CN110428034A - A kind of anti-fake two-dimension code and its generation method for examining report - Google Patents

A kind of anti-fake two-dimension code and its generation method for examining report Download PDF

Info

Publication number
CN110428034A
CN110428034A CN201910742806.0A CN201910742806A CN110428034A CN 110428034 A CN110428034 A CN 110428034A CN 201910742806 A CN201910742806 A CN 201910742806A CN 110428034 A CN110428034 A CN 110428034A
Authority
CN
China
Prior art keywords
report
examining report
information
fake
dimension code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910742806.0A
Other languages
Chinese (zh)
Inventor
陈海槟
王宣元
唐超群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yuehao Aquatic Products Testing Co Ltd
Guangzhou Port Group Co Ltd
Original Assignee
Guangzhou Yuehao Aquatic Products Testing Co Ltd
Guangzhou Port Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yuehao Aquatic Products Testing Co Ltd, Guangzhou Port Group Co Ltd filed Critical Guangzhou Yuehao Aquatic Products Testing Co Ltd
Priority to CN201910742806.0A priority Critical patent/CN110428034A/en
Publication of CN110428034A publication Critical patent/CN110428034A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of anti-fake two-dimension codes for examining report, report generation date when reporting including anti-fake two-dimension code with the generation that the two dimensional code side is arranged in.The invention also discloses a kind of generation methods of anti-fake two-dimension code for examining report, comprising steps of 1) report content encrypts;2) generation of anti-false sign;3) printing has the examining report of two dimensional code;4) mobile device scans;5) true and false of examining report is verified.The present invention ensure that the uniqueness of two dimensional code by way of to content-encrypt, compares with existing two-dimension code label, has the characteristics that be not easy to duplicate, imitate.

Description

A kind of anti-fake two-dimension code and its generation method for examining report
Technical field
The present invention relates to field of anti-counterfeit technology, relate generally to a kind of for the anti-fake two-dimension code of examining report and its generation side Method.
Background technique
Quality testing is a special industry, its main function is the quality level for being truly reflected out each product, Wherein the quality level height of aquatic products, quality are all concerning the public interest and public safety of society.At present due to aquatic products quality It measures examining report and lacks effective counterfeit protection measures, the ordinary QR code in report is easy by illegal retailer by duplicating, taking pictures Various ways are easily forged, and user only relies on the true and false that can not distinguish the scanning of two dimensional code obtained information and report.
Summary of the invention
A kind of understanding technical problem to be solved by the invention is to provide increase user to examining report, improves user couple The anti-fake two-dimension code and its generation for examining report of the ability of the vigilance and identification examining report true and false of examining report Method.
The technical problems to be solved by the invention can adopt the following technical scheme that realize:
A kind of anti-fake two-dimension code for examining report, which is characterized in that including anti-fake two-dimension code and be arranged described two Tie up the report generation date when generation report of code side.
A kind of generation method of the anti-fake two-dimension code for examining report, comprising the following steps:
1) after the completion of detecting work, the side's of will test information, the obtained data of detection are saved to the number of network server According in library, the data is sorted, and be stitched together as a report content according to text positive sequence, generate the report content Digital digest;
Detection side's information and the digital digest are encrypted using encryption key, to obtain encryption information, protected Card, which encrypts later ciphertext, has uniqueness;
2) it combines the network address of network server verifying system with the number of unique ciphertext of the data, as passing through The verifying network address for stating the examining report of data generation, is stored in database;
The report content, detection side's information, encryption information, verifying network address are connected using separator, and by the report Accuse content, detection side information, encryption information, verify network address and be encoded to quick response code form using ciphertext, generation uniquely with it is described close The corresponding two-dimension code image of text, two-dimension code image is stored in database;
3) while examining report is printed, by step 2) two-dimension code image generated, the date of report generation It transfers and is printed upon on examining report from database, the two dimensional code on every portion examining report is all different;
4) when needing the authenticity to examining report to verify, pass through the two dimension on computer or Intelligent mobile equipment Code scanning tools, the two dimensional code icon on papery examining report verified to needs are scanned;
5) the examining report preview interface reflected in papery examining report and web browser is subjected to content and lattice The comparison of formula is verified as a result, judging the true or false of papery examining report according to verification result.
In a preferred embodiment of the invention, detection side's information includes detection side's identity information.
In a preferred embodiment of the invention, the algorithm of the encryption key operation is SHA1 algorithm, SHA256 calculation Method or MD5 algorithm.
The beneficial effects of the present invention are: a kind of anti-fake two-dimension code and its generation method for examining report, by internal The mode for holding encryption ensure that the uniqueness of two dimensional code, compare with existing two-dimension code label, have the spy for being not easy to duplicate, imitate Point;Scan the two-dimensional code and more information in relation to reporting can be obtained: report print time, two-dimensional code scanning number etc. are mentioned to user For authentication information, increase the understanding for forging difficulty, user to examining report, improves user to the vigilance of examining report;It is a variety of Method distinguishes the true and false for reporting upper two dimensional code, improves the ability that user identifies the examining report true and false, preferably safeguards public interest And public safety.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of the anti-fake two-dimension code for examining report of the present invention.
Fig. 2 is a kind of flow chart of the anti-fake two-dimension code generation method for examining report of the present invention.
Fig. 3 is the logic chart that wechat of the present invention is scanned the two-dimensional code and authorized.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below Conjunction is specifically illustrating, and the present invention is further explained.
Referring to Fig. 1, what is provided in figure is a kind of anti-fake two-dimension code for examining report, including anti-fake two-dimension code 1 and is set The report generation date 2 in the generation report of two dimensional code side is set, report generation day has been taken below the two dimensional code of printing Phase can allow the people of scanning to know the date of report generation, prevent that old report is taken to be forged.
Two dimensional code is provided with multilayer, including from bottom to top set gradually substrate, the first silicone coating, flexible photosensitive resin Layer, the transparent enhancement layer for enhancing ink adhesion, is printed on table on transparent stock at transparent adhesive tape water layer, transparent stock Bread contains the printing two dimensional code of information, protective film adhesive-layer, protective film layer, and transparent stock is pasted by transparent adhesive tape water layer On flexible photosensitive resin layer;Protective film layer is compounded using one or more of acrylic resin, polyurethane resin, polyester resin Object.
Two dimensional code and report generation date are printed using warm variable anti-counterfeiting ink printing, and anti-counterfeiting information is encrypted by computer Software cryptography generates image in 2 D code output, is printed on out on printed text and is printed by common printed and warm variable anti-counterfeiting ink System generates printing version, then covers to the two dimensional code in printing version;The common printed zone location printing for carrying out two dimensional code, The print information that part does not encrypt can also be added, encrypted two dimensional code is printed in warm variable anti-counterfeiting ink printing.
Temperature becomes anti-fake using temperature-sensing color-changing material progress in anti-counterfeit printing, and heat discoloration pigment is organic by electron transfer type The preparation of chemical combination objects system;Electron transfer type organic compound is a kind of organic chromophoric system with special chemical structure;In Because electronics transfer makes the molecular structure of the organic matter change under cardinal temperature, to realize color transition.In heat discoloration Electrochromic particles containing microcapsules and pearlescent particles, microcapsules electrochromic particles are spherical, partial size between 1-10UM, inside be can Inverse heat discoloration pigment, outside, which is about 0.2-0.5 microns of a thickness, can neither dissolve the transparent outer cover that will not melt;Pearly-lustre is micro- Grain-by-grain seed selection is one such from metal microbead, the coated microballon in surface, pearly-lustre toner coloring epoxy resin microballon, the partial size of pearlescent particles For 0.1-3mm;When recognition, heating equipment can be used, two dimensional code and report generation date is heated, by optical instrument into Row identification, is decrypted anti-counterfeiting information by computer after identification, passes through text, voice or video signal output information.
Ink used by the two dimensional code of printing is transparent or light ink, and ink includes 5-10wt% nano fluorescent Ceramic material, the carbon black of 10-20wt%, the auxiliary agent of 50-60wt% oiliness improver and 10-20wt%;Nano fluorescent ceramic material is It is made of and fires the raw material of following parts by weight: Al2O3200-300 parts, Y2O3300-350 parts, SiO250-100 parts, CeO215-20 parts, Pr2O35-10 parts, As2O32-5 parts, B2O33-5 parts;The partial size of nano fluorescent ceramic material is 100- 1000nm, nano fluorescent ceramic material can issue yellow fluorescence under the irradiation to the blue visible light that wavelength is 450-470nm. Temperature reading is heated up to certain temperature just and can be changed to the colors such as emerald green, peacock green, indigo plant, dark brown, can be this with silk-screen when then using Warm variable anti-counterfeiting ink is transparent two dimensional code, and on printed matter, not scrutinizing is that can't see, and the information of two dimensional code is in room temperature Under be surface sweeping not come out.In order to verify the product whether the true and false when, can by heating after scan, can scan and come two Code information is tieed up, to reach anti-counterfeit printing effect.
Referring to fig. 2, a kind of generation method of the anti-fake two-dimension code for examining report, comprising the following steps:
1) report content encrypts
After the completion of detecting work, the side's of will test information, the obtained data of detection are saved to the data of network server In library, data are sorted according to text positive sequence, and is stitched together as a report content, the number for generating report content is plucked It wants;
Detection side's information and digital digest are encrypted using encryption key, to obtain encryption information, guarantee encryption with Ciphertext afterwards has uniqueness, and the algorithm of encryption key operation is SHA1 algorithm, SHA256 algorithm or MD5 algorithm, it is preferred that is added The algorithm of key operation is SHA256 algorithm;
The content for splicing later is encrypted, that is to say, that as long as content changes, encrypted ciphertext It can be different.
2) generation of anti-false sign
21) two-dimension code image is generated
It combines the network address of network server verifying system with the number of unique ciphertext of data, is generated as by data Examining report verifying network address, be stored in database in;Using separator by report content, detection side's information, encryption information, test It demonstrate,proves network address to be connected, and report content, detection side's information, encryption information, verifying network address is encoded to quick response code form using ciphertext, Detection side's information includes detection side's identity information;Uniquely two-dimension code image corresponding with ciphertext is generated, two-dimension code image is deposited Enter in database.
In the case where not knowing encryption method, adulterator can not know it by a report number and other content The two dimensional code or oneself design two dimensional code that he reports, the two dimensional code on every portion examining report is all different.
The realization code that two dimensional code generates are as follows:
22) the report date is generated
The code function of Go: time.Now () .Format (" 2006-01-02 ") is used, the report date is generated, will report The content information of date of formation is saved in database.
23) wechat public platform is linked
The webpage registered a wechat public platform first, establish an official, by the webpage of wechat public platform binding official Address;Content only in this official's network address in the public platform that can just appear in the company of certification, ensures that in this way, this The content that a wechat public platform occurs represents official, company, is not that the content under this public platform is not then.
Wechat public platform log in obtain information code be
24) scanning person's information is obtained
After wechat authorization logs in, it is known that the pet name of scanning person, head portrait and Position Approximate, server is by each scanning The information storage of person is in the database.
3) printing has the examining report of two dimensional code
While examining report is printed, the report of two-dimension code image, step 22) generation that step 21) is generated Date is printed upon on examining report together, and report generation date print is on the periphery of two-dimension code image, it is preferred that report generation day Phase is printed upon the underface of two-dimension code image.
Display or when printed report, can show the date of formation of report simultaneously, as verifying one of them anti-fake Reference information.
4) mobile device scans
When needing the authenticity to examining report to verify, pass through the two dimensional code on computer or Intelligent mobile equipment Scanning tools, the two dimensional code icon on papery examining report verified to needs are scanned.
Referring to Fig. 3, logic flow that wechat is scanned the two-dimensional code and authorized are as follows: a) obtain correct complete examining report first Data, and by system generate H5 page network address;B) mobile phone scanning open the H5 page or website or computer open the H5 page or Website;C) after user opens the H5 page, request wechat server is gone by aol server, obtains AccessToken, AccessToken control server can realize self-test, actively refresh within 1 and a half hours primary, calling wechat API;D) by micro- Believe API, the available user information for checking the H5 page, and corresponding anti-counterfeiting information is provided.
The wherein network address of the H5 page as reports the network address of webpage;Preferably, two-dimensional code scanning tool is started for intelligent sliding The wechat APP of machine downloading, two dimensional code itself stores the character string information of official website address, after being scanned the two-dimensional code with wechat, Wechat public platform can be jumped to, the official website can be jumped to according to the character string information stored in two dimensional code with evident;Together When, server can initiate " obtaining personal information " authorization requests, after user clicks agreement request, service to user by wechat The pet name of the available scanning person of device, head portrait, openid;About the acquisition user basic information (UnionID mechanism) in wechat: After follower and public platform generate interacting message, public platform can get follower OpenID (encrypted WeChat ID, each User is unique to the OpenID of each public platform.For different public platforms, the openid of same user is different).Public platform User basic information, including the pet name, head portrait, gender, place city, language and pass can be obtained according to OpenID by this interface Infuse the time.
5) true and false of examining report is verified
The examining report preview interface reflected in papery examining report and web browser is subjected to content and format Comparison, be verified as a result, judging the true or false of papery examining report according to verification result.
When scanning input two dimensional code, Unique notification corresponding with the ciphertext can only be accessed, ensure that can only be by sweeping Two dimensional code is retouched to inquire online report content;When scanning input two dimensional code opens webpage, in the content that display is reported Meanwhile scanned number before also showing, and the information of all scanning persons is recorded, identification can be provided for the people currently checked Information, and path is spread for report manager's record report.
" two dimensional code for having date and wechat barcode scanning " prints the two dimensional code generated by system, two dimension from preset position Digital content is the hash network address generated according to content, is unique two dimensional code, in two dimensional code bottom plus the date of report, In After being scanned the two-dimensional code with wechat, the correct content of report is shown.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, various changes and improvements may be made to the invention without departing from the spirit and scope of the present invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention is by appended claims and together Equal objects define.

Claims (4)

1. a kind of anti-fake two-dimension code for examining report, which is characterized in that including anti-fake two-dimension code and be arranged in the two dimension The report generation date when generation report of code side.
2. a kind of generation method of the anti-fake two-dimension code for examining report, comprising the following steps:
1) after the completion of detecting work, the side's of will test information, the obtained data of detection are saved to the database of network server In, the data are sorted, and be stitched together as a report content according to text positive sequence, generates the number of the report content Word abstract;
Detection side's information and the digital digest are encrypted using encryption key, to obtain encryption information, guarantee to add Close later ciphertext has uniqueness;
2) by network server verifying system network address combined with the number of unique ciphertext of the data, as pass through the number According to the verifying network address of the examining report of generation, it is stored in database;
The report content, detection side's information, encryption information, verifying network address are connected using separator, and will be in the report Appearance, detection side's information, encryption information, verifying network address are encoded to quick response code form using ciphertext, generate uniquely with the ciphertext phase Two-dimension code image is stored in database by corresponding two-dimension code image;
3) while examining report is printed, by step 2) two-dimension code image generated, report generation date from number It transfers and is printed upon on examining report according to library, the two dimensional code on every portion examining report is all different;
4) it when needing the authenticity to examining report to verify, is swept by the two dimensional code on computer or Intelligent mobile equipment Tool is retouched, the two dimensional code icon on papery examining report verified to needs is scanned;
5) the examining report preview interface reflected in papery examining report and web browser is subjected to content and format Comparison, is verified as a result, judging the true or false of papery examining report according to verification result.
3. a kind of generation method of the anti-fake two-dimension code for examining report as claimed in claim 2, which is characterized in that described Detection side's information includes detection side's identity information.
4. a kind of generation method of the anti-fake two-dimension code for examining report as claimed in claim 2, which is characterized in that described The algorithm of encryption key operation is SHA1 algorithm, SHA256 algorithm or MD5 algorithm.
CN201910742806.0A 2019-08-13 2019-08-13 A kind of anti-fake two-dimension code and its generation method for examining report Pending CN110428034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910742806.0A CN110428034A (en) 2019-08-13 2019-08-13 A kind of anti-fake two-dimension code and its generation method for examining report

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910742806.0A CN110428034A (en) 2019-08-13 2019-08-13 A kind of anti-fake two-dimension code and its generation method for examining report

Publications (1)

Publication Number Publication Date
CN110428034A true CN110428034A (en) 2019-11-08

Family

ID=68415757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910742806.0A Pending CN110428034A (en) 2019-08-13 2019-08-13 A kind of anti-fake two-dimension code and its generation method for examining report

Country Status (1)

Country Link
CN (1) CN110428034A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160496A (en) * 2019-12-31 2020-05-15 中煤科工集团重庆研究院有限公司 Coal mine daily outburst prevention report anti-counterfeiting authentication method
CN112233749A (en) * 2020-10-19 2021-01-15 北京人人关爱健康公益基金会 Health detection report acquisition method and device, computer equipment and storage medium
CN113238738A (en) * 2021-06-16 2021-08-10 杭州遥望网络科技有限公司 Automatic generation method, device, equipment and medium for small program two-dimensional code
CN113421647A (en) * 2021-07-20 2021-09-21 上海暖禾临床心理诊所有限公司 Psychological state data acquisition, processing and output system and method based on two-dimensional code
CN115115011A (en) * 2022-08-29 2022-09-27 江苏铨通印数字印刷有限公司 Anti-counterfeiting two-dimensional code generation and use method for intelligent digital printing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103465606A (en) * 2013-08-04 2013-12-25 广东信源彩色印务有限公司 Temperature two-dimension code anti-counterfeiting printing technology
CN104318196A (en) * 2014-10-28 2015-01-28 天津市建筑工程质量检测中心 Project quality examining report two-dimension code anti-fake verifying method
WO2015152697A1 (en) * 2014-04-04 2015-10-08 대한민국(관리부서:행정안전부 국립과학수사연구원장) Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103465606A (en) * 2013-08-04 2013-12-25 广东信源彩色印务有限公司 Temperature two-dimension code anti-counterfeiting printing technology
WO2015152697A1 (en) * 2014-04-04 2015-10-08 대한민국(관리부서:행정안전부 국립과학수사연구원장) Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification
CN104318196A (en) * 2014-10-28 2015-01-28 天津市建筑工程质量检测中心 Project quality examining report two-dimension code anti-fake verifying method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160496A (en) * 2019-12-31 2020-05-15 中煤科工集团重庆研究院有限公司 Coal mine daily outburst prevention report anti-counterfeiting authentication method
CN112233749A (en) * 2020-10-19 2021-01-15 北京人人关爱健康公益基金会 Health detection report acquisition method and device, computer equipment and storage medium
CN112233749B (en) * 2020-10-19 2021-06-18 北京人人关爱健康公益基金会 Health detection report acquisition method and device, computer equipment and storage medium
CN113238738A (en) * 2021-06-16 2021-08-10 杭州遥望网络科技有限公司 Automatic generation method, device, equipment and medium for small program two-dimensional code
CN113421647A (en) * 2021-07-20 2021-09-21 上海暖禾临床心理诊所有限公司 Psychological state data acquisition, processing and output system and method based on two-dimensional code
CN115115011A (en) * 2022-08-29 2022-09-27 江苏铨通印数字印刷有限公司 Anti-counterfeiting two-dimensional code generation and use method for intelligent digital printing
CN115115011B (en) * 2022-08-29 2022-11-01 江苏铨通印数字印刷有限公司 Anti-counterfeiting two-dimensional code generation and use method for intelligent digital printing

Similar Documents

Publication Publication Date Title
CN110428034A (en) A kind of anti-fake two-dimension code and its generation method for examining report
JP3803378B2 (en) Secure copy of confidential documents
US8256688B2 (en) Method for certifying and subsequently authenticating original, paper or digital documents for evidences
TW307849B (en)
US8340291B2 (en) Systems and processes of automatic verification and protection of paper documents against falsification, adulteration and leakage
JP7135103B2 (en) Certification of packaged products
CN101537751B (en) Novel method for processing anti-counterfeit printing
JP2003534753A (en) System and method for creating and authenticating original documents
TW200816061A (en) Scanner authentication
KR20030038677A (en) Authentication watermarks for printed objects and related applications
US10688822B1 (en) Embedding 3D information in documents
EA003919B1 (en) Method and system for authentication of articles
US20160323108A1 (en) Accessing Content by Processing Secure Optical Codes
US20160323107A1 (en) Secure Optical Codes for Accessing Content
JP2005532610A (en) System and method for expressing usage rights using modulated signals
JP2013541431A (en) Improved security for flexible substrates
JP2003527778A (en) Protection of the legitimacy of electronic documents and their printed copies
US12003967B2 (en) Devices, systems, and methods using microtransponders
US20010046294A1 (en) Method of and system for counterfeit prevention
JP2005141626A (en) Ic card and ic card authentication system
JP2004058410A (en) Method, system and apparatus for printing secret information
JP6532534B2 (en) A method for authentication and verification of security documents based on the measurement of relative position variations in different processes involved in the creation of security documents
US20230356539A1 (en) Systems and methods for token authentication
US11809582B2 (en) Techniques for secure document management and verification
CN108646993A (en) Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191108