CN109978115A publication Critical patent/CN109978115A/en
Application granted granted Critical
Publication of CN109978115B publication Critical patent/CN109978115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of construction method of security code, which includes identification region and anti-fake region, and creation method is embodied as the space structure for including the following steps: to construct identification region and anti-fake region;The corresponding position of space structure respectively in identification region and anti-fake region generate for identification with anti-fake information.The invention also discloses a kind of security codes, and disclosed security code and its construction method can overcome terminal program to be cracked according to the present invention, or the problem of decoding (coding) program source code leakage, ensure information security.

Description

A kind of security code and its construction method
Technical field
The present invention relates to security code technical field, especially a kind of security code and its construction method.
Background technique
Existing patterned security code on the market, often identifies figure on terminal program, parses anti-fake data, Then cloud server is sent by anti-fake data carry out false distinguishing.But such security code is when in use, often will appear following Problem:
Security code using when exist and be cracked because of terminal program, or the problem of decoding (coding) program source code leaks, from And will lead to security code and largely forged, influence information security.
Summary of the invention
To solve the above-mentioned problems, it is contemplated that the anti-fake region of security code and identification region to be arranged to special sky Between structure, make it in decoding, by, again by anti-fake region, forming two defence lines after identification region, effectively having ensured letter The safety of breath, it is not easy to crack.
According to the first aspect of the invention, provide a kind of construction method of security code, security code include identification region and Anti-fake region, creation method are embodied as the space structure for including the following steps: to construct identification region and anti-fake region;Exist respectively The corresponding position of the space structure in identification region and anti-fake region generate for identification with anti-fake information.By identifying respectively The corresponding position of the space structure in region and anti-fake region generates for identification can be by identification region and anti-with anti-fake information Pseudo- region distinguishes, and is different from security code on the market, and two kinds of regions increase the difficulty forged, effective to guarantee The safety of information.
In some embodiments, information realization for identification is generated in the corresponding position of the space structure of identification region Are as follows: the space structure of identification region is divided into and is not overlapped home block, in each home block corresponding position filling group identifier at Binary data;Binary data is subjected to the information of Fragmentation generation for identification.It is abundant in order to contain identification region Information, the write-in of information is carried out using above-mentioned binary data, and by the way that binary data is carried out Fragmentation, Each on piece has all contained different information, is conducive to the safety coefficient for increasing security code.
In some embodiments, information for identification includes the first identification information, and the first identification information includes described Coding mode, version of code, location information and the colouring information in anti-fake region.It, can be right by the content of the first identification information The coding mode and version in anti-fake region are set, and are adapted it to specific decoding process and are decoded, provide anti-fake The safety of code.
In some embodiments, the space structure in identification region and anti-fake region includes: by a part in anti-fake region The inside of identification region is set, and the surrounding of identification region is arranged in another part;Or anti-fake region is arranged in the identification The surrounding in region;Or anti-fake region is arranged in the inside of identification region.Pass through the position of above-mentioned identification region and anti-fake region Set relationship, as much as possible can store information in anti-fake region and identification region, and various structures can prevent it is anti-fake Code is cracked.
In some embodiments, information for identification further includes the second identification information, and the second identification information includes letter Cease error correcting code and information effect code;Identification region includes candidate identification region and effective identification region, is wrapped in candidate identification region The first identification information has been included, has included the first identification information and the second identification information in effective identification region.Pass through the second identification letter The effective identification region for ceasing and include the second identification information can provide the difficulty for identifying the security code, the letter for carrying it Breath is protected by secondary verification and error correction.
According to the second aspect of the invention, a kind of security code is provided, comprising: identification region, for placing identification letter Breath;Anti-fake region, for placing anti-counterfeiting information;Identification region and anti-fake region are arranged by preset space structure, identification information In include the first identification information for identifying anti-counterfeiting information.By building identification region and anti-fake region, this can be made anti- Pseudo-code addition multilayer protection during decoded, and a large amount of information can be contained according to space structure arrangement, be conducive to The safety of security code is provided.
In some embodiments, identification region and anti-fake region are realized by the arrangement of preset space structure are as follows: anti-fake area The inside of identification region is arranged in a part in domain, and the surrounding of identification region is arranged in another part.Pass through this arrangement mode Anti-fake region can be made bigger, it can comprising more for identification with anti-fake information.
In some embodiments, above-mentioned security code, identification region and anti-fake region are arranged by preset space structure It realizes are as follows: the surrounding of identification region is arranged in anti-fake region.It can be more empty than existing security code region by this arrangement mode Between arrangement mode contain more information.
In some embodiments, identification region and anti-fake region are realized by the arrangement of preset space structure are as follows: anti-fake area The inside of identification region is arranged in domain.This kind of mode can make identification region contain a certain amount of information.
It in some embodiments, further include the second identification information having for Division identification region in identification information, the Two identification informations include error correction information code and information effect code, and identification region includes candidate identification region and effective identification region; Candidate identification region includes the first identification information;Effective identification region includes the first identification information and the second identification information. It by the second identification information and include that effective identification region of the second identification information can propose the difficulty for identifying the security code For the information for carrying it is protected by secondary verification and error correction.
Detailed description of the invention
Fig. 1 is a kind of construction method flow chart of security code of an embodiment of the present invention;
Fig. 2 is the security code structural schematic diagram of an embodiment of the present invention;
Fig. 3 is the security code structural schematic diagram of another embodiment of the present invention;
Fig. 4 is the security code structural schematic diagram of a further embodiment of this invention;
Fig. 5 is the structural schematic diagram in the anti-fake region of an embodiment of the present invention;
Fig. 6 is the structural schematic diagram in the anti-fake region of a further embodiment of this invention;
Fig. 7 is the structural schematic diagram in the anti-fake region of another embodiment of the present invention.
Specific embodiment
The invention will now be described in further detail with reference to the accompanying drawings.
Fig. 1 schematically shows a kind of construction method flow chart of the security code of embodiment according to the present invention, such as Shown in Fig. 1,
Step S101: constructing the space structure of identification region and anti-fake region, and the security code in the present embodiment includes identification Region and anti-fake region, it is special for its addition in the setting in identification region and anti-fake region in order to provide the safety of security code Fixed spatial relationship, specific implementation are as follows: a part in anti-fake region is arranged in the inside of identification region, another part setting exists Anti-fake region is divided into five regions by the surrounding of identification region, identification region is as an individual entirety, in identification region Inside one anti-fake region is set, an anti-fake region is respectively set in the surrounding of identification region, can contain so a large amount of Information.In other effective embodiments, anti-fake region is also arranged in the surrounding of identification region, i.e., using identification region as An individual entirety, anti-fake region are divided into four parts, are separately positioned on the surrounding of identification region.In other preferred embodiments In, anti-fake region is arranged in the inside of identification region.Wherein, anti-fake region can be implemented as QT code as shown in Figure 5.Excellent It selects in embodiment, anti-fake region is also implemented as bar code as shown in FIG. 6.It is anti-fake in other effective embodiments Region is also implemented as matrix two-dimensional code as shown in Figure 7.
Step S102: the corresponding position of space structure respectively in identification region and anti-fake region generates for identification and anti- Pseudo- information.Specific implementation are as follows: the space structure of identification region is divided into is not overlapped home block first, it is corresponding in each home block Position filling group identifier at binary data;Binary data is subjected to the information of Fragmentation generation for identification.Show Example property, each home block is for indicating 1bit information, if the identifier of home block filling indicates 1 when being black, table when white Show 0, these home blocks are constituted to the binary data of certain length.The binary data is subjected to fragment (specific implementation later Mode is referred to prior art realization), it can be used to express bulk information in this way.It include first for information for identification Identification information, the first identification information include coding mode, version of code, location information and the colouring information in anti-fake region, are used for The correlated characteristic in anti-fake region is identified, to position and obtain anti-counterfeiting information.Illustratively, first 4 of the binary data Bits is used to indicate the coding mode of security code, and the 5 to 8th bits is used to indicate the version of code in anti-fake region.Specifically, prevent The terminal or server-side that pseudo- regional code mode and anti-fake regional code version are used to assist identifying the security code are to its anti-fake area Domain information is decoded.Location information is used to describe the relative position in anti-fake region and identification region and the ruler in anti-fake region Very little (width in anti-fake region and the number of pixels of height).Colouring information is used to describe the colour system that anti-fake region uses, example Such as Black-White, YUV, RGB, HSV.There is specific spatial relationship to be also embodied in anti-fake region and identification region Mapping relations can be established in anti-fake region and identification region by location information, in decoding, pass through the face in identification information The image information in the corresponding anti-fake region of the available identification region of color information, that is, the anti-counterfeiting information encrypted are effective to improve The safety of security code.Illustratively, for Black-White colour system, the image data of acquisition only has about 600 words Section is no more than 1kB along with a small amount of color information data is with frame data altogether.For in identification process, the network broadband of occupancy It is extremely low, it can effectively improve recognition speed.
In the preferred embodiment, information for identification further includes the second identification information, and the second identification information includes letter Illustratively, identification region is divided into including candidate for identifying and distinguish identification region for breath error correcting code and information effect code Identification region and effective identification region, candidate identification region are configured to which includes the first identification information, effective identification regions It is configured to including the first identification information and the second identification information, it in a particular application, can be by scanning and searching candidate Identification region, and effective identification region is distinguished and determined by the verification of the second identification information.For passing through candidate cog region Domain determines the process specific implementation of effective identification region are as follows: searches candidate identification region information and is determined, if candidate cog region The identification information in domain can voluntarily carry out information code error correction, and also by the verification of the information check code of itself, then by the time It selects identification region as effective identification region, error correction can be carried out to the first identification information by the second identification information detected And verification, that is, illustrate the region while including the second identification information and the first identification information, i.e., is determined as in the region effectively Identification region.Wherein, the structure by the way that candidate region is arranged can be to the identification of candidate region and the structure is scanned Judgement is realized, such as candidate region is embodied as including that there are four the candidate anchor points for constituting approximate matrix.Candidate's anchor point are as follows: If radius is in the circle of n, and be up to m other stains, then the stain is candidate anchor point, and n's is big using a stain as the center of circle The small radius r by the stain determines, the value range of illustrative n=3 × r, m can diversification, usually take 1 or 0.? In other embodiment, the candidate region be embodied as include there are three constitute approximate right angle triangle candidate anchor point, The 4th point can be calculated by three anchor points, wherein calculation method can be realized (exemplary with reference to the prior art It uses 3 " returning " fonts as anchor point in QR Code, the position of the 4th point is calculated by this 3 " going back to " fonts in ground It sets).Candidate region can be identified by candidate's anchor point, and the candidate region does not have apparent identification icon, such as QR Code has apparent " returning " word figure in the prior art, and Maxi Code has apparent buphthalmos figure, and DataMatrix has bright Two aobvious straight lines, so that anti-fake safety is higher.
In the present embodiment, the volume of this security code is very small in specific implementation, and minimum only has 68 × 68 pixels, if making With the printer of 1200DPI, then less than 1.5 × 1.5 (mm2).It can effectively prevent forgery.
Fig. 2 is the structural schematic diagram of the security code of an embodiment of the present invention, as shown in Fig. 2, the security code includes: identification Region 1 and anti-fake region 2.
Identification region 1 is for placing identification information.Anti-fake region 2 is for placing anti-counterfeiting information.Identification region 1 and anti-fake area Domain 2 is arranged by preset space structure, i.e., the inside 1 of identification region is arranged in anti-fake region 2.For raising as much as possible knowledge The information contained in other region 1 and anti-fake region 2, in other preferred embodiments, as shown in figure 3, the space structure may be used also To be embodied as that the inside of identification region 2 for a part in anti-fake region 2 is arranged in, the four of identification region 1 are arranged in another part Week.In other preferred embodiments, identified as shown in figure 4, the space structure is also implemented as being arranged in anti-fake region 2 The surrounding in region 1.
It wherein, include the first identification information for identifying anti-counterfeiting information, the volume including anti-fake region in identification information Code mode, version of code, location information and colouring information.It further include having to know for the second of Division identification region in identification information Other information, the second identification information include error correction information code and information effect code, and identification region is including candidate identification region and effectively Identification region, candidate identification region include the first identification information, and effective identification region includes the first identification information and second Identification information.Above-mentioned side is referred to for the application method of the first identification information and the second identification information in identification region The description of method part, herein without repeating.
According to the present embodiment improve security code can by specific identification region and anti-fake regional space relationship, and its The identification information and anti-counterfeiting information for including realize the separation of identification information and anti-counterfeiting information, and terminal program is overcome to be cracked, or solution The problem of code (coding) program source code leaks, is effectively guaranteed information security, while being also able to achieve to identification information and anti-fake The personalisation process of information avoids some information upgrading problems caused by becoming one because of identification information and anti-counterfeiting information.
Above-described is only some embodiments of the present invention.For those of ordinary skill in the art, not Under the premise of being detached from the invention design, various modifications and improvements can be made, these belong to protection model of the invention It encloses.

Claims (10)

1. a kind of construction method of security code, which is characterized in that the security code includes identification region and anti-fake region, creation Method is embodied as including the following steps:
Construct the space structure of identification region and anti-fake region;
The corresponding position of space structure respectively in the identification region and anti-fake region generate for identification with anti-fake information.
2. the method according to claim 1, wherein the corresponding position of the space structure in the identification region Set the information realization generated for identification are as follows:
The space structure of the identification region is divided into and is not overlapped home block, inserts identifier in the corresponding position of each home block Form binary data;
The binary data is subjected to the information of Fragmentation generation for identification.
3. according to the method described in claim 2, it is characterized in that, the information for identification include the first identification information, First identification information includes coding mode, version of code, location information and the colouring information in the anti-fake region.
4. the method according to claim 1, wherein the space structure in the identification region and anti-fake region constructs Are as follows:
The a part in the anti-fake region is arranged in the inside of the identification region, another part is arranged in the identification region Surrounding;Or
The anti-fake region is arranged in the surrounding of the identification region;Or
The anti-fake region is arranged in the inside of the identification region.
5. according to the method described in claim 3, it is characterized in that, the information for identification further includes the second identification letter Breath, second identification information includes error correction information code and information effect code;
The identification region includes candidate identification region and effective identification region, includes described the in candidate's identification region One identification information includes first identification information and the second identification information in effective identification region.
6. a kind of security code characterized by comprising
Identification region, for placing identification information;
Anti-fake region, for placing anti-counterfeiting information;
The identification region and the anti-fake region are arranged by preset space structure, include for marking in the identification information Know the first identification information of the anti-counterfeiting information.
7. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset Space structure arrangement is realized are as follows: the inside of the identification region, another part setting is arranged in a part in the anti-fake region In the surrounding of the identification region.
8. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset Space structure arrangement is realized are as follows: the surrounding of the identification region is arranged in the anti-fake region.
9. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset Space structure arrangement is realized are as follows: the inside of the identification region is arranged in the anti-fake region.
10. according to security code described in claim 6-9 any one, which is characterized in that further include having in the identification information For second identification information in Division identification region, second identification information includes error correction information code and information effect code, institute Stating identification region includes candidate identification region and effective identification region;
Candidate's identification region includes the first identification information;
Effective identification region includes the first identification information and the second identification information.
CN201910272266.4A 2019-04-04 2019-04-04 Anti-counterfeiting code and construction method thereof Active CN109978115B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910272266.4A CN109978115B (en) 2019-04-04 2019-04-04 Anti-counterfeiting code and construction method thereof
PCT/CN2019/093586 WO2020199394A1 (en) 2019-04-04 2019-06-28 Anti-counterfeiting code and construction method therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910272266.4A CN109978115B (en) 2019-04-04 2019-04-04 Anti-counterfeiting code and construction method thereof

Publications (2)

Publication Number Publication Date
CN109978115A true CN109978115A (en) 2019-07-05
CN109978115B CN109978115B (en) 2020-06-09

Family

ID=67083057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910272266.4A Active CN109978115B (en) 2019-04-04 2019-04-04 Anti-counterfeiting code and construction method thereof

Country Status (2)

Country Link
CN (1) CN109978115B (en)
WO (1) WO2020199394A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382820A (en) * 2020-02-25 2020-07-07 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899609A (en) * 2017-03-22 2017-06-27 上海中商网络股份有限公司 Code and its generation, verification method and device in a kind of code
CN108122020A (en) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN108470201A (en) * 2018-01-24 2018-08-31 重庆延伸科技开发有限公司 A kind of multiple random color dot matrix label anti-counterfeit system
CN108875878A (en) * 2018-09-28 2018-11-23 武汉保诚信网络科技有限公司 Stereoscopic two-dimensional code antifalsification label

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070218981A1 (en) * 2004-04-16 2007-09-20 Cyberview Technology, Inc. Casino no-ticket in cashless methods allowing the redemption of large prizes
CN102646363B (en) * 2012-04-20 2014-10-08 李峰 Character anti-counterfeiting and bar code combined identification structure and method therefor
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN109978574A (en) * 2019-04-04 2019-07-05 广州市宝绅科技应用有限公司 A kind of anti-counterfeiting system and method for anti-counterfeit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899609A (en) * 2017-03-22 2017-06-27 上海中商网络股份有限公司 Code and its generation, verification method and device in a kind of code
CN108122020A (en) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN108470201A (en) * 2018-01-24 2018-08-31 重庆延伸科技开发有限公司 A kind of multiple random color dot matrix label anti-counterfeit system
CN108875878A (en) * 2018-09-28 2018-11-23 武汉保诚信网络科技有限公司 Stereoscopic two-dimensional code antifalsification label

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382820A (en) * 2020-02-25 2020-07-07 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method
CN111382820B (en) * 2020-02-25 2021-10-12 南通大学 Four-lattice pure-color commodity anti-counterfeiting code generation method

Also Published As

Publication number Publication date
CN109978115B (en) 2020-06-09
WO2020199394A1 (en) 2020-10-08

Similar Documents

Publication Publication Date Title
CN101944187B (en) Two-dimensional micro code and processing method and device thereof
CN106529633B (en) Generation method, coding/decoding method and the device of two dimensional code
CA2408454C (en) Machine readable code and method and device of encoding and decoding the same
CN104115194B (en) Paper number reads system and paper number read method
CN104966115A (en) Method for filling two-dimensional code through image
US8385592B2 (en) Digital watermarking system and method
CN103177279A (en) Four dimensional (4d) color barcode for high capacity data encoding and decoding
CN102194275A (en) Automatic ticket checking method for train tickets
CN105787340B (en) Picture validation code implementation method based on text adhesion and vision compensation
CN107451643B (en) Generation, recognition methods and the device of dynamic two-dimension code
CN105550730A (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
US7388984B2 (en) Method of recognizing a code
CN105741226A (en) Electronic stamp based visible digital image watermark embedding and detection methods
US9064138B2 (en) Method for detecting reorgination of barcodes
CN114997352A (en) Anti-counterfeiting tracing code generation and verification method based on dot matrix
US6708894B2 (en) Method for invisible embedded data using yellow glyphs
CN109978115A (en) A kind of security code and its construction method
JP2893080B2 (en) Image processing method and apparatus, and copier, scanner, and printer using the same
CN109325568B (en) Anti-counterfeiting two-dimensional code and modulation encryption method and identification system thereof
WO2020199393A1 (en) Anti-counterfeiting system and anti-counterfeiting method
CN113076528A (en) Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium
CN111222610B (en) Coding and decoding method and system for double-ID two-dimensional code micro-code element
CN114254719B (en) Anti-counterfeiting two-dimensional code generation method and device
CN113988242A (en) Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
CN102024378A (en) Method for hiding anti-counterfeiting data in bar codes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant