CN109978115A - A kind of security code and its construction method - Google Patents
A kind of security code and its construction method Download PDFInfo
- Publication number
- CN109978115A CN109978115A CN201910272266.4A CN201910272266A CN109978115A CN 109978115 A CN109978115 A CN 109978115A CN 201910272266 A CN201910272266 A CN 201910272266A CN 109978115 A CN109978115 A CN 109978115A
- Authority
- CN
- China
- Prior art keywords
- region
- identification
- information
- fake
- identification region
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a kind of construction method of security code, which includes identification region and anti-fake region, and creation method is embodied as the space structure for including the following steps: to construct identification region and anti-fake region;The corresponding position of space structure respectively in identification region and anti-fake region generate for identification with anti-fake information.The invention also discloses a kind of security codes, and disclosed security code and its construction method can overcome terminal program to be cracked according to the present invention, or the problem of decoding (coding) program source code leakage, ensure information security.
Description
Technical field
The present invention relates to security code technical field, especially a kind of security code and its construction method.
Background technique
Existing patterned security code on the market, often identifies figure on terminal program, parses anti-fake data,
Then cloud server is sent by anti-fake data carry out false distinguishing.But such security code is when in use, often will appear following
Problem:
Security code using when exist and be cracked because of terminal program, or the problem of decoding (coding) program source code leaks, from
And will lead to security code and largely forged, influence information security.
Summary of the invention
To solve the above-mentioned problems, it is contemplated that the anti-fake region of security code and identification region to be arranged to special sky
Between structure, make it in decoding, by, again by anti-fake region, forming two defence lines after identification region, effectively having ensured letter
The safety of breath, it is not easy to crack.
According to the first aspect of the invention, provide a kind of construction method of security code, security code include identification region and
Anti-fake region, creation method are embodied as the space structure for including the following steps: to construct identification region and anti-fake region;Exist respectively
The corresponding position of the space structure in identification region and anti-fake region generate for identification with anti-fake information.By identifying respectively
The corresponding position of the space structure in region and anti-fake region generates for identification can be by identification region and anti-with anti-fake information
Pseudo- region distinguishes, and is different from security code on the market, and two kinds of regions increase the difficulty forged, effective to guarantee
The safety of information.
In some embodiments, information realization for identification is generated in the corresponding position of the space structure of identification region
Are as follows: the space structure of identification region is divided into and is not overlapped home block, in each home block corresponding position filling group identifier at
Binary data;Binary data is subjected to the information of Fragmentation generation for identification.It is abundant in order to contain identification region
Information, the write-in of information is carried out using above-mentioned binary data, and by the way that binary data is carried out Fragmentation,
Each on piece has all contained different information, is conducive to the safety coefficient for increasing security code.
In some embodiments, information for identification includes the first identification information, and the first identification information includes described
Coding mode, version of code, location information and the colouring information in anti-fake region.It, can be right by the content of the first identification information
The coding mode and version in anti-fake region are set, and are adapted it to specific decoding process and are decoded, provide anti-fake
The safety of code.
In some embodiments, the space structure in identification region and anti-fake region includes: by a part in anti-fake region
The inside of identification region is set, and the surrounding of identification region is arranged in another part;Or anti-fake region is arranged in the identification
The surrounding in region;Or anti-fake region is arranged in the inside of identification region.Pass through the position of above-mentioned identification region and anti-fake region
Set relationship, as much as possible can store information in anti-fake region and identification region, and various structures can prevent it is anti-fake
Code is cracked.
In some embodiments, information for identification further includes the second identification information, and the second identification information includes letter
Cease error correcting code and information effect code;Identification region includes candidate identification region and effective identification region, is wrapped in candidate identification region
The first identification information has been included, has included the first identification information and the second identification information in effective identification region.Pass through the second identification letter
The effective identification region for ceasing and include the second identification information can provide the difficulty for identifying the security code, the letter for carrying it
Breath is protected by secondary verification and error correction.
According to the second aspect of the invention, a kind of security code is provided, comprising: identification region, for placing identification letter
Breath;Anti-fake region, for placing anti-counterfeiting information;Identification region and anti-fake region are arranged by preset space structure, identification information
In include the first identification information for identifying anti-counterfeiting information.By building identification region and anti-fake region, this can be made anti-
Pseudo-code addition multilayer protection during decoded, and a large amount of information can be contained according to space structure arrangement, be conducive to
The safety of security code is provided.
In some embodiments, identification region and anti-fake region are realized by the arrangement of preset space structure are as follows: anti-fake area
The inside of identification region is arranged in a part in domain, and the surrounding of identification region is arranged in another part.Pass through this arrangement mode
Anti-fake region can be made bigger, it can comprising more for identification with anti-fake information.
In some embodiments, above-mentioned security code, identification region and anti-fake region are arranged by preset space structure
It realizes are as follows: the surrounding of identification region is arranged in anti-fake region.It can be more empty than existing security code region by this arrangement mode
Between arrangement mode contain more information.
In some embodiments, identification region and anti-fake region are realized by the arrangement of preset space structure are as follows: anti-fake area
The inside of identification region is arranged in domain.This kind of mode can make identification region contain a certain amount of information.
It in some embodiments, further include the second identification information having for Division identification region in identification information, the
Two identification informations include error correction information code and information effect code, and identification region includes candidate identification region and effective identification region;
Candidate identification region includes the first identification information;Effective identification region includes the first identification information and the second identification information.
It by the second identification information and include that effective identification region of the second identification information can propose the difficulty for identifying the security code
For the information for carrying it is protected by secondary verification and error correction.
Detailed description of the invention
Fig. 1 is a kind of construction method flow chart of security code of an embodiment of the present invention;
Fig. 2 is the security code structural schematic diagram of an embodiment of the present invention;
Fig. 3 is the security code structural schematic diagram of another embodiment of the present invention;
Fig. 4 is the security code structural schematic diagram of a further embodiment of this invention;
Fig. 5 is the structural schematic diagram in the anti-fake region of an embodiment of the present invention;
Fig. 6 is the structural schematic diagram in the anti-fake region of a further embodiment of this invention;
Fig. 7 is the structural schematic diagram in the anti-fake region of another embodiment of the present invention.
Specific embodiment
The invention will now be described in further detail with reference to the accompanying drawings.
Fig. 1 schematically shows a kind of construction method flow chart of the security code of embodiment according to the present invention, such as
Shown in Fig. 1,
Step S101: constructing the space structure of identification region and anti-fake region, and the security code in the present embodiment includes identification
Region and anti-fake region, it is special for its addition in the setting in identification region and anti-fake region in order to provide the safety of security code
Fixed spatial relationship, specific implementation are as follows: a part in anti-fake region is arranged in the inside of identification region, another part setting exists
Anti-fake region is divided into five regions by the surrounding of identification region, identification region is as an individual entirety, in identification region
Inside one anti-fake region is set, an anti-fake region is respectively set in the surrounding of identification region, can contain so a large amount of
Information.In other effective embodiments, anti-fake region is also arranged in the surrounding of identification region, i.e., using identification region as
An individual entirety, anti-fake region are divided into four parts, are separately positioned on the surrounding of identification region.In other preferred embodiments
In, anti-fake region is arranged in the inside of identification region.Wherein, anti-fake region can be implemented as QT code as shown in Figure 5.Excellent
It selects in embodiment, anti-fake region is also implemented as bar code as shown in FIG. 6.It is anti-fake in other effective embodiments
Region is also implemented as matrix two-dimensional code as shown in Figure 7.
Step S102: the corresponding position of space structure respectively in identification region and anti-fake region generates for identification and anti-
Pseudo- information.Specific implementation are as follows: the space structure of identification region is divided into is not overlapped home block first, it is corresponding in each home block
Position filling group identifier at binary data;Binary data is subjected to the information of Fragmentation generation for identification.Show
Example property, each home block is for indicating 1bit information, if the identifier of home block filling indicates 1 when being black, table when white
Show 0, these home blocks are constituted to the binary data of certain length.The binary data is subjected to fragment (specific implementation later
Mode is referred to prior art realization), it can be used to express bulk information in this way.It include first for information for identification
Identification information, the first identification information include coding mode, version of code, location information and the colouring information in anti-fake region, are used for
The correlated characteristic in anti-fake region is identified, to position and obtain anti-counterfeiting information.Illustratively, first 4 of the binary data
Bits is used to indicate the coding mode of security code, and the 5 to 8th bits is used to indicate the version of code in anti-fake region.Specifically, prevent
The terminal or server-side that pseudo- regional code mode and anti-fake regional code version are used to assist identifying the security code are to its anti-fake area
Domain information is decoded.Location information is used to describe the relative position in anti-fake region and identification region and the ruler in anti-fake region
Very little (width in anti-fake region and the number of pixels of height).Colouring information is used to describe the colour system that anti-fake region uses, example
Such as Black-White, YUV, RGB, HSV.There is specific spatial relationship to be also embodied in anti-fake region and identification region
Mapping relations can be established in anti-fake region and identification region by location information, in decoding, pass through the face in identification information
The image information in the corresponding anti-fake region of the available identification region of color information, that is, the anti-counterfeiting information encrypted are effective to improve
The safety of security code.Illustratively, for Black-White colour system, the image data of acquisition only has about 600 words
Section is no more than 1kB along with a small amount of color information data is with frame data altogether.For in identification process, the network broadband of occupancy
It is extremely low, it can effectively improve recognition speed.
In the preferred embodiment, information for identification further includes the second identification information, and the second identification information includes letter
Illustratively, identification region is divided into including candidate for identifying and distinguish identification region for breath error correcting code and information effect code
Identification region and effective identification region, candidate identification region are configured to which includes the first identification information, effective identification regions
It is configured to including the first identification information and the second identification information, it in a particular application, can be by scanning and searching candidate
Identification region, and effective identification region is distinguished and determined by the verification of the second identification information.For passing through candidate cog region
Domain determines the process specific implementation of effective identification region are as follows: searches candidate identification region information and is determined, if candidate cog region
The identification information in domain can voluntarily carry out information code error correction, and also by the verification of the information check code of itself, then by the time
It selects identification region as effective identification region, error correction can be carried out to the first identification information by the second identification information detected
And verification, that is, illustrate the region while including the second identification information and the first identification information, i.e., is determined as in the region effectively
Identification region.Wherein, the structure by the way that candidate region is arranged can be to the identification of candidate region and the structure is scanned
Judgement is realized, such as candidate region is embodied as including that there are four the candidate anchor points for constituting approximate matrix.Candidate's anchor point are as follows:
If radius is in the circle of n, and be up to m other stains, then the stain is candidate anchor point, and n's is big using a stain as the center of circle
The small radius r by the stain determines, the value range of illustrative n=3 × r, m can diversification, usually take 1 or 0.?
In other embodiment, the candidate region be embodied as include there are three constitute approximate right angle triangle candidate anchor point,
The 4th point can be calculated by three anchor points, wherein calculation method can be realized (exemplary with reference to the prior art
It uses 3 " returning " fonts as anchor point in QR Code, the position of the 4th point is calculated by this 3 " going back to " fonts in ground
It sets).Candidate region can be identified by candidate's anchor point, and the candidate region does not have apparent identification icon, such as
QR Code has apparent " returning " word figure in the prior art, and Maxi Code has apparent buphthalmos figure, and DataMatrix has bright
Two aobvious straight lines, so that anti-fake safety is higher.
In the present embodiment, the volume of this security code is very small in specific implementation, and minimum only has 68 × 68 pixels, if making
With the printer of 1200DPI, then less than 1.5 × 1.5 (mm2).It can effectively prevent forgery.
Fig. 2 is the structural schematic diagram of the security code of an embodiment of the present invention, as shown in Fig. 2, the security code includes: identification
Region 1 and anti-fake region 2.
Identification region 1 is for placing identification information.Anti-fake region 2 is for placing anti-counterfeiting information.Identification region 1 and anti-fake area
Domain 2 is arranged by preset space structure, i.e., the inside 1 of identification region is arranged in anti-fake region 2.For raising as much as possible knowledge
The information contained in other region 1 and anti-fake region 2, in other preferred embodiments, as shown in figure 3, the space structure may be used also
To be embodied as that the inside of identification region 2 for a part in anti-fake region 2 is arranged in, the four of identification region 1 are arranged in another part
Week.In other preferred embodiments, identified as shown in figure 4, the space structure is also implemented as being arranged in anti-fake region 2
The surrounding in region 1.
It wherein, include the first identification information for identifying anti-counterfeiting information, the volume including anti-fake region in identification information
Code mode, version of code, location information and colouring information.It further include having to know for the second of Division identification region in identification information
Other information, the second identification information include error correction information code and information effect code, and identification region is including candidate identification region and effectively
Identification region, candidate identification region include the first identification information, and effective identification region includes the first identification information and second
Identification information.Above-mentioned side is referred to for the application method of the first identification information and the second identification information in identification region
The description of method part, herein without repeating.
According to the present embodiment improve security code can by specific identification region and anti-fake regional space relationship, and its
The identification information and anti-counterfeiting information for including realize the separation of identification information and anti-counterfeiting information, and terminal program is overcome to be cracked, or solution
The problem of code (coding) program source code leaks, is effectively guaranteed information security, while being also able to achieve to identification information and anti-fake
The personalisation process of information avoids some information upgrading problems caused by becoming one because of identification information and anti-counterfeiting information.
Above-described is only some embodiments of the present invention.For those of ordinary skill in the art, not
Under the premise of being detached from the invention design, various modifications and improvements can be made, these belong to protection model of the invention
It encloses.
Claims (10)
1. a kind of construction method of security code, which is characterized in that the security code includes identification region and anti-fake region, creation
Method is embodied as including the following steps:
Construct the space structure of identification region and anti-fake region;
The corresponding position of space structure respectively in the identification region and anti-fake region generate for identification with anti-fake information.
2. the method according to claim 1, wherein the corresponding position of the space structure in the identification region
Set the information realization generated for identification are as follows:
The space structure of the identification region is divided into and is not overlapped home block, inserts identifier in the corresponding position of each home block
Form binary data;
The binary data is subjected to the information of Fragmentation generation for identification.
3. according to the method described in claim 2, it is characterized in that, the information for identification include the first identification information,
First identification information includes coding mode, version of code, location information and the colouring information in the anti-fake region.
4. the method according to claim 1, wherein the space structure in the identification region and anti-fake region constructs
Are as follows:
The a part in the anti-fake region is arranged in the inside of the identification region, another part is arranged in the identification region
Surrounding;Or
The anti-fake region is arranged in the surrounding of the identification region;Or
The anti-fake region is arranged in the inside of the identification region.
5. according to the method described in claim 3, it is characterized in that, the information for identification further includes the second identification letter
Breath, second identification information includes error correction information code and information effect code;
The identification region includes candidate identification region and effective identification region, includes described the in candidate's identification region
One identification information includes first identification information and the second identification information in effective identification region.
6. a kind of security code characterized by comprising
Identification region, for placing identification information;
Anti-fake region, for placing anti-counterfeiting information;
The identification region and the anti-fake region are arranged by preset space structure, include for marking in the identification information
Know the first identification information of the anti-counterfeiting information.
7. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset
Space structure arrangement is realized are as follows: the inside of the identification region, another part setting is arranged in a part in the anti-fake region
In the surrounding of the identification region.
8. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset
Space structure arrangement is realized are as follows: the surrounding of the identification region is arranged in the anti-fake region.
9. security code according to claim 6, which is characterized in that the identification region is with the anti-fake region by preset
Space structure arrangement is realized are as follows: the inside of the identification region is arranged in the anti-fake region.
10. according to security code described in claim 6-9 any one, which is characterized in that further include having in the identification information
For second identification information in Division identification region, second identification information includes error correction information code and information effect code, institute
Stating identification region includes candidate identification region and effective identification region;
Candidate's identification region includes the first identification information;
Effective identification region includes the first identification information and the second identification information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910272266.4A CN109978115B (en) | 2019-04-04 | 2019-04-04 | Anti-counterfeiting code and construction method thereof |
PCT/CN2019/093586 WO2020199394A1 (en) | 2019-04-04 | 2019-06-28 | Anti-counterfeiting code and construction method therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910272266.4A CN109978115B (en) | 2019-04-04 | 2019-04-04 | Anti-counterfeiting code and construction method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109978115A true CN109978115A (en) | 2019-07-05 |
CN109978115B CN109978115B (en) | 2020-06-09 |
Family
ID=67083057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910272266.4A Active CN109978115B (en) | 2019-04-04 | 2019-04-04 | Anti-counterfeiting code and construction method thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109978115B (en) |
WO (1) | WO2020199394A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382820A (en) * | 2020-02-25 | 2020-07-07 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899609A (en) * | 2017-03-22 | 2017-06-27 | 上海中商网络股份有限公司 | Code and its generation, verification method and device in a kind of code |
CN108122020A (en) * | 2017-12-08 | 2018-06-05 | 北京小米移动软件有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
CN108470201A (en) * | 2018-01-24 | 2018-08-31 | 重庆延伸科技开发有限公司 | A kind of multiple random color dot matrix label anti-counterfeit system |
CN108875878A (en) * | 2018-09-28 | 2018-11-23 | 武汉保诚信网络科技有限公司 | Stereoscopic two-dimensional code antifalsification label |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070218981A1 (en) * | 2004-04-16 | 2007-09-20 | Cyberview Technology, Inc. | Casino no-ticket in cashless methods allowing the redemption of large prizes |
CN102646363B (en) * | 2012-04-20 | 2014-10-08 | 李峰 | Character anti-counterfeiting and bar code combined identification structure and method therefor |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
CN109978574A (en) * | 2019-04-04 | 2019-07-05 | 广州市宝绅科技应用有限公司 | A kind of anti-counterfeiting system and method for anti-counterfeit |
-
2019
- 2019-04-04 CN CN201910272266.4A patent/CN109978115B/en active Active
- 2019-06-28 WO PCT/CN2019/093586 patent/WO2020199394A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899609A (en) * | 2017-03-22 | 2017-06-27 | 上海中商网络股份有限公司 | Code and its generation, verification method and device in a kind of code |
CN108122020A (en) * | 2017-12-08 | 2018-06-05 | 北京小米移动软件有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
CN108470201A (en) * | 2018-01-24 | 2018-08-31 | 重庆延伸科技开发有限公司 | A kind of multiple random color dot matrix label anti-counterfeit system |
CN108875878A (en) * | 2018-09-28 | 2018-11-23 | 武汉保诚信网络科技有限公司 | Stereoscopic two-dimensional code antifalsification label |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382820A (en) * | 2020-02-25 | 2020-07-07 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
CN111382820B (en) * | 2020-02-25 | 2021-10-12 | 南通大学 | Four-lattice pure-color commodity anti-counterfeiting code generation method |
Also Published As
Publication number | Publication date |
---|---|
CN109978115B (en) | 2020-06-09 |
WO2020199394A1 (en) | 2020-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101944187B (en) | Two-dimensional micro code and processing method and device thereof | |
CN106529633B (en) | Generation method, coding/decoding method and the device of two dimensional code | |
CA2408454C (en) | Machine readable code and method and device of encoding and decoding the same | |
CN104115194B (en) | Paper number reads system and paper number read method | |
CN104966115A (en) | Method for filling two-dimensional code through image | |
US8385592B2 (en) | Digital watermarking system and method | |
CN103177279A (en) | Four dimensional (4d) color barcode for high capacity data encoding and decoding | |
CN102194275A (en) | Automatic ticket checking method for train tickets | |
CN105787340B (en) | Picture validation code implementation method based on text adhesion and vision compensation | |
CN107451643B (en) | Generation, recognition methods and the device of dynamic two-dimension code | |
CN105550730A (en) | Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier | |
US7388984B2 (en) | Method of recognizing a code | |
CN105741226A (en) | Electronic stamp based visible digital image watermark embedding and detection methods | |
US9064138B2 (en) | Method for detecting reorgination of barcodes | |
CN114997352A (en) | Anti-counterfeiting tracing code generation and verification method based on dot matrix | |
US6708894B2 (en) | Method for invisible embedded data using yellow glyphs | |
CN109978115A (en) | A kind of security code and its construction method | |
JP2893080B2 (en) | Image processing method and apparatus, and copier, scanner, and printer using the same | |
CN109325568B (en) | Anti-counterfeiting two-dimensional code and modulation encryption method and identification system thereof | |
WO2020199393A1 (en) | Anti-counterfeiting system and anti-counterfeiting method | |
CN113076528A (en) | Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium | |
CN111222610B (en) | Coding and decoding method and system for double-ID two-dimensional code micro-code element | |
CN114254719B (en) | Anti-counterfeiting two-dimensional code generation method and device | |
CN113988242A (en) | Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium | |
CN102024378A (en) | Method for hiding anti-counterfeiting data in bar codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |