CN112749982A - Anti-counterfeiting system and method based on two-dimensional code - Google Patents
Anti-counterfeiting system and method based on two-dimensional code Download PDFInfo
- Publication number
- CN112749982A CN112749982A CN202110242801.9A CN202110242801A CN112749982A CN 112749982 A CN112749982 A CN 112749982A CN 202110242801 A CN202110242801 A CN 202110242801A CN 112749982 A CN112749982 A CN 112749982A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- pattern
- color
- code segment
- segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000013507 mapping Methods 0.000 claims abstract description 115
- 230000001788 irregular Effects 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims description 61
- 238000009826 distribution Methods 0.000 claims description 38
- 238000006243 chemical reaction Methods 0.000 claims description 13
- 238000005215 recombination Methods 0.000 claims description 10
- 230000006798 recombination Effects 0.000 claims description 10
- 239000003086 colorant Substances 0.000 claims description 7
- 230000000739 chaotic effect Effects 0.000 description 27
- 238000005516 engineering process Methods 0.000 description 14
- 238000004364 calculation method Methods 0.000 description 6
- 238000012937 correction Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 108091026890 Coding region Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000005693 optoelectronics Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
- G06K7/10861—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Finance (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention relates to an anti-counterfeiting system and method based on a two-dimensional code, wherein the two-dimensional code is divided into at least two-dimensional code segments, and the two-dimensional code segments are distributed in a symbolic pattern in order; the two-dimensional code segment can be split into a two-dimensional code segment in a regular area and a two-dimensional code segment in an irregular area, and the two-dimensional code segments can be distributed into parts of the irregular area of the irregular landmark pattern according to the positioning point mapping table. The invention combines the color two-dimensional codes into the marking pattern, so that the commodity is not influenced in appearance while the anti-counterfeiting information is set. The invention saves the occupied space of the two-dimension code on the commodity, eliminates the black and white two-dimension code and is more beautiful and practical.
Description
The invention discloses a divisional application of an anti-counterfeiting system and a method, wherein the application number is 201611093103.2, the application date is 2016, 12 and 01, and the application type is the invention and is realized by combining a two-dimensional code scanning technology.
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting system and method based on two-dimensional codes.
Background
At present, many illegal persons are engaged in the counterfeit behavior of the known commodities in the society, and in order to enable consumers to conveniently identify the authenticity of the commodities, known manufacturers often adopt the forms of printing or pasting anti-counterfeiting code labels on the commodities and the like, and users can make anti-counterfeiting calls of manufacturers to inquire the authenticity. A plurality of enterprises print two-dimensional codes on own products or product packaging boxes, consumers can utilize the two-dimensional code scanning terminal to scan the two-dimensional codes on commodities after purchasing the products, and then the authenticity of the purchased products is verified through mobile phone short messages or the Internet according to the scanned two-dimensional code information.
The anti-counterfeiting method realized by combining the two-dimensional code scanning technology in the current market has the following defects: in the anti-counterfeiting method realized by combining the two-dimensional code scanning technology, the two-dimensional code printed on a commodity can be repeatedly inquired for an unlimited number of times, in order to avoid a counterfeiter from printing the same two-dimensional code on a counterfeit commodity, the conventional two-dimensional code label is made of special materials or processes such as anti-counterfeiting ink, fragile paper and the like, so that the anti-counterfeiting cost realized by combining the two-dimensional code scanning technology is increased, the product can be prevented from being circulated again on the market after the authenticity is verified, and although the counterfeiting cost of the counterfeiter is increased by the technology, the possibility of counterfeiting still exists. Therefore, the anti-counterfeiting effect of the anti-counterfeiting method realized by combining the two-dimensional code scanning technology in the prior art needs to be improved.
Chinese patent (CN 103530781A) discloses a commodity anti-counterfeiting method based on two-dimensional codes, relates to the technical field of anti-counterfeiting, and solves the technical problem of improving the anti-counterfeiting effect. Printing a unique two-dimensional code on each commodity, and storing the two-dimensional code of each commodity in an anti-counterfeiting database of a verification server; the commodity purchaser scans the two-dimensional code on the commodity by using the terminal and sends the two-dimensional code to the verification server to verify the authenticity of the commodity, a verification time threshold value is set for each two-dimensional code in an anti-counterfeiting database of the verification server, the verification server subtracts 1 from the verification time threshold value of the two-dimensional code of the commodity every time the two-dimensional code of the commodity is verified successfully, verification success information is returned to a user, and the two-dimensional code of the commodity is invalid after the verification success time of the two-dimensional code of the commodity exceeds the initial value of the verification time threshold value. However, the two-dimensional code generation method of the patent is simple and is easy to be forged by lawless persons through technical means. The verification of the two-dimensional code cannot be traced. Moreover, the traceability information of products in the current market is mainly displayed to the user terminal in a text or picture form, the traceability form is single, the information amount is small, the consumer is not facilitated to comprehensively know all links of the products, and the traceability experience of the consumer on the products is poor. Moreover, the text or picture information is easy to be tampered and forged, so that consumers cannot obtain real and accurate traceability information about purchased products, and the purpose of obtaining the traceability information of the products and performing anti-counterfeiting query on the products cannot be achieved.
A two-dimensional CODE (QR CODE) is a matrix-type two-dimensional CODE that is encoded in a rectangular space by different distributions of black and white pixels in the matrix. On the corresponding element positions of the matrix, binary '1' is represented by the appearance of points (square points, round points or other shapes), binary '0' is represented by the absence of the points, and the significance represented by the matrix type two-dimensional bar code is determined by the arrangement and combination of the points. According to the ISO/IEC 18004 standard, the structure of a QR CODE includes functional patterns (function patterns): regions that do not participate in encoding data. Mute zone (mute zone): the color of the area which is specified in the standard QR code (Ver1-40) and is 4 units wide at the periphery and 2 units wide at the periphery of the miniature QR code is equivalent to a white point (lighting module) in the QR code, and patterns or marks cannot be arranged in the area to ensure that the QR code is clearly recognizable. Locator pattern (finder pattern): the square marks are positioned at the upper left corner, the upper right corner and the lower left corner of the QR code and are used for assisting scanning software to position the QR code and transform a coordinate system. Separator (separator): a single bit wide white point band is placed between each location indicator and the code region to distinguish between them. Timing pattern (timing pattern): a single bit wide band of alternating black and white dots, starting and ending in black, for indicating the mark density and determining the coordinate system. Correction flag (alignpattern): only the QR codes of Version 2 and above have the correction marks. The calibration flag is used to calibrate the coordinate system further. The number of correction marks depends on the version. Coding region (encoding region): a region of encoded data. Format information (format information): the fault tolerance level and data mask are stored, along with an additional own BCH fault tolerance code. Version information (version information): version information is stored. Data and error correction codes (data and error correction codes): the coding mode, the actually coded data and the RS error-tolerant code of the data are stored.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an anti-counterfeiting method realized by combining a two-dimensional code scanning technology, which is characterized by comprising the following steps:
splitting a two-dimensional code into at least two-dimensional code segments and orderly distributing the two-dimensional code segments in a symbolic pattern;
converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
scanning at least one colored two-dimensional code segment in the landmark pattern and forming a recombined two-dimensional code;
and verifying the recombined two-dimensional code.
According to a preferred embodiment, the two-dimensional code segments are distributed in the symbolic pattern in order based on a mapping table of the position points of the symbolic pattern and the positioning points of the two-dimensional code, wherein,
and forming second characters combined into an encrypted two-dimensional code segment with an irregular shape by a first character corresponding to a first positioning point in the two-dimensional code segment through a chaotic encryption algorithm, wherein the encrypted two-dimensional code segment is orderly distributed in the symbolic pattern based on a positioning point mapping table between a second positioning point corresponding to the second character and the position point of the symbolic pattern.
According to a preferred embodiment, the two-dimensional code segments are distributed in the invisible watermark pattern matched with the symbolic pattern in order based on the positioning point mapping table in which the position points of the symbolic pattern and the positioning points of the two-dimensional code have a mapping relation.
According to a preferred embodiment, the symbolic pattern is provided with a position blind spot which has no mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
According to a preferred embodiment, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
According to a preferred embodiment, the color of the color two-dimensional code segment is formed by presetting based on the color of the corresponding position of the landmark pattern, and the color of the color two-dimensional code segment and the corresponding two-dimensional code segment are converted based on a color mapping list.
According to a preferred embodiment, the verifying the recombined two-dimensional code includes:
and performing initial verification in a mode of matching the recombined two-dimensional code with the original two-dimensional code, and performing operation verification on the public key signature of the original two-dimensional code subjected to the initial verification.
An anti-counterfeiting system realized by combining a two-dimension code scanning technology is characterized by comprising a two-dimension code generating module, a distribution module, a conversion module, a recombination module, a verification module, a cloud server and a mobile terminal,
the two-dimensional code generation module generates an original two-dimensional code and stores the original two-dimensional code in the cloud server,
the distribution module splits the two-dimensional code into at least one two-dimensional code segment and distributes the two-dimensional code segment in the symbolic pattern in order;
the conversion module converts at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
the mobile terminal scans at least one color two-dimensional code segment in the symbolic pattern and sends the color two-dimensional code segment to the recombination module to form a recombined two-dimensional code;
the verification module verifies the recombined two-dimensional code based on the storage information of the cloud server.
According to a preferred embodiment, the distribution module distributes the two-dimensional code segments in an ordered manner in the landmark pattern based on a mapping table of the location points of the landmark pattern and the location points of the two-dimensional code, wherein,
the distribution module forms second characters combined into an encrypted two-dimensional code segment with an irregular shape by a chaos encryption algorithm on first characters corresponding to first positioning points in the two-dimensional code segment, and distributes the encrypted two-dimensional code segment in the symbolic pattern in order based on a positioning point mapping table between second positioning points corresponding to the second characters and position points of the symbolic pattern.
According to a preferred embodiment, the distribution module distributes the two-dimensional code segments in order in the invisible watermark pattern matched with the landmark pattern based on the positioning point mapping table in which the mapping relationship exists between the position points of the landmark pattern and the positioning points of the two-dimensional code.
The invention has the beneficial technical effects that:
the invention splits and combines the traditional two-dimensional code into the symbolic pattern, so that the symbolic pattern has the double functions of anti-counterfeiting and identification. The attractive marking pattern saves the occupied space of the traditional two-dimensional code on the commodity package, eliminates the non-uniformity of the black-white two-dimensional code and the commodity package, and ensures that the commodity package is attractive and has an anti-counterfeiting effect.
Drawings
FIG. 1 is a logic diagram of an anti-counterfeiting method implemented by combining two-dimensional code scanning technology according to the present invention;
FIG. 2 is a schematic block diagram of an anti-counterfeiting system implemented in combination with two-dimensional code scanning technology according to the present invention;
FIG. 3 is a logic diagram of a two-dimensional code split and distributed in a symbolic pattern; and
fig. 4 is a logic diagram of a chaotic encryption system.
List of reference numerals
10: the two-dimensional code generation module 20: the distribution module 30: conversion module
40: the restructuring module 50: the moving end 60: verification module
70: the cloud server 21: first two-dimensional code segment 22: second two-dimensional code segment
23: third two-dimensional code segment 24: fourth two-dimensional code segment 25: fifth two-dimensional code segment
26: sixth two-dimensional code segment 27: seventh two-dimensional code segment 28: eighth two-dimensional code segment
29: ninth two-dimensional code segment 80: position blind spot
Detailed Description
The following detailed description is made with reference to the accompanying drawings.
The invention provides an anti-counterfeiting method realized by combining a two-dimensional code scanning technology, which comprises the following steps: splitting a two-dimensional code into at least one two-dimensional code segment and orderly distributing the two-dimensional code segment in a symbolic pattern; converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern; scanning at least one colored two-dimensional code segment in the landmark pattern and forming a recombined two-dimensional code; and verifying the recombined two-dimensional code.
The two-dimensional code is a two-dimensional bar code which records data symbol information by black and white figures distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure. The two-dimensional code uses a plurality of geometric shapes corresponding to the binary system to represent literal numerical information, and the literal numerical information is automatically read through an image input device or an optoelectronic scanning device so as to realize automatic information processing. The two-dimensional code comprises a stacked/row-type two-dimensional bar code and a matrix-type two-dimensional bar code. The two-dimensional code segment of the present invention is a part of a two-dimensional code.
The color two-dimensional code not only has all functions of a common black and white two-dimensional code, but also can present a color appearance. The color two-dimensional code segment of the invention is a color two-dimensional code segment with color appearance converted by a black and white two-dimensional code segment.
The marking pattern of the present invention is a mark which is used by a producer or an operator of a product on the product produced, manufactured, processed, sorted or distributed by the producer or the operator or on the service provided by the provider, is used for distinguishing the source of the product or the service, and has a remarkable characteristic by characters, figures, letters, numbers, three-dimensional marks, sound, color combinations, or combinations of the above elements. The marking pattern includes a trademark, a general pattern that a consumer can use to distinguish a product, or a pattern containing a product name.
Example 1
As shown in fig. 1, an anti-counterfeiting method implemented by combining a two-dimensional code scanning technology includes the steps of:
s1: splitting the two-dimensional code into at least one two-dimensional code segment and orderly distributing the two-dimensional code segment in the symbolic pattern;
s2: converting at least one two-dimensional code segment into a color two-dimensional code segment with the color consistent with the corresponding position of the landmark pattern;
s3: scanning at least one color two-dimensional code segment in the marking pattern and forming a recombined two-dimensional code;
s4: and verifying the recombined two-dimensional code.
This embodiment describes the above steps in detail.
S1: the two-dimensional code is split into at least two-dimensional code segments, and the two-dimensional code segments are distributed in the symbolic pattern in order.
The two-dimensional code generation module generates a unique black-and-white two-dimensional code for each product. Each code system has its specific character set, and each character occupies a certain width and has a certain checking function. The black and white two-dimensional code contains product information, service information and/or authentication information.
The two-dimensional code comprises a plurality of positioning points, and each positioning point corresponds to one two-dimensional code character. The landmark pattern is divided into a number of cells, each cell being a location point. Each position point corresponds to a positioning point, namely each position point corresponds to a two-dimensional code character. And establishing a positioning point mapping table based on the mapping relation between the position points of the symbolic pattern and the positioning points of the two-dimensional code.
Preferably, the two-dimensional code segment is distributed in the landmark pattern in order based on a mapping relation between the position point of the landmark pattern and the positioning point of the two-dimensional code.
And splitting the two-dimensional code into at least two parts, wherein each part is a two-dimensional code segment. And according to the mapping relation of the positioning point mapping table, each two-dimensional code segment corresponds to one part of the symbolic pattern. Therefore, the two-dimensional code segments are orderly distributed at corresponding positions in the symbolic pattern based on the positioning point mapping table.
As shown in fig. 3, the two-dimensional code is split into nine parts of two-dimensional code fragments: the first two-dimensional code segment 21, the second two-dimensional code segment 22, the third two-dimensional code segment 23, the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25, the sixth two-dimensional code segment 26, the seventh two-dimensional code segment 27, the eighth two-dimensional code segment 28, and the ninth two-dimensional code segment 29. The identifying pattern on the product package is the letter "Hi". The position points of the nine parts in the symbolic pattern correspond to the positioning points of the two-dimensional code one by one, a mapping relation exists, and a positioning point mapping table is established. And sequentially distributing the nine parts of two-dimensional chips at corresponding positions of the landmark pattern 'Hi' according to the mapping relation in the positioning point mapping table. The first two-dimensional code segment 21, the second two-dimensional code segment 22 and the third two-dimensional code segment 23 are distributed in the left vertical part of the letter "H", and the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25 and the sixth two-dimensional code segment 26 are distributed in the right vertical part of the letter "H". The seventh two-dimensional code segment 27 is distributed at the dot portion of the letter "i". The eighth two-dimensional code segment 28 and the ninth two-dimensional code segment 29 are distributed in the vertical portion of the letter "i". The two-dimensional code segment in the symbolic pattern and other parts in the symbolic pattern are combined together to form the symbolic pattern.
Preferably, the two-dimensional code segment can be split into a two-dimensional code segment in a regular area and a two-dimensional code segment in an irregular area. The two-dimensional code segments can be distributed as parts of irregular areas of the irregular landmark pattern according to the anchor point mapping table.
Preferably, the two-dimensional code segments are distributed in the invisible watermark pattern matched with the symbolic pattern in order based on the positioning point mapping table in which the mapping relation exists between the position points of the symbolic pattern and the positioning points of the two-dimensional code.
The surface of the symbolic pattern is provided with a invisible watermark. The two-dimensional code segments are distributed on the invisible watermarks on the surfaces of the corresponding distribution positions of the symbolic patterns on the basis of the positioning point mapping tables. The invisible watermark can be identified by scanning equipment at a mobile terminal and can not be identified by human eyes. The consumer can only see the logo but not the two-dimensional code segment.
Preferably, the two-dimensional code segment is orderly distributed in the symbolic pattern based on a locating point mapping table in which the mapping relation exists between the position point of the symbolic pattern and the locating point of the two-dimensional code, wherein a first character in the two-dimensional code segment corresponding to a first locating point forms a second character combined into an encrypted two-dimensional code segment with an irregular shape through a chaotic encryption algorithm, and the encrypted two-dimensional code segment is orderly distributed in the symbolic pattern based on the locating point mapping table between the second locating point corresponding to the second character and the position point of the symbolic pattern.
And forming an encrypted second character by the first character corresponding to the first fixed point in the two-dimensional code segment through a chaotic encryption algorithm. And the encrypted two-dimensional code segment formed by recombining the second characters generated by the chaotic encryption algorithm is an irregular-shaped encrypted two-dimensional code segment. An anchor point mapping table exists between a second anchor point corresponding to the second character and the position point of the landmark pattern. And the second characters in the encrypted two-dimensional code segments are converted and distributed on the position points of the corresponding symbolic patterns according to the mapping relation of the positioning point mapping table.
Preferably, the surface of the symbolic pattern is provided with a visible watermark two-dimensional code segment. The visible two-dimensional code segment is matched with the bottom pattern of the marking pattern to form the beautiful marking pattern.
Preferably, the symbolic pattern is provided with a position blind spot which does not have a mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
As shown in fig. 3, the landmark pattern includes blind spots 80. The position blind spot 80 may be a single cell, or may be a blind spot composed of several cells. The position blind spot 80 has no mapping relation with the two-dimensional code positioning point. Scanning the landmark pattern with the location blind spot 80 does not affect the identification of the duplicate two-dimensional code. The pattern of the position blind spots 80 is displayed as a symbolic pattern in combination with the pattern of the colored two-dimensional code segments.
S2: and converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the landmark pattern.
Preferably, the color of the color two-dimensional code segment is preset based on the color of the corresponding position of the landmark pattern, and the color of the color two-dimensional code segment and the color of the corresponding two-dimensional code segment are converted based on the color mapping list.
A color mapping list is established between the position points and the colors of the symbolic patterns. The color corresponding to the position point of the landmark pattern is preset in the color mapping list. And converting the two-dimensional code segments at the corresponding positions in the symbolic patterns according to the colors mapped by the color mapping list, so that the two-dimensional code segments form color two-dimensional code segments. The color of the colored two-dimensional code segment is consistent with the color of the symbolic pattern so as not to influence the identification of the product symbolic pattern by the consumer.
S3: at least one colored two-dimensional code segment in the landmark pattern is scanned and a recombined two-dimensional code is formed.
Preferably, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
The mobile terminal is provided with corresponding color two-dimensional code scanning equipment. The color two-dimensional code scanning equipment scans the marking pattern and identifies the color two-dimensional code segments in the marking pattern. And obtaining black and white distribution position points of the two-dimensional code segments at corresponding positions according to a color mapping list in which the color two-dimensional code and the position points have a mapping relation. And identifying the coordinates of black-and-white distribution position points of the two-dimensional code segments, and performing calculation conversion on the coordinates of the black-and-white distribution position points and the two-dimensional code positioning points according to a positioning point mapping table to enable the two-dimensional code segments to form a complete two-dimensional code on the same two-dimensional code positioning point coordinate, and finally obtaining a black-and-white recombined two-dimensional code formed by recombining at least one two-dimensional code segment.
S4: and verifying the recombined two-dimensional code.
Preferably, the method for verifying the recombined two-dimensional code includes: and performing initial verification in a mode of matching the recombined two-dimension code with the original two-dimension code, and performing operation verification on the original two-dimension code subjected to the initial verification.
And performing initial verification in a mode of matching the recombined two-dimensional code with the original two-dimensional code. Specifically, the original two-dimensional code is stored in a cloud server. And matching the recombined two-dimension code with the original two-dimension code, and if the recombined two-dimension code is matched with the original two-dimension code in a consistent manner, the recombined two-dimension code passes the initial verification. And if the recombined two-dimension code is not consistent with the original two-dimension code in matching, the recombined two-dimension code fails to be verified.
And after the initial verification of the recombined two-dimensional code is successful, converting the recombined two-dimensional code into anti-counterfeiting information capable of being verified by operation, transmitting the anti-counterfeiting information to the cloud server for anti-counterfeiting verification, and verifying whether the anti-counterfeiting information is generated by specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
Public key infrastructure algorithms allow software to create encrypted or decrypted data in the form of "key pairs". The signature and verify signature functions are also part of the program. Each "Key pair" contains a Public Key (Public Key) and a Private Key (Private Key). The "key pair" will be used for encryption, decryption, signing and verifying the signature. As the name implies, the private key is naturally to be protected, while the public key is to be disclosed.
For example, the manufacturer performs a data calculation process on a unique non-repeating string number of the product. The data calculation processing method comprises a hash algorithm. And then, encrypting a result obtained after data calculation processing by using a private key of a manufacturer to be used as a signature, combining the signature with the serial number of the product to generate two-dimensional code information, and finally publishing the two-dimensional code information. For example printed on the packaging of the product. The public consumers use the application tool to scan the marking pattern to obtain the recombined two-dimensional code. Scanning, converting and splitting the recombined two-dimensional code, acquiring a public key from a website of a manufacturer in an application tool, decrypting the signature information by using a public key cryptographic function, and if the decryption is successful and the decrypted hash value is indeed consistent with the hash result of the product serial number contained in the original two-dimensional code, proving two points: this product logo is indeed issued by the manufacturer and the content is complete.
And after the anti-counterfeiting verification is successful, judging the number of times that the product identification information is inquired according to the product identification inquiry information record contained in the recombined two-dimensional code. And if the product identification information is the first query, feeding back the product identification information and/or the authenticity of the product identification information to the mobile terminal, and identifying the product identification information as the first query. And if the product identification information is not the first query, feeding back the product identification information and/or the authenticity of the product identification information to the mobile terminal, and identifying the product identification information as the non-first query. Preferably, if the product identification information is not the first query, the product identification information, the authenticity of the product information and the number information of the identification queries are fed back to the mobile terminal.
Preferably, the mapping relationship between the positioning points of the two-dimensional code and the position points of the identification pattern includes a mapping encryption algorithm. The positioning points of the two-dimensional code and the position points of the symbolic pattern are not in a simple mapping relation, and the positioning points of the two-dimensional code correspond to all the position points in the symbolic pattern after being encrypted and calculated. For example, the locating point information of the two-dimensional code is encrypted by using an information encryption algorithm of chaotic mapping, and a mapping relation is established between the encrypted locating point and the position point of the symbolic pattern. The information encryption algorithm of the chaotic mapping comprises Logistic mapping, Cubic mapping and Arnold Cat mapping.
The chaotic encryption system is shown in fig. 4. The chaotic encryption system comprises chaotic cascade subsystems a and b, Arnold Cat mapping and encryption functionsAnd (4) forming. The chaotic cascade subsystems a and b are formed by two-stage discrete chaotic mapping connection: the first stage and the second stage of the chaotic cascade subsystem a are a Logistic mapping and a Cubic mapping in sequenceShooting; the first stage and the second stage of the chaotic cascade subsystem b are Cubic mapping and Logistic mapping in sequence. When the ith plaintext mi is encrypted, iteration eta of the chaotic cascade subsystems a and b is respectively carried outiSub sum of betaiThen, ui and wi are outputted. ui, wi and plaintext mi are encrypted functionsAfter processing, ciphertext ei is generated. And simultaneously, changing the initial value of the next iterative operation of the mapping of the Arnold Cat by using the value of ei. After a plurality of iterations are carried out, the iteration times of the next round of the chaotic cascade subsystems a and b are correspondingly changed according to the obtained results, and preparation is made for encrypting the (i + 1) th plaintext mi + 1.
The initial value and the initial iteration number of each chaotic map in the encryption system are both related to the secret key. The secret key K is divided into K1、K2And K3Three parts, in which the real number K1,K2∈[3⊕2,4],K3Is a character string (K) composed of n (n ≧ 16) characters3=k1k2…kn)。
Setting the Cubic mapping parameter r in the chaotic cascade subsystems a and b as K respectively1、K2. The sum of initial values and initial iteration times of the rest chaotic maps are determined according to K3And (4) determining.
The encryption function f (u, w, m) — (1000ui +1000wi + m) mod 256.
And after scanning the color two-dimensional code segment, the scanning equipment of the mobile terminal determines an encrypted two-dimensional code picture according to the positioning point mapping table. And restoring the encrypted two-dimensional code picture after two-dimensional chaotic decryption to obtain the two-dimensional code. And verifying the two-dimension code and the initial two-dimension code to determine the authenticity of the product. Because the secret key is only owned by the verification system of the manufacturer, the common merchant does not have the secret key, so that the encrypted two-dimensional code cannot be decrypted, and further the product and the product information cannot be forged.
Example 2
This embodiment is a further improvement of embodiment 1, and the repeated parts with embodiment 1 are not described again.
As shown in fig. 2, the embodiment provides an anti-counterfeiting system implemented by combining a two-dimensional code scanning technology, and the anti-counterfeiting system includes a two-dimensional code generating module 10, a distribution module 20, a conversion module 30, a restructuring module 40, a verification module 60, a cloud server 70, and a mobile terminal 50.
The two-dimensional code generation module 10 is used for generating a unique black and white two-dimensional code related to product information.
The distribution module 20 is configured to split the two-dimensional code into at least two-dimensional code segments and distribute the two-dimensional code segments in at least two positions of the landmark pattern according to the positioning point mapping table. The method for splitting the two-dimensional code fragments can be regular splitting or irregular splitting.
The conversion module 30 is configured to convert the two-dimensional code segment into a color two-dimensional code segment whose color matches the color of the landmark pattern according to the color mapping list.
The restructuring module 40 is configured to convert the scanned color two-dimensional code segments into black and white two-dimensional code segments according to the color mapping list, and restructure the two-dimensional code segments into a complete restructured two-dimensional code according to the positioning point mapping table.
The verification module 60 is used for verifying the recombined two-dimensional code, so as to verify the authenticity of the product.
The cloud server 70 is configured to store product information, original two-dimensional code information, and anti-counterfeiting verification information related to the two-dimensional code, or perform anti-counterfeiting verification on the combined two-dimensional code.
The movable end 50 is used for scanning the color two-dimensional code segment arranged in the symbolic pattern.
Specifically, the two-dimensional code generation module 10 generates an original two-dimensional code and stores the original two-dimensional code in the cloud server 70. The distribution module 20 splits the two-dimensional code into at least one two-dimensional code segment and distributes the two-dimensional code segments in the landmark pattern in order. The conversion module 30 converts at least one of the two-dimensional code segments into a color two-dimensional code segment having a color that is consistent with a corresponding position color of the landmark pattern. The mobile terminal 50 scans at least one color two-dimensional code segment in the landmark pattern and sends the color two-dimensional code segment to the restructuring module 40 to form a restructured two-dimensional code. The verification module 60 verifies the duplicate two-dimensional code based on the stored information of the cloud server 70.
Preferably, the distribution module 20 distributes the two-dimensional code segments in the landmark pattern in order based on a mapping table of the location points of the landmark pattern and the location points of the two-dimensional code.
Preferably, the two-dimensional code segment is distributed in the landmark pattern in order based on a mapping relation between the position point of the landmark pattern and the positioning point of the two-dimensional code.
The distribution module 20 splits the two-dimensional code into at least two parts, each part being a two-dimensional code segment. The distribution module 20 stores a positioning point mapping table in which the mapping relationship between the position point of the landmark pattern and the positioning point of the two-dimensional code exists. The coordinates of a two-dimensional code positioning point correspond to the coordinates of a landmark pattern position point one by one. The distribution module 20 corresponds to a part of the landmark pattern according to the mapping relationship of the locating point mapping table. Therefore, the two-dimensional code segments are orderly distributed at corresponding positions in the symbolic pattern based on the positioning point mapping table.
As shown in fig. 3, the two-dimensional code is split into nine two-dimensional code segments by the distribution module 20: the first two-dimensional code segment 21, the second two-dimensional code segment 22, the third two-dimensional code segment 23, the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25, the sixth two-dimensional code segment 26, the seventh two-dimensional code segment 27, the eighth two-dimensional code segment 28, and the ninth two-dimensional code segment 29. The identifying pattern on the product package is the letter "Hi". The position points of the nine parts in the symbolic pattern correspond to the positioning points of the two-dimensional code one by one, a mapping relation exists, and a positioning point mapping table is established. The distribution module 20 distributes the nine parts of two-dimensional chips in order at the corresponding positions of the landmark pattern "Hi" according to the mapping relationship in the positioning point mapping table. The first two-dimensional code segment 21, the second two-dimensional code segment 22 and the third two-dimensional code segment 23 are distributed in the left vertical part of the letter "H", and the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25 and the sixth two-dimensional code segment 26 are distributed in the right vertical part of the letter "H". The seventh two-dimensional code segment 27 is distributed at the dot portion of the letter "i". The eighth two-dimensional code segment 28 and the ninth two-dimensional code segment 29 are distributed in the vertical portion of the letter "i". The two-dimensional code segment in the symbolic pattern and other parts in the symbolic pattern are combined together to form the symbolic pattern.
Preferably, the distribution module 20 may split the two-dimensional code segment into a two-dimensional code segment in a regular region and a two-dimensional code segment in an irregular region. The two-dimensional code segments can be distributed as parts of irregular areas of the irregular landmark pattern according to the anchor point mapping table.
Preferably, the distribution module 20 forms a second character combined into an encrypted two-dimensional code segment with an irregular shape by using a chaotic encryption algorithm for a first character corresponding to the first positioning point in the two-dimensional code segment, and distributes the encrypted two-dimensional code segment in the landmark pattern in order based on a positioning point mapping table between the second positioning point corresponding to the second character and a position point of the landmark pattern.
And forming an encrypted second character by the first character corresponding to the first fixed point in the two-dimensional code segment through a chaotic encryption algorithm. And the encrypted two-dimensional code segment formed by recombining the second characters generated by the chaotic encryption algorithm is an irregular-shaped encrypted two-dimensional code segment. An anchor point mapping table exists between a second anchor point corresponding to the second character and the position point of the landmark pattern. The distribution module 20 transforms the second characters in the encrypted two-dimensional code segment according to the mapping relationship of the positioning point mapping table and distributes the second characters on the corresponding position points of the landmark pattern.
Preferably, the distribution module 20 distributes the two-dimensional code segments in the invisible watermark pattern matched with the landmark pattern in order based on the positioning point mapping table in which the mapping relationship exists between the position point of the landmark pattern and the positioning point of the two-dimensional code.
The surface of the symbolic pattern is provided with a invisible watermark. The distribution module 20 distributes the two-dimensional code segments on the invisible watermarks on the distribution position surfaces of the landmark patterns based on the positioning point mapping table distribution module 20. Namely, the invisible watermark contains the two-dimensional code segment. The invisible watermark can be identified by scanning equipment at a mobile terminal and can not be identified by human eyes. The consumer can only see the logo but not the two-dimensional code segment.
Preferably, the distribution module 20 distributes the two-dimensional code segments on the visible watermark of the surface of the landmark pattern. The visible two-dimensional code segment is matched with the bottom pattern of the marking pattern to form the beautiful marking pattern.
Preferably, the symbolic pattern is provided with a position blind spot which does not have a mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
As shown in fig. 3, the landmark pattern includes blind spots 80. The position blind spot 80 may be a single cell, or may be a blind spot composed of several cells. The position blind spot 80 has no mapping relation with the two-dimensional code positioning point. Scanning the landmark pattern with the location blind spot 80 does not affect the identification of the duplicate two-dimensional code. The pattern of the position blind spots 80 is displayed as a symbolic pattern in combination with the pattern of the colored two-dimensional code segments.
Preferably, the conversion module 30 creates and stores a color mapping list in which the position points of the landmark patterns correspond to colors. The color of the color mapping list is preset based on the color of the corresponding position of the landmark pattern. The conversion module 30 converts the color of the two-dimensional code positioning point corresponding to the position point coordinates of the landmark pattern based on the color mapping list to form a color two-dimensional code segment. The color of the colored two-dimensional code segment is consistent with the color of the symbolic pattern so as not to influence the identification of the product symbolic pattern by the consumer.
Preferably, the restructuring module 40 restructures the color two-dimensional code scanned by the mobile terminal 50 into a restructured two-dimensional code. Namely, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
The mobile end 50 is provided with a corresponding color two-dimensional code scanning device. The mobile terminal 50 scans the landmark pattern and identifies the color two-dimensional code segment in the landmark pattern. The recombination module 40 obtains black and white distribution position points of the two-dimensional code segments at corresponding positions according to the color mapping list in which the color two-dimensional code and the position points have the mapping relationship. The restructuring module 40 identifies coordinates of black and white distribution position points of the two-dimensional code segment, and performs calculation conversion on the coordinates of the black and white distribution position points and the two-dimensional code positioning points according to the positioning point mapping table, so that the two-dimensional code segment forms a complete two-dimensional code on the same two-dimensional code positioning point coordinate, and finally, a black and white restructured two-dimensional code formed by at least one two-dimensional code segment through recombination is obtained.
Preferably, the way of verifying the recombined two-dimensional code by the verification module 60 includes: and performing initial verification in a mode of matching the recombined two-dimension code with the original two-dimension code, and performing operation verification on the original two-dimension code subjected to the initial verification.
The verification module 60 performs initial verification in a manner that matches the reconstituted two-dimensional code with the original two-dimensional code. Specifically, the two-dimensional code generation module 10 generates and stores the original two-dimensional code in the cloud server while generating the two-dimensional code. The verification module 60 matches the recombined two-dimensional code after recombination with the original two-dimensional code, and if the recombined two-dimensional code matches with the original two-dimensional code consistently, the recombined two-dimensional code passes the initial verification. And if the recombined two-dimension code is not consistent with the original two-dimension code in matching, the recombined two-dimension code fails to be verified.
After the initial verification of the recombined two-dimensional code is successful, the verification module 60 converts the recombined two-dimensional code into the anti-counterfeiting information which can be verified by operation, and transmits the anti-counterfeiting information to the cloud server 70 for anti-counterfeiting verification, so as to verify whether the anti-counterfeiting information is generated by the specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
After the anti-counterfeiting verification is successful, the cloud server 70 judges the number of times that the product identification information is queried according to the product identification query information record contained in the recombined two-dimensional code. If the product identification information is the first query, the cloud server 70 feeds back the product identification information and/or the authenticity thereof to the mobile terminal 50, and identifies the product identification information as the first query. If the product identification information is not the first query, the cloud server 70 feeds back the product identification information and/or the authenticity thereof to the mobile terminal 50, and identifies as a non-first query. Preferably, if the product identification information is not the first query, the cloud server 70 feeds back the product identification information, the authenticity of the product information, and the number information of the identification queries to the mobile terminal.
Preferably, the anti-counterfeiting system realized by combining the two-dimensional code scanning technology further comprises an encryption module and a decryption module. The encryption module encrypts the two-dimensional code generated by the two-dimensional code generation module 10 to form an encrypted two-dimensional code. The encrypted two-dimensional code is divided into at least two encrypted two-dimensional code segments by the distribution module 20 and distributed in the symbolic pattern in order.
The encryption method of the encryption module comprises a method for signing or encrypting the identification information by using a public key system algorithm and a method for carrying out chaotic mapping encryption on the two-dimensional code by using a chaotic encryption system.
Preferably, the mapping relationship between the positioning points of the two-dimensional code and the position points of the identification pattern includes a mapping encryption algorithm. The positioning points of the two-dimensional code and the position points of the symbolic pattern are not in a simple mapping relation, and the positioning points of the two-dimensional code correspond to all the position points in the symbolic pattern after being encrypted and calculated. For example, the encryption module encrypts the positioning point information of the two-dimensional code by using an information encryption algorithm of chaotic mapping, and establishes a mapping relation between the encrypted positioning point and the position point of the symbolic pattern. The information encryption algorithm of the chaotic mapping comprises Logistic mapping, Cubic mapping and Arnold Cat mapping.
The mobile end 50 is provided with a corresponding color two-dimensional code scanning device. The mobile terminal 50 scans the landmark pattern and identifies the color two-dimensional code segment in the landmark pattern. The recombination module 40 obtains black and white distribution position points of the encrypted two-dimensional code segment at the corresponding position according to the color mapping list in which the color two-dimensional code and the position points have the mapping relationship. The recombination module 40 identifies coordinates of black-and-white distribution position points of the encrypted two-dimensional code segments, and performs calculation conversion on the coordinates of the black-and-white distribution position points and the encrypted two-dimensional code positioning points according to the positioning point mapping table, so that the encrypted two-dimensional code segments form a complete encrypted two-dimensional code on the same two-dimensional code positioning point coordinates, and finally, a black-and-white recombined encrypted two-dimensional code formed by recombining at least one encrypted two-dimensional code segment is obtained.
The decryption module is provided in the verification module 60. The verification module 60 receives and decrypts the recombined encrypted two-dimensional code sent by the recombination module 40, and restores the recombined encrypted two-dimensional code to a recombined two-dimensional code. The verification module 60 performs initial verification in a manner that matches the reconstituted two-dimensional code with the original two-dimensional code. After the initial verification of the recombined two-dimensional code is successful, the verification module 60 converts the recombined two-dimensional code into the anti-counterfeiting information which can be verified by operation, and transmits the anti-counterfeiting information to the cloud server 70 for anti-counterfeiting verification, so as to verify whether the anti-counterfeiting information is generated by the specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
It should be noted that the above-mentioned embodiments are exemplary, and that those skilled in the art, having benefit of the present disclosure, may devise various arrangements that are within the scope of the present disclosure and that fall within the scope of the invention. It should be understood by those skilled in the art that the present specification and figures are illustrative only and are not limiting upon the claims. The scope of the invention is defined by the claims and their equivalents.
Claims (10)
1. An anti-counterfeiting method based on two-dimensional codes is characterized in that the two-dimensional codes are split into at least two-dimensional code segments, and the two-dimensional code segments are distributed in a symbolic pattern in order;
the two-dimensional code segment can be split into a two-dimensional code segment in a regular area and a two-dimensional code segment in an irregular area, and the two-dimensional code segments can be distributed into parts of the irregular area of the irregular landmark pattern according to the positioning point mapping table.
2. The two-dimensional code based anti-counterfeiting method according to claim 1, wherein at least one of the two-dimensional code segments is converted into a colored two-dimensional code segment having a color consistent with a corresponding position color of the symbolic pattern; scanning at least one colored two-dimensional code segment in the landmark pattern and forming a recombined two-dimensional code; and verifying the recombined two-dimensional code.
3. The anti-counterfeiting method based on the two-dimensional code as claimed in claim 1 or 2, wherein the two-dimensional code segments are distributed in the symbolic pattern in order based on a positioning point mapping table in which a mapping relationship exists between a position point of the symbolic pattern and a positioning point of the two-dimensional code.
4. The anti-counterfeiting method based on the two-dimensional code as claimed in claim 3, wherein the two-dimensional code segments are distributed in the invisible watermark pattern matched with the symbolic pattern in order based on a mapping table of the position points of the symbolic pattern and the positioning points of the two-dimensional code, which has a mapping relationship.
5. The anti-counterfeiting method based on the two-dimensional code according to claim 4, wherein the symbolic pattern is provided with position blind spots which do not have a mapping relation with positioning points of the two-dimensional code, and the position blind spots and the colored two-dimensional code segments are combined in corresponding colors to form the symbolic pattern.
6. The two-dimensional code based anti-counterfeiting method according to claim 5, wherein the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the colored two-dimensional code segment based on the positioning point mapping table.
7. The two-dimensional code based anti-counterfeiting method according to claim 6, wherein the color of the color two-dimensional code segment is formed by presetting based on the color of the corresponding position of the symbolic pattern, and the color of the color two-dimensional code segment and the corresponding two-dimensional code segment are converted based on a color mapping list.
8. The two-dimensional code-based anti-counterfeiting method according to claim 7, wherein the verification of the recombined two-dimensional code comprises:
and performing initial verification in a mode of matching the recombined two-dimensional code with the original two-dimensional code, and performing operation verification on the public key signature of the original two-dimensional code subjected to the initial verification.
9. An anti-counterfeiting system based on two-dimensional codes is characterized by at least comprising a distribution module, a conversion module, a recombination module, a verification module and a cloud server,
the distribution module splits the two-dimensional code into at least two-dimensional code segments and distributes the two-dimensional code segments in the symbolic pattern in order;
the conversion module converts at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
the mobile terminal scans at least one color two-dimensional code segment in the symbolic pattern and sends the color two-dimensional code segment to the recombination module to form a recombined two-dimensional code;
the verification module verifies the recombined two-dimensional code based on the storage information of the cloud server.
10. The two-dimensional code based anti-counterfeiting system according to claim 9, wherein the distribution module distributes the two-dimensional code segments in an orderly manner in the invisible watermark pattern matched with the symbolic pattern based on the positioning point mapping table in which the mapping relationship exists between the position points of the symbolic pattern and the positioning points of the two-dimensional code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110242801.9A CN112749982A (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method based on two-dimensional code |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611093103.2A CN106779739B (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology |
CN202110242801.9A CN112749982A (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method based on two-dimensional code |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611093103.2A Division CN106779739B (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112749982A true CN112749982A (en) | 2021-05-04 |
Family
ID=58913776
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110242660.0A Pending CN112967070A (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting mark system and method |
CN201611093103.2A Active CN106779739B (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology |
CN202110242801.9A Pending CN112749982A (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method based on two-dimensional code |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110242660.0A Pending CN112967070A (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting mark system and method |
CN201611093103.2A Active CN106779739B (en) | 2016-12-01 | 2016-12-01 | Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN112967070A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113793141A (en) * | 2021-09-01 | 2021-12-14 | 深圳市互联在线云计算股份有限公司 | Transaction method, device and equipment based on hardware wallet and readable storage medium |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609621B (en) * | 2017-08-21 | 2020-04-10 | 哈尔滨工业大学深圳研究生院 | Dot matrix anti-counterfeiting code design method based on chaotic encryption and application system thereof |
CN107808184B (en) * | 2017-12-01 | 2023-11-03 | 湖南建研信息技术股份有限公司 | Concrete test piece implantation type anti-exchange label and anti-exchange method for concrete test piece |
CN110390635A (en) * | 2018-04-19 | 2019-10-29 | 张佳炜 | Two-dimensional barcode information encryption method, coding/decoding method and device based on image procossing |
CN109829524B (en) * | 2019-01-17 | 2023-03-28 | 柳州康云互联科技有限公司 | Composite image feature code and manufacturing method thereof |
CN113326907A (en) * | 2021-05-29 | 2021-08-31 | 海盐前方印刷有限公司 | Method for producing color variable bar code |
CN117745299B (en) * | 2023-10-31 | 2024-07-19 | 北京国立信科技术有限公司 | Two-dimensional code-based anti-counterfeiting method and system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679106B (en) * | 2012-09-11 | 2016-09-21 | 上海新大陆翼码信息科技股份有限公司 | Quick Response Code cutting and splicing method for authenticating and system |
CN104239838A (en) * | 2013-06-19 | 2014-12-24 | 广州市人民印刷厂股份有限公司 | Anti-fake verification method for color two-dimensional code with digital watermark |
CN103489026B (en) * | 2013-09-24 | 2017-02-15 | 深圳市中选科技有限公司 | Colorful two-dimension code, generating method and generating system thereof and printed article |
JP5945299B2 (en) * | 2014-06-16 | 2016-07-05 | A・Tコミュニケーションズ株式会社 | Content providing system, content providing method, communication terminal, content acquisition method, and program |
DE102015207032A1 (en) * | 2015-04-17 | 2016-10-20 | Crewpharm Gmbh | System and method for labeling a product |
CN105069497B (en) * | 2015-07-27 | 2018-01-23 | 南京风力舰信息技术有限公司 | A kind of method for the Quick Response Code for generating beautification |
CN105930892A (en) * | 2016-04-22 | 2016-09-07 | 深圳活悦网络科技有限公司 | Variable logo two-dimensional code anti-counterfeiting method and system |
-
2016
- 2016-12-01 CN CN202110242660.0A patent/CN112967070A/en active Pending
- 2016-12-01 CN CN201611093103.2A patent/CN106779739B/en active Active
- 2016-12-01 CN CN202110242801.9A patent/CN112749982A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113793141A (en) * | 2021-09-01 | 2021-12-14 | 深圳市互联在线云计算股份有限公司 | Transaction method, device and equipment based on hardware wallet and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106779739A (en) | 2017-05-31 |
CN112967070A (en) | 2021-06-15 |
CN106779739B (en) | 2021-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106779739B (en) | Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology | |
US10235618B2 (en) | Authentication feature in a barcode | |
AU2013363820B2 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
CN111639734B (en) | Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code | |
US7676038B2 (en) | Secure printing method to thwart counterfeiting | |
US20120327450A1 (en) | Methods and devices for securing and authenticating documents | |
US20080002882A1 (en) | Brand protection and product autentication using portable devices | |
US10068237B2 (en) | Transmit an authentication mark | |
CN101501680A (en) | Method and system for deterring product counterfeiting, diversion and piracy | |
US9613327B2 (en) | Adapting an incremental information object | |
US20010047476A1 (en) | Authenticatable graphical bar codes | |
JP2022535764A (en) | certified text document | |
US20160267312A1 (en) | Increasing information size in two-dimensional barcodes | |
CN108960387A (en) | A kind of anti-counterfeiting two dimensional code and its generation and recognition methods | |
US20150110268A1 (en) | Method for coding and decoding information associated with an item | |
EP2754094A1 (en) | Generating an incremental information object | |
US8915450B2 (en) | Dual deterent incremental information object | |
CN110116866A (en) | A kind of anti-fake bottle lid of combination two dimensional code and digital security code | |
CN105488359A (en) | Printed file original protection and verification method and apparatus | |
EP2727059A1 (en) | Tracking customer loyalty information using an incremental information object | |
CN1250202A (en) | Antifake certification cipher |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |