CN112967070A - Anti-counterfeiting mark system and method - Google Patents

Anti-counterfeiting mark system and method Download PDF

Info

Publication number
CN112967070A
CN112967070A CN202110242660.0A CN202110242660A CN112967070A CN 112967070 A CN112967070 A CN 112967070A CN 202110242660 A CN202110242660 A CN 202110242660A CN 112967070 A CN112967070 A CN 112967070A
Authority
CN
China
Prior art keywords
dimensional code
pattern
code segment
color
segment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110242660.0A
Other languages
Chinese (zh)
Inventor
宋斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trustmobi Software Beijing Co ltd
Original Assignee
Trustmobi Software Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trustmobi Software Beijing Co ltd filed Critical Trustmobi Software Beijing Co ltd
Priority to CN202110242660.0A priority Critical patent/CN112967070A/en
Publication of CN112967070A publication Critical patent/CN112967070A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/10861Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to an anti-counterfeiting identification method and an anti-counterfeiting identification system, wherein a two-dimensional code is split to obtain at least two-dimensional code segments which can be orderly distributed in a symbolic pattern, and at least one two-dimensional code segment is converted into a color two-dimensional code segment with the color consistent with the corresponding position color of the symbolic pattern; and scanning at least one colored two-dimensional code segment in the marking pattern to form a recombined two-dimensional code. The invention combines the color two-dimensional codes into the marking pattern, so that the commodity is not influenced in appearance while the anti-counterfeiting information is set.

Description

Anti-counterfeiting mark system and method
The invention discloses a divisional application of an anti-counterfeiting system and a method, wherein the application number is 201611093103.2, the application date is 2016, 12 and 01, and the application type is the invention and is realized by combining a two-dimensional code scanning technology.
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting mark system and an anti-counterfeiting mark method.
Background
At present, many illegal persons are engaged in the counterfeit behavior of the known commodities in the society, and in order to enable consumers to conveniently identify the authenticity of the commodities, known manufacturers often adopt the forms of printing or pasting anti-counterfeiting code labels on the commodities and the like, and users can make anti-counterfeiting calls of manufacturers to inquire the authenticity. A plurality of enterprises print two-dimensional codes on own products or product packaging boxes, consumers can utilize the two-dimensional code scanning terminal to scan the two-dimensional codes on commodities after purchasing the products, and then the authenticity of the purchased products is verified through mobile phone short messages or the Internet according to the scanned two-dimensional code information.
The anti-counterfeiting method realized by combining the two-dimensional code scanning technology in the current market has the following defects: in the anti-counterfeiting method realized by combining the two-dimensional code scanning technology, the two-dimensional code printed on a commodity can be repeatedly inquired for an unlimited number of times, in order to avoid a counterfeiter from printing the same two-dimensional code on a counterfeit commodity, the conventional two-dimensional code label is made of special materials or processes such as anti-counterfeiting ink, fragile paper and the like, so that the anti-counterfeiting cost realized by combining the two-dimensional code scanning technology is increased, the product can be prevented from being circulated again on the market after the authenticity is verified, and although the counterfeiting cost of the counterfeiter is increased by the technology, the possibility of counterfeiting still exists. Therefore, the anti-counterfeiting effect of the anti-counterfeiting method realized by combining the two-dimensional code scanning technology in the prior art needs to be improved.
Chinese patent (CN 103530781A) discloses a commodity anti-counterfeiting method based on two-dimensional codes, relates to the technical field of anti-counterfeiting, and solves the technical problem of improving the anti-counterfeiting effect. Printing a unique two-dimensional code on each commodity, and storing the two-dimensional code of each commodity in an anti-counterfeiting database of a verification server; the commodity purchaser scans the two-dimensional code on the commodity by using the terminal and sends the two-dimensional code to the verification server to verify the authenticity of the commodity, a verification time threshold value is set for each two-dimensional code in an anti-counterfeiting database of the verification server, the verification server subtracts 1 from the verification time threshold value of the two-dimensional code of the commodity every time the two-dimensional code of the commodity is verified successfully, verification success information is returned to a user, and the two-dimensional code of the commodity is invalid after the verification success time of the two-dimensional code of the commodity exceeds the initial value of the verification time threshold value. However, the two-dimensional code generation method of the patent is simple and is easy to be forged by lawless persons through technical means. The verification of the two-dimensional code cannot be traced. Moreover, the traceability information of products in the current market is mainly displayed to the user terminal in a text or picture form, the traceability form is single, the information amount is small, the consumer is not facilitated to comprehensively know all links of the products, and the traceability experience of the consumer on the products is poor. Moreover, the text or picture information is easy to be tampered and forged, so that consumers cannot obtain real and accurate traceability information about purchased products, and the purpose of obtaining the traceability information of the products and performing anti-counterfeiting query on the products cannot be achieved.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an anti-counterfeiting method realized by combining a two-dimensional code scanning technology, which is characterized by comprising the following steps:
splitting a two-dimensional code into at least two-dimensional code segments and orderly distributing the two-dimensional code segments in a symbolic pattern;
converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
scanning at least one colored two-dimensional code segment in the landmark pattern and forming a recombined two-dimensional code;
and verifying the recombined two-dimensional code.
According to a preferred embodiment, the two-dimensional code segments are distributed in the symbolic pattern in order based on a mapping table of the position points of the symbolic pattern and the positioning points of the two-dimensional code, wherein,
and forming second characters combined into an encrypted two-dimensional code segment with an irregular shape by a first character corresponding to a first positioning point in the two-dimensional code segment through a chaotic encryption algorithm, wherein the encrypted two-dimensional code segment is orderly distributed in the symbolic pattern based on a positioning point mapping table between a second positioning point corresponding to the second character and the position point of the symbolic pattern.
According to a preferred embodiment, the two-dimensional code segments are distributed in the invisible watermark pattern matched with the symbolic pattern in order based on the positioning point mapping table in which the position points of the symbolic pattern and the positioning points of the two-dimensional code have a mapping relation.
According to a preferred embodiment, the symbolic pattern is provided with a position blind spot which has no mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
According to a preferred embodiment, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
According to a preferred embodiment, the color of the color two-dimensional code segment is formed by presetting based on the color of the corresponding position of the landmark pattern, and the color of the color two-dimensional code segment and the corresponding two-dimensional code segment are converted based on a color mapping list.
According to a preferred embodiment, the verifying the recombined two-dimensional code includes:
and performing initial verification in a mode of matching the recombined two-dimensional code with the original two-dimensional code, and performing operation verification on the public key signature of the original two-dimensional code subjected to the initial verification.
An anti-counterfeiting system realized by combining a two-dimension code scanning technology is characterized by comprising a two-dimension code generating module, a distribution module, a conversion module, a recombination module, a verification module, a cloud server and a mobile terminal,
the two-dimensional code generation module generates an original two-dimensional code and stores the original two-dimensional code in the cloud server,
the distribution module splits the two-dimensional code into at least one two-dimensional code segment and distributes the two-dimensional code segment in the symbolic pattern in order;
the conversion module converts at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
the mobile terminal scans at least one color two-dimensional code segment in the symbolic pattern and sends the color two-dimensional code segment to the recombination module to form a recombined two-dimensional code;
the verification module verifies the recombined two-dimensional code based on the storage information of the cloud server.
According to a preferred embodiment, the distribution module distributes the two-dimensional code segments in an ordered manner in the landmark pattern based on a mapping table of the location points of the landmark pattern and the location points of the two-dimensional code, wherein,
the distribution module forms second characters combined into an encrypted two-dimensional code segment with an irregular shape by a chaos encryption algorithm on first characters corresponding to first positioning points in the two-dimensional code segment, and distributes the encrypted two-dimensional code segment in the symbolic pattern in order based on a positioning point mapping table between second positioning points corresponding to the second characters and position points of the symbolic pattern.
According to a preferred embodiment, the distribution module distributes the two-dimensional code segments in order in the invisible watermark pattern matched with the landmark pattern based on the positioning point mapping table in which the mapping relationship exists between the position points of the landmark pattern and the positioning points of the two-dimensional code.
The invention has the beneficial technical effects that:
the invention splits and combines the traditional two-dimensional code into the symbolic pattern, so that the symbolic pattern has the double functions of anti-counterfeiting and identification. The attractive marking pattern saves the occupied space of the traditional two-dimensional code on the commodity package, eliminates the non-uniformity of the black-white two-dimensional code and the commodity package, and ensures that the commodity package is attractive and has an anti-counterfeiting effect.
Drawings
FIG. 1 is a logic diagram of an anti-counterfeiting method implemented by combining two-dimensional code scanning technology according to the present invention;
FIG. 2 is a schematic block diagram of an anti-counterfeiting system implemented in combination with two-dimensional code scanning technology according to the present invention;
FIG. 3 is a logic diagram of a two-dimensional code split and distributed in a symbolic pattern; and
fig. 4 is a logic diagram of a chaotic encryption system.
List of reference numerals
10: the two-dimensional code generation module 20: the distribution module 30: conversion module
40: the restructuring module 50: the moving end 60: verification module
70: the cloud server 21: first two-dimensional code segment 22: second two-dimensional code segment
23: third two-dimensional code segment 24: fourth two-dimensional code segment 25: fifth two-dimensional code segment
26: sixth two-dimensional code segment 27: seventh two-dimensional code segment 28: eighth two-dimensional code segment
29: ninth two-dimensional code segment 80: position blind spot
Detailed Description
The following detailed description is made with reference to the accompanying drawings.
The invention provides an anti-counterfeiting method realized by combining a two-dimensional code scanning technology, which comprises the following steps: splitting a two-dimensional code into at least one two-dimensional code segment and orderly distributing the two-dimensional code segment in a symbolic pattern; converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern; scanning at least one colored two-dimensional code segment in the landmark pattern and forming a recombined two-dimensional code; and verifying the recombined two-dimensional code.
The two-dimensional code is a two-dimensional bar code which records data symbol information by black and white figures distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure. The two-dimensional code uses a plurality of geometric shapes corresponding to the binary system to represent literal numerical information, and the literal numerical information is automatically read through an image input device or an optoelectronic scanning device so as to realize automatic information processing. The two-dimensional code comprises a stacked/row-type two-dimensional bar code and a matrix-type two-dimensional bar code. The two-dimensional code segment of the present invention is a part of a two-dimensional code.
The color two-dimensional code not only has all functions of a common black and white two-dimensional code, but also can present a color appearance. The color two-dimensional code segment of the invention is a color two-dimensional code segment with color appearance converted by a black and white two-dimensional code segment.
The marking pattern of the present invention is a mark which is used by a producer or an operator of a product on the product produced, manufactured, processed, sorted or distributed by the producer or the operator or on the service provided by the provider, is used for distinguishing the source of the product or the service, and has a remarkable characteristic by characters, figures, letters, numbers, three-dimensional marks, sound, color combinations, or combinations of the above elements. The marking pattern includes a trademark, a general pattern that a consumer can use to distinguish a product, or a pattern containing a product name.
Example 1
As shown in fig. 1, an anti-counterfeiting method implemented by combining a two-dimensional code scanning technology includes the steps of:
s1: splitting the two-dimensional code into at least one two-dimensional code segment and orderly distributing the two-dimensional code segment in the symbolic pattern;
s2: converting at least one two-dimensional code segment into a color two-dimensional code segment with the color consistent with the corresponding position of the landmark pattern;
s3: scanning at least one color two-dimensional code segment in the marking pattern and forming a recombined two-dimensional code;
s4: and verifying the recombined two-dimensional code.
This embodiment describes the above steps in detail.
S1: the two-dimensional code is split into at least two-dimensional code segments, and the two-dimensional code segments are distributed in the symbolic pattern in order.
The two-dimensional code generation module generates a unique black-and-white two-dimensional code for each product. Each code system has its specific character set, and each character occupies a certain width and has a certain checking function. The black and white two-dimensional code contains product information, service information and/or authentication information.
The two-dimensional code comprises a plurality of positioning points, and each positioning point corresponds to one two-dimensional code character. The landmark pattern is divided into a number of cells, each cell being a location point. Each position point corresponds to a positioning point, namely each position point corresponds to a two-dimensional code character. And establishing a positioning point mapping table based on the mapping relation between the position points of the symbolic pattern and the positioning points of the two-dimensional code.
Preferably, the two-dimensional code segment is distributed in the landmark pattern in order based on a mapping relation between the position point of the landmark pattern and the positioning point of the two-dimensional code.
And splitting the two-dimensional code into at least two parts, wherein each part is a two-dimensional code segment. And according to the mapping relation of the positioning point mapping table, each two-dimensional code segment corresponds to one part of the symbolic pattern. Therefore, the two-dimensional code segments are orderly distributed at corresponding positions in the symbolic pattern based on the positioning point mapping table.
As shown in fig. 3, the two-dimensional code is split into nine parts of two-dimensional code fragments: the first two-dimensional code segment 21, the second two-dimensional code segment 22, the third two-dimensional code segment 23, the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25, the sixth two-dimensional code segment 26, the seventh two-dimensional code segment 27, the eighth two-dimensional code segment 28, and the ninth two-dimensional code segment 29. The identifying pattern on the product package is the letter "Hi". The position points of the nine parts in the symbolic pattern correspond to the positioning points of the two-dimensional code one by one, a mapping relation exists, and a positioning point mapping table is established. And sequentially distributing the nine parts of two-dimensional chips at corresponding positions of the landmark pattern 'Hi' according to the mapping relation in the positioning point mapping table. The first two-dimensional code segment 21, the second two-dimensional code segment 22 and the third two-dimensional code segment 23 are distributed in the left vertical part of the letter "H", and the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25 and the sixth two-dimensional code segment 26 are distributed in the right vertical part of the letter "H". The seventh two-dimensional code segment 27 is distributed at the dot portion of the letter "i". The eighth two-dimensional code segment 28 and the ninth two-dimensional code segment 29 are distributed in the vertical portion of the letter "i". The two-dimensional code segment in the symbolic pattern and other parts in the symbolic pattern are combined together to form the symbolic pattern.
Preferably, the two-dimensional code segment can be split into a two-dimensional code segment in a regular area and a two-dimensional code segment in an irregular area. The two-dimensional code segments can be distributed as parts of irregular areas of the irregular landmark pattern according to the anchor point mapping table.
Preferably, the two-dimensional code segments are distributed in the invisible watermark pattern matched with the symbolic pattern in order based on the positioning point mapping table in which the mapping relation exists between the position points of the symbolic pattern and the positioning points of the two-dimensional code.
The surface of the symbolic pattern is provided with a invisible watermark. The two-dimensional code segments are distributed on the invisible watermarks on the surfaces of the corresponding distribution positions of the symbolic patterns on the basis of the positioning point mapping tables. The invisible watermark can be identified by scanning equipment at a mobile terminal and can not be identified by human eyes. The consumer can only see the logo but not the two-dimensional code segment.
Preferably, the two-dimensional code segment is orderly distributed in the symbolic pattern based on a locating point mapping table in which the mapping relation exists between the position point of the symbolic pattern and the locating point of the two-dimensional code, wherein a first character in the two-dimensional code segment corresponding to a first locating point forms a second character combined into an encrypted two-dimensional code segment with an irregular shape through a chaotic encryption algorithm, and the encrypted two-dimensional code segment is orderly distributed in the symbolic pattern based on the locating point mapping table between the second locating point corresponding to the second character and the position point of the symbolic pattern.
And forming an encrypted second character by the first character corresponding to the first fixed point in the two-dimensional code segment through a chaotic encryption algorithm. And the encrypted two-dimensional code segment formed by recombining the second characters generated by the chaotic encryption algorithm is an irregular-shaped encrypted two-dimensional code segment. An anchor point mapping table exists between a second anchor point corresponding to the second character and the position point of the landmark pattern. And the second characters in the encrypted two-dimensional code segments are converted and distributed on the position points of the corresponding symbolic patterns according to the mapping relation of the positioning point mapping table.
Preferably, the surface of the symbolic pattern is provided with a visible watermark two-dimensional code segment. The visible two-dimensional code segment is matched with the bottom pattern of the marking pattern to form the beautiful marking pattern.
Preferably, the symbolic pattern is provided with a position blind spot which does not have a mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
As shown in fig. 3, the landmark pattern includes blind spots 80. The position blind spot 80 may be a single cell, or may be a blind spot composed of several cells. The position blind spot 80 has no mapping relation with the two-dimensional code positioning point. Scanning the landmark pattern with the location blind spot 80 does not affect the identification of the duplicate two-dimensional code. The pattern of the position blind spots 80 is displayed as a symbolic pattern in combination with the pattern of the colored two-dimensional code segments.
S2: and converting at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the landmark pattern.
Preferably, the color of the color two-dimensional code segment is preset based on the color of the corresponding position of the landmark pattern, and the color of the color two-dimensional code segment and the color of the corresponding two-dimensional code segment are converted based on the color mapping list.
A color mapping list is established between the position points and the colors of the symbolic patterns. The color corresponding to the position point of the landmark pattern is preset in the color mapping list. And converting the two-dimensional code segments at the corresponding positions in the symbolic patterns according to the colors mapped by the color mapping list, so that the two-dimensional code segments form color two-dimensional code segments. The color of the colored two-dimensional code segment is consistent with the color of the symbolic pattern so as not to influence the identification of the product symbolic pattern by the consumer.
S3: at least one colored two-dimensional code segment in the landmark pattern is scanned and a recombined two-dimensional code is formed.
Preferably, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
The mobile terminal is provided with corresponding color two-dimensional code scanning equipment. The color two-dimensional code scanning equipment scans the marking pattern and identifies the color two-dimensional code segments in the marking pattern. And obtaining black and white distribution position points of the two-dimensional code segments at corresponding positions according to a color mapping list in which the color two-dimensional code and the position points have a mapping relation. And identifying the coordinates of black-and-white distribution position points of the two-dimensional code segments, and performing calculation conversion on the coordinates of the black-and-white distribution position points and the two-dimensional code positioning points according to a positioning point mapping table to enable the two-dimensional code segments to form a complete two-dimensional code on the same two-dimensional code positioning point coordinate, and finally obtaining a black-and-white recombined two-dimensional code formed by recombining at least one two-dimensional code segment.
S4: and verifying the recombined two-dimensional code.
Preferably, the method for verifying the recombined two-dimensional code includes: and performing initial verification in a mode of matching the recombined two-dimension code with the original two-dimension code, and performing operation verification on the original two-dimension code subjected to the initial verification.
And performing initial verification in a mode of matching the recombined two-dimensional code with the original two-dimensional code. Specifically, the original two-dimensional code is stored in a cloud server. And matching the recombined two-dimension code with the original two-dimension code, and if the recombined two-dimension code is matched with the original two-dimension code in a consistent manner, the recombined two-dimension code passes the initial verification. And if the recombined two-dimension code is not consistent with the original two-dimension code in matching, the recombined two-dimension code fails to be verified.
And after the initial verification of the recombined two-dimensional code is successful, converting the recombined two-dimensional code into anti-counterfeiting information capable of being verified by operation, transmitting the anti-counterfeiting information to the cloud server for anti-counterfeiting verification, and verifying whether the anti-counterfeiting information is generated by specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
Public key infrastructure algorithms allow software to create encrypted or decrypted data in the form of "key pairs". The signature and verify signature functions are also part of the program. Each "Key pair" contains a Public Key (Public Key) and a Private Key (Private Key). The "key pair" will be used for encryption, decryption, signing and verifying the signature. As the name implies, the private key is naturally to be protected, while the public key is to be disclosed.
For example, the manufacturer performs a data calculation process on a unique non-repeating string number of the product. The data calculation processing method comprises a hash algorithm. And then, encrypting a result obtained after data calculation processing by using a private key of a manufacturer to be used as a signature, combining the signature with the serial number of the product to generate two-dimensional code information, and finally publishing the two-dimensional code information. For example printed on the packaging of the product. The public consumers use the application tool to scan the marking pattern to obtain the recombined two-dimensional code. Scanning, converting and splitting the recombined two-dimensional code, acquiring a public key from a website of a manufacturer in an application tool, decrypting the signature information by using a public key cryptographic function, and if the decryption is successful and the decrypted hash value is indeed consistent with the hash result of the product serial number contained in the original two-dimensional code, proving two points: this product logo is indeed issued by the manufacturer and the content is complete.
And after the anti-counterfeiting verification is successful, judging the number of times that the product identification information is inquired according to the product identification inquiry information record contained in the recombined two-dimensional code. And if the product identification information is the first query, feeding back the product identification information and/or the authenticity of the product identification information to the mobile terminal, and identifying the product identification information as the first query. And if the product identification information is not the first query, feeding back the product identification information and/or the authenticity of the product identification information to the mobile terminal, and identifying the product identification information as the non-first query. Preferably, if the product identification information is not the first query, the product identification information, the authenticity of the product information and the number information of the identification queries are fed back to the mobile terminal.
Preferably, the mapping relationship between the positioning points of the two-dimensional code and the position points of the identification pattern includes a mapping encryption algorithm. The positioning points of the two-dimensional code and the position points of the symbolic pattern are not in a simple mapping relation, and the positioning points of the two-dimensional code correspond to all the position points in the symbolic pattern after being encrypted and calculated. For example, the locating point information of the two-dimensional code is encrypted by using an information encryption algorithm of chaotic mapping, and a mapping relation is established between the encrypted locating point and the position point of the symbolic pattern. The information encryption algorithm of the chaotic mapping comprises Logistic mapping, Cubic mapping and Arnold Cat mapping.
The chaotic encryption system is shown in fig. 4. The chaotic encryption system comprises chaotic cascade subsystems a and b, Arnold Cat mapping and encryption functions
Figure BDA0002962433120000091
And (4) forming. The chaotic cascade subsystems a and b are formed by two-stage discrete chaotic mapping connection: the first stage and the second stage of the chaotic cascade subsystem a are Logistic mapping and Cubic mapping in sequence; the first stage and the second stage of the chaotic cascade subsystem b are Cubic mapping and Logistic mapping in sequence. When the ith plaintext mi is encrypted, iteration eta of the chaotic cascade subsystems a and b is respectively carried outiSub sum of betaiThen, ui and wi are outputted. ui, wi and plaintext mi are encrypted functions
Figure BDA0002962433120000093
After processing, ciphertext ei is generated. And simultaneously, changing the initial value of the next iterative operation of the mapping of the Arnold Cat by using the value of ei. After a plurality of iterations are carried out, the iteration times of the next round of the chaotic cascade subsystems a and b are correspondingly changed according to the obtained results, and preparation is made for encrypting the (i + 1) th plaintext mi + 1.
The initial value and the initial iteration number of each chaotic map in the encryption system are both related to the secret key. The secret key K is divided into K1、K2And K3Three parts, in which the real number K1,K2∈[3⊕2,4],K3Is a character string (K) composed of n (n ≧ 16) characters3=k1k2…kn)。
Setting the Cubic mapping parameter r in the chaotic cascade subsystems a and b as K respectively1、K2. The sum of initial values and initial iteration times of the rest chaotic maps are determined according to K3And (4) determining.
The encryption function f (u, w, m) — (1000ui +1000wi + m) mod 256.
And after scanning the color two-dimensional code segment, the scanning equipment of the mobile terminal determines an encrypted two-dimensional code picture according to the positioning point mapping table. And restoring the encrypted two-dimensional code picture after two-dimensional chaotic decryption to obtain the two-dimensional code. And verifying the two-dimension code and the initial two-dimension code to determine the authenticity of the product. Because the secret key is only owned by the verification system of the manufacturer, the common merchant does not have the secret key, so that the encrypted two-dimensional code cannot be decrypted, and further the product and the product information cannot be forged.
Example 2
This embodiment is a further improvement of embodiment 1, and the repeated parts with embodiment 1 are not described again.
As shown in fig. 2, the embodiment provides an anti-counterfeiting system implemented by combining a two-dimensional code scanning technology, and the anti-counterfeiting system includes a two-dimensional code generating module 10, a distribution module 20, a conversion module 30, a restructuring module 40, a verification module 60, a cloud server 70, and a mobile terminal 50.
The two-dimensional code generation module 10 is used for generating a unique black and white two-dimensional code related to product information.
The distribution module 20 is configured to split the two-dimensional code into at least two-dimensional code segments and distribute the two-dimensional code segments in at least two positions of the landmark pattern according to the positioning point mapping table. The method for splitting the two-dimensional code fragments can be regular splitting or irregular splitting.
The conversion module 30 is configured to convert the two-dimensional code segment into a color two-dimensional code segment whose color matches the color of the landmark pattern according to the color mapping list.
The restructuring module 40 is configured to convert the scanned color two-dimensional code segments into black and white two-dimensional code segments according to the color mapping list, and restructure the two-dimensional code segments into a complete restructured two-dimensional code according to the positioning point mapping table.
The verification module 60 is used for verifying the recombined two-dimensional code, so as to verify the authenticity of the product.
The cloud server 70 is configured to store product information, original two-dimensional code information, and anti-counterfeiting verification information related to the two-dimensional code, or perform anti-counterfeiting verification on the combined two-dimensional code.
The movable end 50 is used for scanning the color two-dimensional code segment arranged in the symbolic pattern.
Specifically, the two-dimensional code generation module 10 generates an original two-dimensional code and stores the original two-dimensional code in the cloud server 70. The distribution module 20 splits the two-dimensional code into at least one two-dimensional code segment and distributes the two-dimensional code segments in the landmark pattern in order. The conversion module 30 converts at least one of the two-dimensional code segments into a color two-dimensional code segment having a color that is consistent with a corresponding position color of the landmark pattern. The mobile terminal 50 scans at least one color two-dimensional code segment in the landmark pattern and sends the color two-dimensional code segment to the restructuring module 40 to form a restructured two-dimensional code. The verification module 60 verifies the duplicate two-dimensional code based on the stored information of the cloud server 70.
Preferably, the distribution module 20 distributes the two-dimensional code segments in the landmark pattern in order based on a mapping table of the location points of the landmark pattern and the location points of the two-dimensional code.
Preferably, the two-dimensional code segment is distributed in the landmark pattern in order based on a mapping relation between the position point of the landmark pattern and the positioning point of the two-dimensional code.
The distribution module 20 splits the two-dimensional code into at least two parts, each part being a two-dimensional code segment. The distribution module 20 stores a positioning point mapping table in which the mapping relationship between the position point of the landmark pattern and the positioning point of the two-dimensional code exists. The coordinates of a two-dimensional code positioning point correspond to the coordinates of a landmark pattern position point one by one. The distribution module 20 corresponds to a part of the landmark pattern according to the mapping relationship of the locating point mapping table. Therefore, the two-dimensional code segments are orderly distributed at corresponding positions in the symbolic pattern based on the positioning point mapping table.
As shown in fig. 3, the two-dimensional code is split into nine two-dimensional code segments by the distribution module 20: the first two-dimensional code segment 21, the second two-dimensional code segment 22, the third two-dimensional code segment 23, the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25, the sixth two-dimensional code segment 26, the seventh two-dimensional code segment 27, the eighth two-dimensional code segment 28, and the ninth two-dimensional code segment 29. The identifying pattern on the product package is the letter "Hi". The position points of the nine parts in the symbolic pattern correspond to the positioning points of the two-dimensional code one by one, a mapping relation exists, and a positioning point mapping table is established. The distribution module 20 distributes the nine parts of two-dimensional chips in order at the corresponding positions of the landmark pattern "Hi" according to the mapping relationship in the positioning point mapping table. The first two-dimensional code segment 21, the second two-dimensional code segment 22 and the third two-dimensional code segment 23 are distributed in the left vertical part of the letter "H", and the fourth two-dimensional code segment 24, the fifth two-dimensional code segment 25 and the sixth two-dimensional code segment 26 are distributed in the right vertical part of the letter "H". The seventh two-dimensional code segment 27 is distributed at the dot portion of the letter "i". The eighth two-dimensional code segment 28 and the ninth two-dimensional code segment 29 are distributed in the vertical portion of the letter "i". The two-dimensional code segment in the symbolic pattern and other parts in the symbolic pattern are combined together to form the symbolic pattern.
Preferably, the distribution module 20 may split the two-dimensional code segment into a two-dimensional code segment in a regular region and a two-dimensional code segment in an irregular region. The two-dimensional code segments can be distributed as parts of irregular areas of the irregular landmark pattern according to the anchor point mapping table.
Preferably, the distribution module 20 forms a second character combined into an encrypted two-dimensional code segment with an irregular shape by using a chaotic encryption algorithm for a first character corresponding to the first positioning point in the two-dimensional code segment, and distributes the encrypted two-dimensional code segment in the landmark pattern in order based on a positioning point mapping table between the second positioning point corresponding to the second character and a position point of the landmark pattern.
And forming an encrypted second character by the first character corresponding to the first fixed point in the two-dimensional code segment through a chaotic encryption algorithm. And the encrypted two-dimensional code segment formed by recombining the second characters generated by the chaotic encryption algorithm is an irregular-shaped encrypted two-dimensional code segment. An anchor point mapping table exists between a second anchor point corresponding to the second character and the position point of the landmark pattern. The distribution module 20 transforms the second characters in the encrypted two-dimensional code segment according to the mapping relationship of the positioning point mapping table and distributes the second characters on the corresponding position points of the landmark pattern.
Preferably, the distribution module 20 distributes the two-dimensional code segments in the invisible watermark pattern matched with the landmark pattern in order based on the positioning point mapping table in which the mapping relationship exists between the position point of the landmark pattern and the positioning point of the two-dimensional code.
The surface of the symbolic pattern is provided with a invisible watermark. The distribution module 20 distributes the two-dimensional code segments on the invisible watermarks on the distribution position surfaces of the landmark patterns based on the positioning point mapping table distribution module 20. Namely, the invisible watermark contains the two-dimensional code segment. The invisible watermark can be identified by scanning equipment at a mobile terminal and can not be identified by human eyes. The consumer can only see the logo but not the two-dimensional code segment.
Preferably, the distribution module 20 distributes the two-dimensional code segments on the visible watermark of the surface of the landmark pattern. The visible two-dimensional code segment is matched with the bottom pattern of the marking pattern to form the beautiful marking pattern.
Preferably, the symbolic pattern is provided with a position blind spot which does not have a mapping relation with a positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
As shown in fig. 3, the landmark pattern includes blind spots 80. The position blind spot 80 may be a single cell, or may be a blind spot composed of several cells. The position blind spot 80 has no mapping relation with the two-dimensional code positioning point. Scanning the landmark pattern with the location blind spot 80 does not affect the identification of the duplicate two-dimensional code. The pattern of the position blind spots 80 is displayed as a symbolic pattern in combination with the pattern of the colored two-dimensional code segments.
Preferably, the conversion module 30 creates and stores a color mapping list in which the position points of the landmark patterns correspond to colors. The color of the color mapping list is preset based on the color of the corresponding position of the landmark pattern. The conversion module 30 converts the color of the two-dimensional code positioning point corresponding to the position point coordinates of the landmark pattern based on the color mapping list to form a color two-dimensional code segment. The color of the colored two-dimensional code segment is consistent with the color of the symbolic pattern so as not to influence the identification of the product symbolic pattern by the consumer.
Preferably, the restructuring module 40 restructures the color two-dimensional code scanned by the mobile terminal 50 into a restructured two-dimensional code. Namely, the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
The mobile end 50 is provided with a corresponding color two-dimensional code scanning device. The mobile terminal 50 scans the landmark pattern and identifies the color two-dimensional code segment in the landmark pattern. The recombination module 40 obtains black and white distribution position points of the two-dimensional code segments at corresponding positions according to the color mapping list in which the color two-dimensional code and the position points have the mapping relationship. The restructuring module 40 identifies coordinates of black and white distribution position points of the two-dimensional code segment, and performs calculation conversion on the coordinates of the black and white distribution position points and the two-dimensional code positioning points according to the positioning point mapping table, so that the two-dimensional code segment forms a complete two-dimensional code on the same two-dimensional code positioning point coordinate, and finally, a black and white restructured two-dimensional code formed by at least one two-dimensional code segment through recombination is obtained.
Preferably, the way of verifying the recombined two-dimensional code by the verification module 60 includes: and performing initial verification in a mode of matching the recombined two-dimension code with the original two-dimension code, and performing operation verification on the original two-dimension code subjected to the initial verification.
The verification module 60 performs initial verification in a manner that matches the reconstituted two-dimensional code with the original two-dimensional code. Specifically, the two-dimensional code generation module 10 generates and stores the original two-dimensional code in the cloud server while generating the two-dimensional code. The verification module 60 matches the recombined two-dimensional code after recombination with the original two-dimensional code, and if the recombined two-dimensional code matches with the original two-dimensional code consistently, the recombined two-dimensional code passes the initial verification. And if the recombined two-dimension code is not consistent with the original two-dimension code in matching, the recombined two-dimension code fails to be verified.
After the initial verification of the recombined two-dimensional code is successful, the verification module 60 converts the recombined two-dimensional code into the anti-counterfeiting information which can be verified by operation, and transmits the anti-counterfeiting information to the cloud server 70 for anti-counterfeiting verification, so as to verify whether the anti-counterfeiting information is generated by the specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
After the anti-counterfeiting verification is successful, the cloud server 70 judges the number of times that the product identification information is queried according to the product identification query information record contained in the recombined two-dimensional code. If the product identification information is the first query, the cloud server 70 feeds back the product identification information and/or the authenticity thereof to the mobile terminal 50, and identifies the product identification information as the first query. If the product identification information is not the first query, the cloud server 70 feeds back the product identification information and/or the authenticity thereof to the mobile terminal 50, and identifies as a non-first query. Preferably, if the product identification information is not the first query, the cloud server 70 feeds back the product identification information, the authenticity of the product information, and the number information of the identification queries to the mobile terminal.
Preferably, the anti-counterfeiting system realized by combining the two-dimensional code scanning technology further comprises an encryption module and a decryption module. The encryption module encrypts the two-dimensional code generated by the two-dimensional code generation module 10 to form an encrypted two-dimensional code. The encrypted two-dimensional code is divided into at least two encrypted two-dimensional code segments by the distribution module 20 and distributed in the symbolic pattern in order.
The encryption method of the encryption module comprises a method for signing or encrypting the identification information by using a public key system algorithm and a method for carrying out chaotic mapping encryption on the two-dimensional code by using a chaotic encryption system.
Preferably, the mapping relationship between the positioning points of the two-dimensional code and the position points of the identification pattern includes a mapping encryption algorithm. The positioning points of the two-dimensional code and the position points of the symbolic pattern are not in a simple mapping relation, and the positioning points of the two-dimensional code correspond to all the position points in the symbolic pattern after being encrypted and calculated. For example, the encryption module encrypts the positioning point information of the two-dimensional code by using an information encryption algorithm of chaotic mapping, and establishes a mapping relation between the encrypted positioning point and the position point of the symbolic pattern. The information encryption algorithm of the chaotic mapping comprises Logistic mapping, Cubic mapping and Arnold Cat mapping.
The mobile end 50 is provided with a corresponding color two-dimensional code scanning device. The mobile terminal 50 scans the landmark pattern and identifies the color two-dimensional code segment in the landmark pattern. The recombination module 40 obtains black and white distribution position points of the encrypted two-dimensional code segment at the corresponding position according to the color mapping list in which the color two-dimensional code and the position points have the mapping relationship. The recombination module 40 identifies coordinates of black-and-white distribution position points of the encrypted two-dimensional code segments, and performs calculation conversion on the coordinates of the black-and-white distribution position points and the encrypted two-dimensional code positioning points according to the positioning point mapping table, so that the encrypted two-dimensional code segments form a complete encrypted two-dimensional code on the same two-dimensional code positioning point coordinates, and finally, a black-and-white recombined encrypted two-dimensional code formed by recombining at least one encrypted two-dimensional code segment is obtained.
The decryption module is provided in the verification module 60. The verification module 60 receives and decrypts the recombined encrypted two-dimensional code sent by the recombination module 40, and restores the recombined encrypted two-dimensional code to a recombined two-dimensional code. The verification module 60 performs initial verification in a manner that matches the reconstituted two-dimensional code with the original two-dimensional code. After the initial verification of the recombined two-dimensional code is successful, the verification module 60 converts the recombined two-dimensional code into the anti-counterfeiting information which can be verified by operation, and transmits the anti-counterfeiting information to the cloud server 70 for anti-counterfeiting verification, so as to verify whether the anti-counterfeiting information is generated by the specified public key/private key operation. If so, the anti-counterfeiting information is real information, and the anti-counterfeiting verification is successful. If not, the anti-counterfeiting information is the counterfeiting information, and the anti-counterfeiting verification fails.
It should be noted that the above-mentioned embodiments are exemplary, and that those skilled in the art, having benefit of the present disclosure, may devise various arrangements that are within the scope of the present disclosure and that fall within the scope of the invention. It should be understood by those skilled in the art that the present specification and figures are illustrative only and are not limiting upon the claims. The scope of the invention is defined by the claims and their equivalents.

Claims (10)

1. The anti-counterfeiting identification method is characterized in that a two-dimensional code is split to obtain at least two-dimensional code segments which can be orderly distributed in a symbolic pattern, and at least one two-dimensional code segment is converted into a color two-dimensional code segment with the color consistent with the corresponding position color of the symbolic pattern;
and scanning at least one colored two-dimensional code segment in the marking pattern to form a recombined two-dimensional code.
2. The method for identifying an anti-counterfeit label according to claim 1, wherein the two-dimensional code segment can be divided into a two-dimensional code segment of a regular area and a two-dimensional code segment of an irregular area, and the two-dimensional code segments can be distributed as parts of the irregular area of the irregular landmark pattern according to the positioning point mapping table.
3. The anti-counterfeit marking method according to claim 1 or 2, wherein the two-dimensional code segment is orderly distributed in the symbolic pattern based on a positioning point mapping table in which a mapping relationship exists between a position point of the symbolic pattern and a positioning point of the two-dimensional code, wherein a first character corresponding to a first positioning point in the two-dimensional code segment forms a second character combined into an encrypted two-dimensional code segment of an irregular shape through a chaotic encryption algorithm, and the encrypted two-dimensional code segment is orderly distributed in the symbolic pattern based on the positioning point mapping table between a second positioning point corresponding to the second character and the position point of the symbolic pattern.
4. The anti-counterfeit marking method according to claim 3, wherein the two-dimensional code segment is distributed in the invisible watermark pattern matching the landmark pattern in order based on a mapping table of the location point of the landmark pattern and the location point of the two-dimensional code having a mapping relationship.
5. The method for anti-counterfeit marking according to claim 4, wherein the symbolic pattern is provided with a position blind spot having no mapping relation with the positioning point of the two-dimensional code, and the position blind spot and the colored two-dimensional code segment are combined in corresponding colors to form the symbolic pattern.
6. The method for identifying anti-counterfeit of claim 5, wherein the recombined two-dimensional code is formed by combining at least one two-dimensional code segment obtained by the color two-dimensional code segment based on the positioning point mapping table.
7. The method for identifying anti-counterfeit of claim 6, wherein the color of the color two-dimensional code segment is formed by presetting based on the color of the corresponding position of the symbolic pattern, and the color of the color two-dimensional code segment and the corresponding two-dimensional code segment are converted based on a color mapping list.
8. The method for identifying an anti-counterfeit mark as claimed in claim 7, wherein the verification of the recombined two-dimensional code is to perform initial verification by matching the recombined two-dimensional code with an original two-dimensional code, and to perform operation verification on a public key signature of the original two-dimensional code after the initial verification.
9. An anti-counterfeiting mark system is characterized by comprising a two-dimensional code generation module, a distribution module, a conversion module, a recombination module, a verification module, a cloud server and a mobile terminal,
the two-dimensional code generation module generates an original two-dimensional code and stores the original two-dimensional code in the cloud server,
the distribution module splits the two-dimensional code into at least two-dimensional code segments and distributes the two-dimensional code segments in the symbolic pattern in order;
the conversion module converts at least one two-dimensional code segment into a color two-dimensional code segment which is consistent with the color of the corresponding position of the symbolic pattern;
the mobile terminal scans at least one color two-dimensional code segment in the symbolic pattern and sends the color two-dimensional code segment to the recombination module to form a recombined two-dimensional code;
the verification module verifies the recombined two-dimensional code based on the storage information of the cloud server.
10. The system according to claim 9, wherein the distribution module distributes the two-dimensional code segments in the landmark pattern in order based on a mapping table of the location points of the landmark pattern and the location points of the two-dimensional code, wherein the distribution module is configured to split the two-dimensional code into at least two-dimensional code segments and distribute the two-dimensional code segments in at least two positions of the landmark pattern according to the mapping table of the location points.
CN202110242660.0A 2016-12-01 2016-12-01 Anti-counterfeiting mark system and method Pending CN112967070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110242660.0A CN112967070A (en) 2016-12-01 2016-12-01 Anti-counterfeiting mark system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110242660.0A CN112967070A (en) 2016-12-01 2016-12-01 Anti-counterfeiting mark system and method
CN201611093103.2A CN106779739B (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201611093103.2A Division CN106779739B (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology

Publications (1)

Publication Number Publication Date
CN112967070A true CN112967070A (en) 2021-06-15

Family

ID=58913776

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201611093103.2A Active CN106779739B (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology
CN202110242660.0A Pending CN112967070A (en) 2016-12-01 2016-12-01 Anti-counterfeiting mark system and method
CN202110242801.9A Pending CN112749982A (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method based on two-dimensional code

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201611093103.2A Active CN106779739B (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110242801.9A Pending CN112749982A (en) 2016-12-01 2016-12-01 Anti-counterfeiting system and method based on two-dimensional code

Country Status (1)

Country Link
CN (3) CN106779739B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609621B (en) * 2017-08-21 2020-04-10 哈尔滨工业大学深圳研究生院 Dot matrix anti-counterfeiting code design method based on chaotic encryption and application system thereof
CN107808184B (en) * 2017-12-01 2023-11-03 湖南建研信息技术股份有限公司 Concrete test piece implantation type anti-exchange label and anti-exchange method for concrete test piece
CN110390635A (en) * 2018-04-19 2019-10-29 张佳炜 Two-dimensional barcode information encryption method, coding/decoding method and device based on image procossing
CN109829524B (en) * 2019-01-17 2023-03-28 柳州康云互联科技有限公司 Composite image feature code and manufacturing method thereof
CN113326907A (en) * 2021-05-29 2021-08-31 海盐前方印刷有限公司 Method for producing color variable bar code
CN113793141A (en) * 2021-09-01 2021-12-14 深圳市互联在线云计算股份有限公司 Transaction method, device and equipment based on hardware wallet and readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679106B (en) * 2012-09-11 2016-09-21 上海新大陆翼码信息科技股份有限公司 Quick Response Code cutting and splicing method for authenticating and system
CN104239838A (en) * 2013-06-19 2014-12-24 广州市人民印刷厂股份有限公司 Anti-fake verification method for color two-dimensional code with digital watermark
CN103489026B (en) * 2013-09-24 2017-02-15 深圳市中选科技有限公司 Colorful two-dimension code, generating method and generating system thereof and printed article
JP5945299B2 (en) * 2014-06-16 2016-07-05 A・Tコミュニケーションズ株式会社 Content providing system, content providing method, communication terminal, content acquisition method, and program
DE102015207032A1 (en) * 2015-04-17 2016-10-20 Crewpharm Gmbh System and method for labeling a product
CN105069497B (en) * 2015-07-27 2018-01-23 南京风力舰信息技术有限公司 A kind of method for the Quick Response Code for generating beautification
CN105930892A (en) * 2016-04-22 2016-09-07 深圳活悦网络科技有限公司 Variable logo two-dimensional code anti-counterfeiting method and system

Also Published As

Publication number Publication date
CN106779739B (en) 2021-02-09
CN112749982A (en) 2021-05-04
CN106779739A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN106779739B (en) Anti-counterfeiting system and method realized by combining two-dimensional code scanning technology
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
KR102194421B1 (en) Method and apparatus for marking manufactured items using physical characteristic
US10235618B2 (en) Authentication feature in a barcode
US10068237B2 (en) Transmit an authentication mark
CN111639734B (en) Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code
US20080130876A1 (en) Method for Private-Key Encryption of Messages, and Application to an Installation
US9092745B2 (en) Adapting an incremental information object
CN108629603B (en) Commodity anti-counterfeiting method based on two-dimensional code
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods
US20150110268A1 (en) Method for coding and decoding information associated with an item
US9477853B2 (en) Generating an incremental information object
CN110116866A (en) A kind of anti-fake bottle lid of combination two dimensional code and digital security code
US8915450B2 (en) Dual deterent incremental information object
CN105488359A (en) Printed file original protection and verification method and apparatus
CN111814937B (en) Anti-counterfeit label generation and printing method
CA3038397A1 (en) Cloud based authentication system
CN114881670A (en) Texture RSA encryption anti-counterfeiting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination