CN111639734A - Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method - Google Patents

Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method Download PDF

Info

Publication number
CN111639734A
CN111639734A CN202010455714.7A CN202010455714A CN111639734A CN 111639734 A CN111639734 A CN 111639734A CN 202010455714 A CN202010455714 A CN 202010455714A CN 111639734 A CN111639734 A CN 111639734A
Authority
CN
China
Prior art keywords
code
information
commodity
verification
visual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010455714.7A
Other languages
Chinese (zh)
Other versions
CN111639734B (en
Inventor
李青锋
牛建伟
黄若菡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jushi Technology Co ltd
Original Assignee
Beijing Jushi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jushi Technology Co ltd filed Critical Beijing Jushi Technology Co ltd
Publication of CN111639734A publication Critical patent/CN111639734A/en
Application granted granted Critical
Publication of CN111639734B publication Critical patent/CN111639734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Toxicology (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to a novel two-dimensional code coding and anti-counterfeiting application method embedded with a QR code, which comprises the following steps: generating an information verification database for storing commodities at a verification center of a server side, wherein verification information is expressed as < a commodity information link address, verification information and a reserved visual code > triple; respectively compiling at the server side according to the triple information to generate a novel anti-counterfeiting two-dimensional code embedded with the QR code, and fusing visual information; scanning the anti-counterfeiting two-dimensional code on the commodity by using a third-party QR code scanner at a user side, skipping to an identification program of the visual anti-counterfeiting two-dimensional code by scanning the code, and identifying the commodity information link address and the encrypted verification information; and decrypting at the server side to obtain verification information, verifying commodity information, extracting the reserved visual code after verification is successful, and displaying the extracted reserved visual code to a consumer for visual verification. The invention solves the problem of embezzlement risk caused by the open QR code coding standard, and the realized anti-counterfeiting two-dimensional code is simple and easy to identify, low in price and high in safety.

Description

Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method
Technical Field
The invention relates to a novel two-dimensional code coding and anti-counterfeiting application method embedded with a QR (quick response) code, belonging to the technical field of two-dimensional code image processing and application.
Background
In recent years, with the improvement of life quality of people, people pay more and more attention to commodity brands. In order to improve the brand effect of commodities, merchants must prevent the damage to the brands of the commodities caused by counterfeit goods production and excessive goods, and therefore various means are adopted for the anti-counterfeiting work of the commodities. The anti-counterfeiting is verified by a consumer anti-counterfeiting code inquiry center for enterprise products, and is a technical means for identifying authenticity and preventing counterfeiting, alteration and cloning behaviors.
At present, the market capacity of the anti-counterfeiting industry in China reaches 8000 hundred million yuan. More than 90% of Chinese medicines, more than 15% of foods and more than 95% of tobacco and wine products all use anti-counterfeiting technology. Due to the vigorous downstream market demand, the market capacity of the Chinese anti-counterfeiting industry will be further increased.
Currently, common anti-counterfeiting technologies mainly include laser label anti-counterfeiting, inquiry type anti-counterfeiting, texture anti-counterfeiting labels, safety line anti-counterfeiting paper technologies and the like, and in recent years, along with the rapid popularization of digitization technologies, digital anti-counterfeiting technologies are also widely applied. In the traditional digital anti-counterfeiting method, a unique verification password is set for each commodity, and the password is stored in a central database. The consumer purchases the commodity with the selected digital anti-counterfeiting mark, and can know the authenticity of the product by only dialing the telephone and inputting the password on the commodity, thereby breaking through the limitations that the traditional anti-counterfeiting product is easy to prevent counterfeiting in batches and the consumer is difficult to identify.
Two-dimensional code anti-counterfeiting is taken as a digital anti-counterfeiting method, and is favored by many manufacturers due to convenience. The current two-dimensional code anti-counterfeiting technology mainly relies on the code scanning behavior of a consumer for the first time to record and remind a user to check and complete the code scanning record, the principle is simple, and the user can use the code conveniently.
However, since the commonly used QR code is a completely open standard encoding mode, the security of the QR code is limited, even if the anti-counterfeiting QR code is often printed on fragile paper or strong glue, the QR code cannot be completely removed from the product for reuse. However, an illegal merchant can easily directly acquire the information contained in the QR code by using an open bar code reader, so that a false anti-counterfeit label is manufactured, and extra risks are brought to a real enterprise side.
With the gradual maturity of image coding and image recognition technologies, autonomous non-open coding modes are gradually used in large-scale applications, such as WeChat small program codes, jittering two-dimensional codes and the like, and the unique coding and recognition mechanisms are utilized to hide real information contained in the codes, so that the generation of the codes is ensured to come from an authoritative single source. However, the autonomous non-open coding method usually requires a proprietary barcode scanner or APP program to scan and decode, and it is difficult for some small and medium enterprises and non-internet enterprises to popularize the proprietary barcode scanner in the consumer terminal. In the process of identifying the counterfeit-proof label, a consumer needs to additionally download a new APP, the complexity of identifying the counterfeit is improved, and the intermediate abandonment of the counterfeit products identified by the consumer is indirectly caused.
Disclosure of Invention
The invention provides a novel QR code embedded two-dimensional code coding and anti-counterfeiting application method in consideration of the risk problem caused by the open standard of a QR code and the problem that a special code scanner must be adopted in an autonomous non-open coding mode. In addition, the invention also combines the use of an artistic two-dimensional code coding mode, increases the processes of visual verification and the like, and improves the security of two-dimensional code anti-counterfeiting to a great extent.
The invention provides a novel QR code embedded and anti-counterfeiting application method, which mainly comprises the steps of generating information to be coded, coding and generating a two-dimensional code, scanning and analyzing the two-dimensional code and checking the information, wherein:
(1) and generating information to be coded. Establishing a verification center of the two-dimensional code at a server, automatically generating a commodity information item for each commodity to be coded according to commodity information, automatically generating commodity verification information of a triple group consisting of a commodity information link address, verification information and a reserved visual code, and establishing a commodity information verification database. The commodity information link address and the verification information can be positioned and uniquely positioned to a commodity information item; the reserved visual code is a pattern or character which can be recognized by human eyes, and can be generated by a random method or randomly selected from an established large-capacity material library. Each commodity verification information in the commodity information verification database is provided with an attribute item, wherein the attribute item comprises verification application times, a verification state and a verification IP address;
(2) and (5) encoding and generating the two-dimensional code. And an encoder at the server applies for and obtains the commodity verification information of a triple from the verification center, encrypts the verification information by using the public key to obtain encrypted information, and generates a visual anti-counterfeiting two-dimensional code of the commodity. The two-dimensional code is divided into a QR code area and an autonomous coding area; and directly coding the commodity information link address according to a QR code coding standard, and filling a QR code area. And filling the encrypted information obtained by encrypting the verification information into the autonomous coding area. And inlaying and aligning the QR code area and the autonomous coding area to obtain a novel anti-counterfeiting two-dimensional code. And reserving a visual coding region in the QR code region, rendering the reserved visual coding to generate an image, arranging according to the position of the reserved visual coding region, and fusing with a preset image to form a visual background image. And an artistic two-dimensional code generation technology is utilized to fuse the anti-counterfeiting two-dimensional code and the visual background image to generate a final novel visual anti-counterfeiting two-dimensional code of the commodity.
(3) And scanning and analyzing the two-dimensional code. And scanning the visual anti-counterfeiting two-dimensional code attached to the commodity by using a third-party QR code scanner at the user side, analyzing a QR code area, and obtaining a commodity information link address. And skipping to an identification program of the visual anti-counterfeiting two-dimensional code according to the commodity information link address obtained by decoding and the configuration in the third-party platform. And starting a self-defined code scanner by the visual anti-counterfeiting two-dimensional code identification program, detecting the locator mark of the QR code area, and calculating to obtain the self-encoding area. And collecting the code arrangement of the autonomous coding region by using a sampling algorithm, and sending the code arrangement to the server side. And the decoder at the server side restores the encrypted information according to the encoding sequencing sequence of the appointed autonomous encoding area, and sends the commodity information link address and the encrypted information to the verification center.
(4) And (4) checking the information. And the verification center of the server verifies the commodity information link address and the encrypted information after receiving the commodity information link address and the encrypted information, and decrypts the encrypted information by using the private key to obtain verification information. And the verification center searches corresponding commodity information items by combining the commodity information link address and the verification information. And if the corresponding commodity information is not found, directly reminding the user of the counterfeit product risk and feeding back the user that the commodity is a counterfeit product. If the corresponding commodity information can be found, recording the user checking behavior, and feeding back the checked historical information to the user. After the commodity information is checked, the verification center searches the database and feeds the reserved visual code back to the user for visual verification with the visual code reserved on the visual anti-counterfeiting two-dimensional code on the commodity.
Compared with the prior art, the invention has the advantages and positive effects that:
(1) compared with the traditional method for only adopting the unique commodity ID and recording the commodity authentication times for two-dimensional code anti-counterfeiting, the method provided by the invention fully utilizes the encryption algorithm and the technologies of two-dimensional code self-defined encoding, decoding and the like, has higher safety, can prevent the problem that the encoded content is easy to leak due to the opening of a QR code system, and ensures the uniqueness of the anti-counterfeiting two-dimensional code manufacturing source.
(2) The novel anti-counterfeiting two-dimensional code generated by the method can be easily compatible with a traditional QR code correlation-based management system, and can be directly compatible and replaced by the novel two-dimensional code without adopting any hardware or software upgrading aiming at the existing schemes related to two-dimensional code management, such as logistics management, warehouse management and the like.
(3) The embedded QR code integrated with the visual information is generated by the method, so that a commodity anti-counterfeiting method which is simple and easy to identify, low in price and high in safety is realized, the operation of a user is facilitated in the process of checking the counterfeit goods, and the brand safety of the commodity can be protected; in the process of identifying the genuine product, for consumers, the method is simple to operate, low in cost and easy in counterfeit identification, a special code scanner does not need to be additionally downloaded, and information does not need to be manually input.
(4) The visual anti-counterfeiting two-dimensional code realized by the method has lower manufacturing cost, can fully acquire code scanning behaviors and data information of a user besides ensuring the basic anti-counterfeiting function, and provides data support for analyzing the commodity circulation condition and the like.
Drawings
FIG. 1 is a general block diagram of the implementation of the QR-code-embedded novel two-dimensional code encoding and anti-counterfeiting application method of the present invention;
FIG. 2 is a schematic diagram of coding region division of a two-dimensional code according to the present invention;
FIG. 3 is a schematic diagram of a QR code embedded novel visual two-dimensional code generation process of the present invention;
FIG. 4 is a sample of a novel visual two-dimensional code of the present invention embedded in a QR code;
fig. 5 is a schematic diagram of the decoding process and anti-counterfeiting principle of the novel visual two-dimensional code embedded with the QR code.
Detailed Description
The present invention will be described in further detail below with reference to the accompanying drawings.
The invention provides a novel QR code embedded two-dimensional code coding and anti-counterfeiting application method, which mainly comprises the steps of generating information to be coded, coding and generating a two-dimensional code, scanning and analyzing the two-dimensional code and checking information, wherein the whole process is shown in figure 1, and the specific implementation processes of the four parts are respectively described in detail below.
Step 1, the verification center is located at a server side, and an information database for storing commodities to be coded is generated at the verification center of the server side. The step automatically generates a triple group of < the goods information link address, the verification information and the reserved visual code > according to the goods information, establishes a goods information verification database and is described by the following 4 sub-steps.
Step 1.1, establishing a basic commodity information database; a reasonable table structure of a database is established according to commodity information, a commodity information item is established in the database table for each commodity, and data items contained in the commodity information item comprise manufacturers, commodity names, commodity models, production dates, commodity batches, distributors and the like.
Step 1.2, aiming at each commodity information item, a triple composed of a commodity information link address, verification information and a reserved visual code is automatically generated, and a commodity information verification database is established. The commodity information link address is composed of a link address prefix and a link address parameter, and the link address prefixes of the same type of commodities are the same. In the whole information verification database, the 'commodity information link address' can be repeated, but two parts of the 'commodity information link address' and the 'verification information' need to be ensured, and a certain commodity information item in the commodity basic information database can be positioned and uniquely positioned. The "link address parameter" and the "authentication information" may be automatically generated using a random method.
For example, for a certain product, the link address prefix is designed to be http:// domain.com/v/", and a" link address parameter ", such as" xxxx ", is randomly generated, so that the" commodity information link address "is formed to be http:// domain.com/v/xxxx". At the same time, a piece of "authentication information", for example, "aiTeixeit-xltslo", is randomly generated. In the whole commodity information verification database, the combination of the commodity information link address and the verification information is unique, namely xxxxaitexixeit-xltslo, so that a user can be helped to quickly locate a certain commodity, and the commodity information link address is equivalent to the unique serial number of the commodity in a certain sense.
In practical application, the encoding lengths of the two parts can be properly adjusted according to different situations, and even the link address parameter is not set, and the uniqueness of the number is ensured only by one part of the verification information.
And 1.3, generating a reserved visual code. The "reserved visual code" is a text or pattern or a combination of both that can be recognized by the human eye. Reserved visual codes, such as "00023X 7," are designed and automatically generated using random or fixed methods. The reserved visual code can have certain practical significance, such as commodity batch number information and the like, so that commodity sales personnel can manage goods supply and the like conveniently. The reserved visual code may also be generated completely randomly, reserved only for visual verification by the consumer. In addition, the reserved visual coding can be matched with a subsequent visual image rendering link, random selection is carried out from the established high-capacity material library, and a rendering rule is designed to correspond to the reserved visual verification content.
And step 1.4, associating each item of the established triple information < the commodity information link address, the verification information and the reserved visual code >, and maintaining information such as verification record application, verification state and the like. Attribute items including verification application times, verification states, verification IP addresses and the like are set for the triple information of each commodity in the commodity information verification database.
And 2, carrying out two-dimensional code coding and generation on each commodity at the server side. The triple information obtained in the step 1 is respectively coded into different parts according to a coding mechanism to generate a novel anti-counterfeiting two-dimensional code embedded with a QR code, and visual information is fused. The following is divided into 5 sub-steps for illustration.
And 2.1, firstly dividing the whole two-dimensional code into two parts from a coding region, wherein one part is a QR code region, and the other part is an autonomous coding region. The QR code area is a square area and is positioned at the center of the two-dimensional code; the "self-encoding area" is located around the "QR code area", and is determined according to the needs of the enterprise user and the size of the required encoding capacity, and may be any shape, such as a common circular arc shape, or a special shape designed according to a commodity type mark or the like. In addition, as shown in fig. 2, the reserved "visual coding region" is specified in the present invention, and it should be noted that the region is directly superimposed on the QR code region, and the position and shape thereof may also be relatively flexible. The reserved 'visual coding area' does not affect the identification of the QR code.
And 2.2, the encoder applies for the verification center and obtains a piece of triple information. And directly coding the commodity information link address according to a QR code coding standard, and filling a QR code area. The verification information is encrypted by using a public key, and the obtained encrypted information is filled in the autonomous coding region according to a preset coding method and a filling sequence.
The QR code area is usually in the central position of the two-dimensional code, and the code completely conforms to the international QR code standard and is composed of a coding area, a locator and the like. The self-defined coding regions are distributed around the QR code and are arranged by a self-defined coding arrangement method, and mainly comprise two parts of data and error correction, but do not comprise a locator and the like.
Attention is paid to: 1) in the triple information application process, the encoder automatically applies to the verification center by the role of the user, and the triple information is applied under the protection of user authentication according to the account and the password which are set with independent identifications by different encoders. The triplet can be obtained only by a trusted encoder, and a strict encryption communication mode is adopted in the network transmission process to prevent stealing. 2) The public key for encrypting the "authentication information" is generated by the authentication center and distributed to the respective encoders. The generation of the public key is directly set by the enterprise user, the public key of each commodity can be different, but the public key needs to keep corresponding relation with the private key maintained by the verification center. The public key is distributed to anti-counterfeiting two-dimensional code manufacturers or a labeling assembly line of the two-dimensional code is directly used, the private key is reserved in the verification center, and the public key and the private key are a pair of keys generated according to an asymmetric encryption algorithm. 3) The self-defined code system can be adopted in the self-defined coding area in the coding process, for example, Reed Solomon coding is commonly adopted, binary coding is used for constructing information, a black module is used for marking 1, and a white module is used for marking 0. In code arrangement, modules in the custom code area are marked in a grid mode generally, and are arranged from left to right and from top to bottom in sequence.
And 2.3, inlaying and aligning the coded QR code area and the self-encoding area to obtain the novel anti-counterfeiting two-dimensional code. The two areas are arranged according to the specified size and position and do not overlap with each other. Note that the autonomous encoding area no longer includes contents such as a two-dimensional code locator, and the locator flag of the "QR code area" is directly borrowed during decoding.
And 2.4, rendering the reserved visual codes, such as numbers, characters, symbols or special patterns, to generate images, arranging the images according to the specified position of the reserved visual code area, and fusing the images with the specified images to form the visual background image. The reserved visual code can be subjected to appropriate form change and color change in the rendering process, for example, the artistic character font is used for rendering, so that the problem that the coded pattern is automatically identified by a machine or the difficulty of being read by the machine is increased can be avoided, the coded pattern can only be read by a person, and the safety is improved. The "designated image" in the rendering process is often a designated trademark LOGO or the like, and is not limited herein, and may be a solid background pattern. In addition, the reserved visual code is not necessarily English characters or numbers, and can be other visual information, even textures, stripes and the like.
And 2.5, fusing the novel anti-counterfeiting two-dimensional code and the visual background image by utilizing an artistic two-dimensional code generation technology to generate the novel visual anti-counterfeiting two-dimensional code. In the process, the two-dimension code pattern is properly deformed mainly on the premise that the coded information contained in the two-dimension code is unchanged and can be normally analyzed by the code scanner, so that the attractiveness is improved, and visual information is increased.
As shown in fig. 3, in order to perform two-dimensional code encoding on certain commodity information, a schematic diagram of the information visual anti-counterfeiting two-dimensional code of the present invention is generated, wherein the reserved visual code is rendered as a circular diagram of a red-background white font and a pattern, the generated anti-counterfeiting two-dimensional code is also a two-dimensional code of a red base tone, and fig. 3 is a gray scale diagram. Fig. 4 is a gray scale schematic diagram of two novel visual two-dimensional codes embedded with QR codes generated by the method of the present invention.
As shown in fig. 5, the process is performed to scan and analyze the anti-counterfeit two-dimensional code of the commodity and verify the anti-counterfeit information.
And 3, scanning and analyzing the two-dimensional code at the user side. In the step, a third-party QR code scanner is used for scanning a QR code area on a commodity, such as the code scanning function of WeChat and Payment treasures, the code is scanned and is directly jumped to a visual anti-counterfeiting two-dimensional code identification program authenticated by a verification center official, and if a visual anti-counterfeiting two-dimensional code identification small program is developed in WeChat, the small program is used for further code scanning analysis of an independent coding area. This is illustrated in 4 sub-steps below.
And 3.1, analyzing the QR code area by using a QR code scanner of a third party to obtain the commodity information link address. And directly jumping the user operation interface to a designated applet according to the commodity information link address obtained by decoding, the configuration in a third-party platform and the like. For example, the link address "http:// domain.com/v/xxxx" can be obtained by scanning the two-dimensional code through the WeChat, and according to the configuration in the WeChat platform, all domain names with the prefix of "http:// domain.com/v/" obtained by decoding directly jump to the visual anti-counterfeiting two-dimensional code identification applet, and meanwhile, the designated link address parameter "xxxx" is attached to the past so as to facilitate the subsequent processing.
And 3.2, starting a self-defined code scanner by the visual anti-counterfeiting two-dimensional code identification small program, detecting the two-dimensional code locator mark, calculating to obtain an autonomous coding area, acquiring the code arrangement of the autonomous coding area by using a sampling algorithm, and sending the code arrangement to the server. When identifying the autonomous coding region, the locator detection process is performed according to a "return" font locator detection algorithm, for example, a binarization operation is performed on the image, and then the image is processed according to a "black: white: black: white: detecting according to the ratio of black to black of 1:1:3:1:1 in the transverse direction and the longitudinal direction respectively, and determining the position of the center point of the locator; after the locator is determined, the size and the grid distribution of each module of the QR two-dimensional code image can be indirectly determined according to the version number of the QR code, so that the self-encoding area is determined according to the grid area position appointed during encoding. By using the sampling method, 0 or 1 represented by each module of the autonomous coding region can be obtained.
And 3.3, the decoder at the server side can restore the byte streams of 0 and 1 according to the agreed coding arrangement mode. It should be noted that there may be some errors in the recovered byte stream, which may be caused by the interference of the scanner by external factors such as light. In order to repair the errors, the invention can restore the original encrypted information under the condition that the errors of the original two-dimensional code module are not serious according to the principle of a check algorithm, such as a Reed-Solomon error correction algorithm and the like.
And 3.4, the decoder at the server side sends the commodity information link address and the encrypted information obtained in the code scanning analysis process to the verification center.
It should be noted that the access of the decoder and the verification center of the server side by the barcode scanner invoked during the identification of the visual anti-counterfeiting two-dimensional code is also performed under the control of the security authority, and only the barcode scanner trusted by the verification center can access the verification center.
And 4, verifying the verification information at the server side. According to the code scanning result, the obtained commodity link address and the obtained encrypted information are submitted to a verification center for verification, and after the verification is successful, the reserved visual code is extracted and displayed to the consumer for visual verification. The following is illustrated in three substeps.
And 4.1, the verification center processes the obtained encrypted information by using the private key, and can decrypt the encrypted information to obtain verification information. The private key used here is generated by the verification center and is matched with the public key used in the encoding process.
And 4.2, checking and checking in the commodity information verification database by combining the commodity information link address and the verification information. According to the convention of code generation, a < commodity information link address, authentication information > can have and uniquely determine a commodity information item. If the corresponding commodity information is not found, the user can be directly reminded that the commodity is a counterfeit. If the corresponding commodity information can be found, recording the user checking behaviors including checking time, checking place, checking account number and other information, updating the verification application times, and feeding back the checked historical information to the user. If the consumer finds unreasonable inspection history, the risk of counterfeit products exists, and the consumer can report the counterfeit products. If a large number of different checking times and checking places exist in a certain information checking, a wind control system of the verification center can be triggered, the record is placed in an abnormal list, and manual checking is prompted.
And 4.3, after the commodity information is checked, searching the corresponding reserved visual code in the commodity information verification database, feeding back to the user, and comparing the fed-back reserved visual code information with the reserved visual code on the two-dimensional code visual background image by the user to perform visual verification. And if the visual verification is consistent, the requirement of the genuine product is met. Otherwise, the counterfeit risk is considered to exist.
The reserved visual code fed back to the user may be the image or text generated in step 1.3, or the image generated by rendering in step 2.4, and the user can be visually recognized by human eyes. When the reserved visual code is a letter or number sequence, the reserved visual code can be directly fed back to the user. When the reserved visual code is visual contents such as texture patterns and the like, the image contents are still difficult to accurately read by the prior art, so the invention can additionally add visual verification contents to commodity verification information. The visual verification content is mainly an image rendered by the reserved visual code, and when the user performs visual verification, the visual verification content can be compared with the image on the two-dimensional code. For example, the visual code added to the background image is "XTX 349", and the visual verification contents are "images of XTX349 in which the coding region is printed in a yellow font of T, 4, and 9".

Claims (8)

1. A novel QR code embedded two-dimensional code coding and anti-counterfeiting application method is characterized by comprising the following steps:
step 1, automatically generating a commodity information item and commodity verification information for each commodity to be coded at a verification center of a server end; the commodity verification information is expressed as a triple < the commodity information link address, the verification information and the reserved visual code >, and is stored in a commodity information verification database of a verification center; the commodity information link address and the verification information are uniquely positioned to a commodity information item, and a visual code is reserved as a pattern or a character which can be recognized by human eyes; each commodity verification information in the commodity information verification database is provided with an attribute item, wherein the attribute item comprises verification application times, a verification state and a verification IP address;
step 2, generating a two-dimensional code of the commodity according to the commodity verification information code by an encoder at the server end; the two-dimensional code is divided into a QR code area and an autonomous coding area; coding the commodity information link address according to a QR code coding standard, and filling the QR code area with the commodity information link address; encrypting the verification information by using a public key, and filling the encrypted information into an autonomous coding area; embedding and aligning the QR code area and the autonomous coding area to obtain an anti-counterfeiting two-dimensional code; reserving a visual coding region in the QR code region, arranging a reserved visual coding rendering generated image according to the position of the reserved visual coding region, fusing the image with a specified image to form a visual background image, and fusing the anti-counterfeiting two-dimensional code and the visual background image to generate a final visual anti-counterfeiting two-dimensional code of the commodity;
step 3, loading an identification program of the visual anti-counterfeiting two-dimensional code at the user side, and scanning and identifying the visual anti-counterfeiting two-dimensional code; when a user scans the visual anti-counterfeiting two-dimensional code attached to the commodity through the QR code scanner, a commodity information link address is obtained, the visual anti-counterfeiting two-dimensional code identification program is skipped to, and the visual anti-counterfeiting two-dimensional code identification program identifies and acquires information of an autonomous coding area of the visual anti-counterfeiting two-dimensional code and sends the information to the server; a decoder of the server side restores the encrypted information according to the information of the autonomous coding area and sends the commodity information link address and the encrypted information to the verification center;
step 4, after receiving the commodity information link address and the encrypted information, the verification center of the server decrypts the encrypted information by using a private key to obtain verification information; the verification center searches corresponding commodity information items according to the commodity information link address and the verification information, if the corresponding commodity information items are not found, the commodity is fed back to the user as a counterfeit product, and if the corresponding commodity information items are found, the checking records of the commodity information items are fed back to the user; and the verification center feeds the reserved visual code back to the user after passing the verification, and the reserved visual code is used for comparing with the visual code reserved on the visual anti-counterfeiting two-dimensional code on the commodity.
2. The method according to claim 1, wherein in step 1, the "commodity information link address" is composed of a "link address prefix" and a "link address parameter", and the "link address prefixes" of the same commodities are the same; the 'link address parameter' and the 'verification information' are randomly and automatically generated; the "reserved visual code" is randomly generated or randomly selected from a pre-established library of materials.
3. The method according to claim 1 or 2, wherein in the step 1, the "authentication information" is used as a unique number of the commodity; alternatively, the "authentication information" is combined with the "link address parameter" in the "commodity information link address" as a unique number of the commodity.
4. The method according to claim 1, wherein in step 2, the encoder automatically applies for the commodity verification information to the verification center in a user role, different encoders are provided with separate account numbers and passwords, and only after the commodity verification information is authenticated by the user, the commodity verification information is obtained and encrypted communication is performed in the network transmission process; a public key for encrypting the "authentication information" is generated by the authentication center and distributed to the respective encoders.
5. The method according to claim 1, wherein in the step 2, the reserved visual code is rendered to generate an image, including performing morphological change and color change on the image or text; and after the visual background image is obtained, fusing the anti-counterfeiting two-dimensional code and the visual background image by using an artistic two-dimensional code generation technology.
6. The method according to claim 1, wherein in the step 2, the QR code area is located at the center of the anti-counterfeiting two-dimensional code, the autonomous coding areas are distributed around the QR code area, and the QR code area and the autonomous coding areas are arranged according to the set size and position and do not overlap with each other.
7. The method according to claim 1, wherein in step 3, a custom code scanner is used in the visual anti-counterfeiting two-dimensional code recognition program, when the program is triggered, the custom code scanner is started to detect a locator of the visual anti-counterfeiting two-dimensional code, after the locator is determined, the size and grid distribution of modules of the QR two-dimensional code are determined according to the version number of the QR code, an autonomous coding area of the visual anti-counterfeiting two-dimensional code is further determined, 0 or 1 represented by each module in the autonomous coding area is obtained by sampling the autonomous coding area, and a byte stream of 0 and 1 is restored at the server end according to the code arrangement mode of the autonomous coding area.
8. The method according to claim 1 or 4, wherein the public key and the private key are a pair of keys generated according to an asymmetric encryption algorithm, the private key is retained in the verification center, and the verification information encrypted by the public key can only be decrypted by the private key.
CN202010455714.7A 2020-05-21 2020-05-26 Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code Active CN111639734B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2020104371557 2020-05-21
CN202010437155 2020-05-21

Publications (2)

Publication Number Publication Date
CN111639734A true CN111639734A (en) 2020-09-08
CN111639734B CN111639734B (en) 2023-05-16

Family

ID=72332743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010455714.7A Active CN111639734B (en) 2020-05-21 2020-05-26 Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code

Country Status (1)

Country Link
CN (1) CN111639734B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134687A (en) * 2020-09-15 2020-12-25 武汉工程大学 Information encryption and decryption method based on two-dimensional code
CN113487001A (en) * 2021-09-08 2021-10-08 飞狐信息技术(天津)有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN113743555A (en) * 2020-09-29 2021-12-03 四川谦泰仁投资管理有限公司 Composite two-dimensional code system with calibration function
CN113971452A (en) * 2020-09-18 2022-01-25 谷歌有限责任公司 Platform for registering and processing visual codes
CN113988242A (en) * 2021-10-19 2022-01-28 艾斯芸防伪科技(福建)有限公司 Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
CN114745357A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 Method and device for acquiring external link address
CN116306754A (en) * 2023-05-18 2023-06-23 浙江美丽健乳业有限公司 Two-dimensional code generation method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103325042A (en) * 2013-05-17 2013-09-25 包晗 Tracing anti-fake market interaction integration system and method
JP3188981U (en) * 2013-09-11 2014-02-20 洛甫 林 Electronic verification anti-counterfeit label
WO2015152697A1 (en) * 2014-04-04 2015-10-08 대한민국(관리부서:행정안전부 국립과학수사연구원장) Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification
CN105321078A (en) * 2014-07-02 2016-02-10 许丰 Anti-fake direct purchase system
CN105447546A (en) * 2015-11-25 2016-03-30 林蔚 Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor
CN106778995A (en) * 2016-11-25 2017-05-31 北京矩石科技有限公司 A kind of art up two-dimensional code generation method and device with image co-registration
WO2017116303A1 (en) * 2015-12-29 2017-07-06 Egide Pte Ltd Secure dual-mode anti-counterfeit product authentication methodology and system
CN107194449A (en) * 2017-06-19 2017-09-22 南京林业大学 The antiforge and information source tracing method combined based on digital watermarking and Quick Response Code
CN108764420A (en) * 2018-04-24 2018-11-06 中国人民银行印制科学技术研究所 A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods
CN109255634A (en) * 2018-09-07 2019-01-22 昆明盛策同辉数字科技有限责任公司 Merge method for anti-counterfeit, device, storage medium and the equipment of AR and two dimensional code
CN109754037A (en) * 2019-01-28 2019-05-14 成都宇飞信息工程有限责任公司 A kind of one yard of commodity counterfeit prevention of an object and traceability system based on digital watermarking two dimensional code

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103325042A (en) * 2013-05-17 2013-09-25 包晗 Tracing anti-fake market interaction integration system and method
JP3188981U (en) * 2013-09-11 2014-02-20 洛甫 林 Electronic verification anti-counterfeit label
WO2015152697A1 (en) * 2014-04-04 2015-10-08 대한민국(관리부서:행정안전부 국립과학수사연구원장) Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification
CN105321078A (en) * 2014-07-02 2016-02-10 许丰 Anti-fake direct purchase system
CN105447546A (en) * 2015-11-25 2016-03-30 林蔚 Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor
WO2017116303A1 (en) * 2015-12-29 2017-07-06 Egide Pte Ltd Secure dual-mode anti-counterfeit product authentication methodology and system
CN106778995A (en) * 2016-11-25 2017-05-31 北京矩石科技有限公司 A kind of art up two-dimensional code generation method and device with image co-registration
CN107194449A (en) * 2017-06-19 2017-09-22 南京林业大学 The antiforge and information source tracing method combined based on digital watermarking and Quick Response Code
CN108764420A (en) * 2018-04-24 2018-11-06 中国人民银行印制科学技术研究所 A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods
CN109255634A (en) * 2018-09-07 2019-01-22 昆明盛策同辉数字科技有限责任公司 Merge method for anti-counterfeit, device, storage medium and the equipment of AR and two dimensional code
CN109754037A (en) * 2019-01-28 2019-05-14 成都宇飞信息工程有限责任公司 A kind of one yard of commodity counterfeit prevention of an object and traceability system based on digital watermarking two dimensional code

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
杨艳丽;段寿建;: "Web开发中二维码的生成与应用", 计算机时代 *
郑敏姜;: "基于移动ADC平台的二维码产品防伪认证系统", 海峡科学 *
闫涛;游福成;刘福平;: "基于数字签名的QR码水印认证系统", 信息安全研究 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134687A (en) * 2020-09-15 2020-12-25 武汉工程大学 Information encryption and decryption method based on two-dimensional code
CN113971452A (en) * 2020-09-18 2022-01-25 谷歌有限责任公司 Platform for registering and processing visual codes
US11836553B2 (en) 2020-09-18 2023-12-05 Google Llc Platform for registering and processing visual encodings
US11977953B2 (en) 2020-09-18 2024-05-07 Google Llc Platform for registering and processing visual encodings
CN113743555A (en) * 2020-09-29 2021-12-03 四川谦泰仁投资管理有限公司 Composite two-dimensional code system with calibration function
CN113743555B (en) * 2020-09-29 2024-01-16 四川谦泰仁投资管理有限公司 Composite two-dimensional code system with calibration function
CN113487001A (en) * 2021-09-08 2021-10-08 飞狐信息技术(天津)有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN113487001B (en) * 2021-09-08 2021-12-24 飞狐信息技术(天津)有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN113988242A (en) * 2021-10-19 2022-01-28 艾斯芸防伪科技(福建)有限公司 Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
CN114745357A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 Method and device for acquiring external link address
CN116306754A (en) * 2023-05-18 2023-06-23 浙江美丽健乳业有限公司 Two-dimensional code generation method and device
CN116306754B (en) * 2023-05-18 2023-08-04 浙江美丽健乳业有限公司 Two-dimensional code generation method and device

Also Published As

Publication number Publication date
CN111639734B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN111639734B (en) Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code
US7992772B2 (en) Method and system for deterring product counterfeiting, diversion and piracy on a single system
US9076024B2 (en) Anti-counterfeiting system and method
US8615470B2 (en) Authentication and tracking system
CN108154208B (en) Article identification method, article identification method and article identification system based on two-dimensional code
US20030177095A1 (en) Remote authentication system
CN109190736B (en) Anti-counterfeiting two-dimensional code and generation method and generation application system thereof
CN105550891A (en) Product anti-fake source tracing method and system
JP2017174456A (en) Monitor for portable article
WO2019229554A1 (en) Authentication of packaged products
US9934457B2 (en) Method of securing a two-dimensional barcode
CN105678369A (en) Anti-counterfeiting-tag-based anti-counterfeiting method for commodity
CN112749982A (en) Anti-counterfeiting system and method based on two-dimensional code
JP2015106922A (en) Method of protecting authenticity of article against counterfeit or imitation
CN109831309A (en) A kind of safety code principle and method with multiple-authentication
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
US9477853B2 (en) Generating an incremental information object
CN1776721A (en) General anticounterfeiting method and system
CN109325568B (en) Anti-counterfeiting two-dimensional code and modulation encryption method and identification system thereof
US8857711B2 (en) Tracking customer loyalty information using an incremental information object
CN109272090B (en) Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof
CN109299770B (en) Anti-counterfeiting two-dimensional code and laser hologram encryption method and production application system thereof
CN114841713A (en) Product tracing anti-counterfeiting method and system
CN111598591A (en) Product anti-counterfeiting method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant