CN114169353B - Microcode decryption method and microcode decryption system - Google Patents

Microcode decryption method and microcode decryption system Download PDF

Info

Publication number
CN114169353B
CN114169353B CN202111492450.3A CN202111492450A CN114169353B CN 114169353 B CN114169353 B CN 114169353B CN 202111492450 A CN202111492450 A CN 202111492450A CN 114169353 B CN114169353 B CN 114169353B
Authority
CN
China
Prior art keywords
identifier
identifiers
distance
sequence
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111492450.3A
Other languages
Chinese (zh)
Other versions
CN114169353A (en
Inventor
江万鑫
倪时龙
张炳阳
李缝兴
赵立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Zefu Software Co ltd
Original Assignee
Fujian Zefu Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Zefu Software Co ltd filed Critical Fujian Zefu Software Co ltd
Priority to CN202111492450.3A priority Critical patent/CN114169353B/en
Publication of CN114169353A publication Critical patent/CN114169353A/en
Application granted granted Critical
Publication of CN114169353B publication Critical patent/CN114169353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1443Methods for optical code recognition including a method step for retrieval of the optical code locating of the code in an image

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a microcode decryption method and a microcode decryption system, comprising the following steps: acquiring input image data; identifying a first identifier in the image data according to preset first identifier information and identifying the position of the first identifier as an origin position; identifying a plurality of second identifiers in the image data according to a preset second identifier information set, and identifying a plurality of coordinate values of the plurality of second identifiers relative to the origin position; and calculating the distances between the second identifiers and the origin according to the coordinate values and the origin position, connecting lines, calculating the included angles between adjacent connecting lines, rounding according to the distances and the included angles, and sequentially arranging to obtain a sequence value, and obtaining a decoded value by adopting a preset decoding algorithm according to the sequence value. According to the invention, even if no damage exists between the first identifier and the second identifier, the decryption of the data is not influenced, and the anti-fouling capability is improved.

Description

Microcode decryption method and microcode decryption system
Technical Field
The invention relates to the technical field of graphic data codes, in particular to a microcode decryption method and a microcode decryption system.
Background
The two-dimensional code is also called as a two-dimensional bar code, the common two-dimensional code is QRCode, QR is called as quick response, and the two-dimensional code is a coding mode which is superpopular in mobile equipment in recent years, can store more information than the traditional BarCode bar code, and can also represent more data types.
The two-dimensional code (2-dimensional bar code) is a graph which is distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure, is black-white alternate and records data symbol information; the concept of 0 and 1 bit streams forming the internal logic foundation of a computer is skillfully utilized in code programming, a plurality of geometric shapes corresponding to binary are used for representing literal numerical information, and the literal numerical information is automatically read through an image input device or an optoelectronic scanning device to realize automatic information processing: it has some commonalities in barcode technology: each code has its specific character set; each character occupies a certain width; has a certain checking function and the like. Meanwhile, the system also has the function of automatically identifying information of different rows and processes the rotation change points of the graphics. Generating the corresponding two-dimensional code by the data can be regarded as realizing the two-dimensional code encryption process, and then analyzing the corresponding two-dimensional code to obtain the corresponding data can be regarded as the two-dimensional code decryption process.
The most common two-dimensional code is a square two-dimensional code, the three corners of the upper left, the lower left and the upper right are provided with 'Chinese character' as the basis for identification and positioning, and then square patterns with alternating black and white are filled in the two-dimensional code to form a two-dimensional code image. The obvious problems of the existing two-dimensional code are as follows: because the identification positioning occupies a large area, the information area which can be stored is relatively limited, and the logic 0 or 1 is directly represented by a square block, the two-dimensional code area occupied by one byte of information is also large, so that the data capacity which can be stored by the two-dimensional code is very limited. Then, damage to the two-dimensional code such as offset can also lead to the two-dimensional code to be unrecognizable, and damage resistance is limited.
Disclosure of Invention
Therefore, it is necessary to provide a method and a system for decrypting a microscopic code, which solve the problems that the data amount is small and the recognition rate is easily affected when the conventional graphic code is decrypted into data.
In order to achieve the above object, the present invention provides a method for decrypting a microcode, comprising the steps of:
acquiring input image data;
identifying a first identifier in the image data according to preset first identifier information and identifying the position of the first identifier as an origin position;
identifying a plurality of second identifiers in the image data according to a preset second identifier information set, and identifying a plurality of coordinate values of the plurality of second identifiers relative to the origin position;
and calculating the distances between the second identifiers and the origin according to the coordinate values and the origin position, connecting lines, calculating the included angles between adjacent connecting lines, rounding according to the distances and the included angles, and sequentially arranging to obtain a sequence value, and obtaining a decoded value by adopting a preset decoding algorithm according to the sequence value.
Further, if the first identifier is not recognized, the third identifiers of two of the image data are recognized directly according to the preset third identifiers, and the origin position of the first identifier is determined according to the positions of the preset two third identifiers in the image.
Further, the distance is rounded to be the distance between the center of the second identifier and the center of the first identifier divided by the distance between the centers of the two third identifiers, and then rounded to be an integer value.
Further, when the number of the first identifiers is plural, an identification area is defined according to an average value of the pitches of the adjacent two identifiers, the second identifier is identified in the identification area, and a sequence value operation is performed according to the second identifier identified in one identification area.
Further, the second identifiers in different identification areas are sequentially compared, and if the second identifiers at the same position in different identification areas are missing, the missing second identifiers are supplemented to the missing areas according to the identification areas with the second identifiers.
Further, the second identifier information set includes a serial number corresponding to the second identifier, and the second identifier identification process further includes identifying the serial number of the second identifier according to the second identifier serial number; the step of obtaining the sequence value by sequentially arranging the obtained sequence value after rounding according to the distance and the included angle comprises the following steps:
and arranging according to the distance, the second identifier serial number and the included angle in sequence to obtain a sequence value.
Further, the number of turns of the second identifier is determined according to the distance between the second identifier and the origin and the distance between each turn of the second identifier, and the sequence value is obtained by arranging the turns in sequence from the outer circle to the inner circle.
Further, the distance is rounded to be the integer value after the distance between the center of the second identifier and the center of the first identifier is divided by the diameter of the circle where the periphery of the first identifier is positioned
The invention provides a microcode decryption system, which comprises a memory and a processor, wherein a computer program is stored in the memory, and the computer program realizes the steps of the method according to any one of the embodiments of the invention when being executed by the processor.
Further, the camera is used for acquiring image data and transmitting the image data to the processor.
Compared with the prior art, the technical scheme is characterized in that the first identifier is used for identifying the graphic center, the second identifier is used for identifying the distance and the angle, the information contained in the distance and the angle is far greater than the information expressed by logic 0 or 1, a large amount of data can be obtained through decryption by means of the second identifier, meanwhile, even if no damage exists between the first identifier and the second identifier, the decryption of the data is not influenced, and the anti-fouling capability is improved.
Drawings
FIG. 1 is a flow chart of an encryption method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a first identifier and a second identifier according to an embodiment of the present invention;
FIG. 3 is a microscopic code pattern of an encrypted embodiment of the invention;
FIG. 4 is a microscopic code pattern of an embodiment of an encrypted array arrangement according to the present invention;
FIG. 5 is a microscopic code pattern of an embodiment of the encrypted two-turn second identification code of the present invention;
fig. 6 is a flow chart of a decryption embodiment of the present invention.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of the phrase "in various places in the specification are not necessarily all referring to the same embodiment, nor are they particularly limited to independence or relevance from other embodiments. In principle, in the present application, as long as there is no technical contradiction or conflict, the technical features mentioned in the embodiments may be combined in any manner to form a corresponding implementable technical solution.
Unless defined otherwise, technical terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the present application pertains; the use of related terms herein is for the description of specific embodiments only and is not intended to limit the present application.
In the description of the present application, the term "and/or" is a representation for describing a logical relationship between objects, which means that there may be three relationships, e.g., a and/or B, representing: there are three cases, a, B, and both a and B. In addition, the character "/" herein generally indicates that the front-to-back associated object is an "or" logical relationship.
In this application, terms such as "first" and "second" are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any actual number, order, or sequence of such entities or operations.
Without further limitation, the use of the terms "comprising," "including," "having," or other like terms in this application is intended to cover a non-exclusive inclusion, such that a process, method, or article of manufacture that comprises a list of elements does not include additional elements but may include other elements not expressly listed or inherent to such process, method, or article of manufacture.
As in the understanding of the "examination guideline," the expressions "greater than", "less than", "exceeding", and the like are understood to exclude the present number in this application; the expressions "above", "below", "within" and the like are understood to include this number. Furthermore, in the description of the embodiments of the present application, the meaning of "a plurality of" is two or more (including two), and similarly, the expression "a plurality of" is also to be understood as such, for example, "a plurality of groups", "a plurality of" and the like, unless specifically defined otherwise.
In the description of the embodiments of the present application, spatially relative terms such as "center," "longitudinal," "transverse," "length," "width," "thickness," "up," "down," "front," "back," "left," "right," "vertical," "horizontal," "vertical," "top," "bottom," "inner," "outer," "clockwise," "counter-clockwise," "axial," "radial," "circumferential," etc., are used herein as terms of orientation or positional relationship based on the specific embodiments or figures, and are merely for convenience of description of the specific embodiments of the present application or ease of understanding of the reader, and do not indicate or imply that the devices or components referred to must have a particular position, a particular orientation, or be configured or operated in a particular orientation, and therefore are not to be construed as limiting of the embodiments of the present application.
Unless specifically stated or limited otherwise, in the description of the embodiments of the present application, the terms "mounted," "connected," "affixed," "disposed," and the like are to be construed broadly. For example, the "connection" may be a fixed connection, a detachable connection, or an integral arrangement; the device can be mechanically connected, electrically connected and communicated; it can be directly connected or indirectly connected through an intermediate medium; which may be a communication between two elements or an interaction between two elements. The specific meanings of the above terms in the embodiments of the present application can be understood by those skilled in the art to which the present application pertains according to the specific circumstances.
Referring to fig. 1 to 6, the present embodiment provides a micro code encryption method, in which the encryption process is a process of generating a micro code from data to be encrypted. As shown in fig. 2, wherein the first identifier and the second identifier may be geometric figures, such as five-pointed stars, circles, quadrilaterals, diamonds, hexagons, and the like. And whether the color is filled or not can be used as a second identifier which is different, the recognition difficulty can be reduced and the recognition efficiency can be improved through a simple geometric figure, and in other embodiments, the recognition can be other complex figures, characters, numbers, braille lattices and the like. The present embodiment is illustrated with a first identifier in number of one and a second identifier in number of ten. The method comprises the following steps:
step S101, input data to be encrypted is obtained, wherein the data to be encrypted comprises numbers, symbols, letters, chinese characters and the like; and encrypting the data to be encrypted according to an encryption rule to obtain a decimal digital character string. The encryption rule can only obtain decimal number character strings, for example, directly replacing symbols, chinese characters, letters and the like with decimal number character strings with the same number of bits. In some embodiments, the data to be encrypted may be converted into binary codes according to existing encoding rules, and then the binary codes may be converted into decimal codes. Of course, in order to improve the anti-interference and error correction capability, generally, after encryption using an encryption rule, a check number may be further set at the tail of the encrypted digital character string, so as to improve the error correction capability of the character string.
And then, step S102 is carried out to sequentially take values according to the numerical character string and the fixed bit number value rule, the obtained values are sequentially used as included angle information and distance information and are grouped, and each group comprises one included angle information and one distance information. If the number character string is twelve digits and the fixed digit is one digit, six groups can be obtained, each group contains included angle information of one digit and distance information of one digit, and if the included angle information of one digit cannot be divided, the included angle information of one digit is complemented with 0 to form a group. Then, in step S103, a preset first identifier is placed at the center position on the blank image; as shown in fig. 3. Typically, the blank image is a fixed size, generally square image, and in some embodiments, may be a circular image. And then place the first identifier in the middle of the image.
And then, step S104 is carried out, wherein the second identifiers of the preset second identifier information set are sequentially taken according to the group numbers of the included angle information and the distance information, and each second identifier is allocated with one group of the included angle information and the distance information. If the identifiers are fetched according to the sequence of the second identifiers, the second identifiers are placed on the blank image by taking the distance information as the distance information between the second identifiers and the first identifiers, and the included angle information is taken as the included angle information between the second identifiers and the next second identifiers and is used for the placement operation of the next second identifier position until all fetched second identifiers are placed on the blank image. If the first graph in the second identifier is a solid circle, the corresponding distance number is 5, and the angle number is 7. The distance information actually on the image is determined according to the actual situation, the minimum identifiable actual distance is taken as 1 unit distance (such as 10 px), and then the distance number is multiplied by the distance number (such as 5 is 50 px). The solid circular center is placed at 50px from the center of the first identifier, of course 0 is more specific, and in order to avoid covering the first identifier, encryption and decryption can be performed with 0 being 10. And the angle is also 1 unit (e.g., 5 °) based on the minimum angle that can be actually recognized. And multiplying the minimum angle by the actual angle number to obtain the actual angle, wherein the two minimum units are prestored in the encryption and decryption processes, and the encryption and decryption processes are consistent. The angle is the included angle of the connecting lines of the two second identifiers and the first identifier. Of course, the second identifier of the first should have an initial position of placement, such as may be placed directly above. And then the included angle is set in a set direction, such as clockwise or counterclockwise. This direction may be preset on both the encryption and decryption devices. Thus, after the second identifier is placed according to the distances and angles of all groups, the process proceeds to step S105, and the images of the first identifier and the second identifier are used as the microscopic code images. This completes the encryption of the string to the microscopic code. In one embodiment, the simple microscopic code generated is as shown in FIG. 3. Such a microcode has a large number of gaps in the middle thereof, and can be decoded as usual even when the gap region of the microcode is stained. The existing two-dimensional code is only stained in the interior, and the data identification is greatly influenced because the interior is a data area. The anti-fouling capability is improved relative to the two-dimensional code.
Specifically, in the identification process, namely, the decoding process of the micro code, as shown in fig. 6, a micro code decryption method is provided, which comprises the following steps: step S601 acquires input image data; such as the microcoded image of fig. 3. Then step S602 identifies the first identifier in the image data according to the preset first identifier information and identifies the position of the first identifier as the origin position (first identifier center position). Step S603, identifying a plurality of second identifiers in the image data according to a preset second identifier information set, that is, firstly identifying which second identifiers are second identifiers, and identifying a plurality of coordinate values of the plurality of second identifiers relative to the origin position; i.e. the location of the second identifier on the image is identified. And then, step S604 is carried out, according to the coordinate values and the origin position, the distance between each of the second identifiers and the origin is calculated, the connection is carried out, the included angle between the adjacent connection is calculated, the sequence value is obtained by arranging according to the sequence after the distance and the included angle are rounded, and the decoded value is obtained by adopting a preset decoding algorithm according to the sequence value. The rounding here is: obtaining an integer number after rounding according to the actual distance divided by the preset unit distance, obtaining an integer number after rounding according to the actual angle divided by the preset unit angle, and then starting to arrange numbers according to a first second identifier (the first second identifier in the second identifier set can be the first second identifier in the second identifier set, such as a solid circle in the drawing) and a preset sequence direction (such as a clockwise direction), so as to obtain a sequence value, and obtaining a decoded value by adopting a pre-stored sequence value decoding rule. The decoding algorithm here is the inverse of the above rule for obtaining the decimal digital encryption rule. Thus, a character string can be obtained. And can be practically applied according to the character string. The final number sequence is used for obtaining the character string through a decoding algorithm, and the character string can have more types instead of just numbers, so that the character string can be used in practice. The decryption process of the microcodes is completed through the whole process, and similarly, the microcodes can be decoded as usual when the gap areas of the microcodes are stained due to a plurality of gaps in the middles of the microcodes. The existing two-dimensional code is only stained in the interior, and the data identification is greatly influenced because the interior is a data area. The anti-fouling capability is improved relative to the two-dimensional code.
The encryption process of the invention can be independently stored in one device, and the decryption process can also be independently stored in one device, thus realizing independent encryption and decryption. Or in some embodiments, the encryption and decryption steps may be stored in a device at the same time, i.e. the data may be converted into a microscopic code, or the microscopic code may be converted into data.
Further, in order to further improve the anti-fouling recognition capability, as shown in fig. 4, the generated microscopic code image may be further arrayed on the image to form a code image having a plurality of microscopic codes. As shown in fig. 4, four images are shown after the array, so that only one image can be identified without smear. At this time, the influence of the second identifier of the other microscopic code on the image on the identifier to be recognized is avoided at the time of recognition. And the identification decryption is that, when the number of the first identifiers is more than one, an identification area is defined according to the average value of the distances between the two adjacent identifiers, the identification of the second identifier is carried out in the identification area, and the sequence value operation is carried out according to the second identifier identified in one identification area. The identification area is thus cut and then only identified in the identification area, so that the influence of the second identifier of the further first identifier on the current first identifier is avoided.
In some embodiments, if there is a microscopic loss in each of the different microscopic codes, then portions of the plurality of microscopic codes may be combined to complement one microscopic code. And when decrypting, the method further comprises the step of sequentially comparing the second identifiers in different identification areas, and if the second identifiers in the same position in different identification areas are missing, supplementing the missing second identifiers to the missing areas according to the identification areas with the second identifiers. This achieves a higher decryption capability of the corrupted microcodes.
In some embodiments, in the case of a change of the microscopic code, to further increase the data storage of the microscopic code, a sequence number is introduced to the second identifier and this sequence number is used as part of the encryption. Further, the second identifier has a sequence number, the obtained values are included angle information and distance information in order and the grouping includes the steps of: the obtained values are sequentially used as included angle information, distance information and second identifier number information and are grouped. The step of sequentially taking the second identifiers of the preset second identifier information set according to the group number of the included angle information and the distance information comprises the following steps: and sequentially taking the second identifiers of the preset second identifier information set according to the second identifier serial number information. That is, when grouping decimal strings, the number of grouping bits is increased by one bit, and the increased one-bit number is used to obtain the corresponding second identifier. If the original number is twelve digits, the distance and the angle of one digit are respectively taken and divided into six groups. After the serial number is added, each group respectively takes the distance, the angle and the serial number of one number, and only needs to be divided into four groups. The sequence number may be the first or last bit in each group. If the number in the first group is 5, the 5 th bit corresponding to the second identifier is a double-bar image. The dual-bar image is placed as the first second identifier image. And (5) placing in sequence. Thus, the information storage capacity is increased through the serial number of the second identifier, and more information is stored.
When decryption is performed at this time, the second identifier information set further includes a sequence number corresponding to the second identifier, and when the second identifier is identified, the second identifier information set further includes a sequence number identifying the second identifier, and according to the sequence number of the second identifier; the step of obtaining the sequence value by sequentially arranging the obtained sequence value after rounding according to the distance and the included angle comprises the following steps: and arranging according to the distance, the second identifier serial number and the included angle in sequence to obtain a sequence value. Since the direction is already determined and then the second identifier is used again for the sequence number, it is necessary to locate which of the first second identifiers is, which can be achieved by marking the first second identifier. If a straight line is connected between the first and second identifiers, it is known which is the first and second identifier, and the second identifier connected with the first identifier is identified as the first identifier when decryption. Or a small marking pattern is arranged beside the first second identifier, so that the first second identifier can be marked, or if the data volume is small, the second identifiers are small in number, a large blank exists between the first and the last second identifiers, and the first second identifier can be determined by the blank and the decryption direction (clockwise or anticlockwise).
When the distance is determined, as the picture can be enlarged or reduced, the actual distance can be confirmed by determining the size of the first identifier, for example, the distance can be directly determined according to the multiple of the size of the first identifier, and the size of the first identifier can be the diameter of the circle where the periphery of the first identifier is positioned. I.e. the measured distance between the second identifier and the first identifier, and then calculating the value of the distance from the first identifier. In some embodiments, a third identifier may also be appended, the third identifier being different from both the first identifier and the second identifier. Further, two identical third identifiers are taken, standard interval values of the two images are set to be used as a part of the images, and the two third identifiers are placed at specific positions (such as upper right corners) of the blank images. The third identifier has two functions, namely, the use of the unit distance is determined, the position of the center of the image, namely, the position of the first identifier is determined in turn, when the first identifier is stained, the position is identified through the third identifier, and then the position of the first identifier can be obtained according to the preset position relation of the third identifier in the image. Further, in decryption, if the first identifier is not recognized, the third identifiers of two of the image data are recognized directly according to the preset third identifiers, and the origin position of the first identifier is determined according to the positions of the preset two third identifiers in the image. Of course, when the image range is large, it is possible to recognize the origin positions of the plurality of first identifiers, and the origin position placed in the middle of the plurality of second identifiers may be selected. Thus, through the first identifier inside and the third identifier outside, double insurance identification on the original point position can be realized, and the anti-fouling capability is improved.
The schematic diagram of the invention is illustrated by using relatively large patterns, and in fact, the existing patterns have strong recognition capability, and can recognize very small patterns, so that the patterns can be made very small. In some embodiments, in the case of a larger data size, the present invention may further sequentially place the second identifiers after the first identifier is placed for one turn (i.e. the placed angle and the angle close to 360 degrees, and the placement will be greater than 360 degrees), and the remaining second identifiers are placed to the outer periphery of the placed first identifier in the order of the placed order (the same clockwise or counterclockwise order as the second identifier of the first turn), where the distance information plus the maximum distance of the first turn is the actual distance (e.g. the maximum distance of the first turn is 10, and the distance between the second identifier and the first identifier of the actual second turn is 14), and the first identifier is the origin of the included angle (the included angle is also the origin of the first identifier, and the included angle between the two adjacent second identifiers is the same as the second identifier of the first turn), as shown in fig. 5. If the second turn is full, it can be extended to the third turn and placed in this way. The position of the first second identifier of the second turn is determined based on the angle between the last second identifier of the first turn. This allows more information to be encrypted. And during decryption, determining the number of turns of the second identifier according to the distance between the second identifier and the origin and the distance between each turn of the second identifier (for example, the first turn is 1-10, the second turn is 11-20), and obtaining a sequence value according to the sequence of the turns and from the outer ring to the inner ring. If the sequence value of each circle can be calculated, the final sequence value can be obtained after the sequence values of each circle obtained by sequentially combining the outer circle with the inner circle.
The invention provides a microcode encryption system, which comprises a memory and a processor, wherein a computer program is stored in the memory, and the computer program realizes the steps of the method according to any one of the encryption embodiments of the invention when being executed by the processor. The encryption system of the invention realizes the encryption of data to the microcodes, and can also decode as usual when the gap area of the microcodes is stained because the microcodes have a plurality of gaps in the middle. The existing two-dimensional code is only stained in the interior, and the data identification is greatly influenced because the interior is a data area. The anti-fouling capability is improved relative to the two-dimensional code.
The invention provides a microcode decryption system, which comprises a memory and a processor, wherein a computer program is stored in the memory, and the computer program realizes the steps of the method according to any one of the decryption embodiments of the invention when being executed by the processor. The decryption system of the invention realizes the decryption from the microcodes to the data, and has stronger anti-fouling capability.
The invention can directly decrypt the picture data during decryption, or in some embodiments, the invention can be used for real-time photographing decryption, and the invention further comprises a camera, wherein the camera is used for acquiring the image data and transmitting the image data to the processor. Thus, the microcodes can be obtained and decrypted after photographing.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present invention is not limited thereby. Therefore, based on the innovative concepts of the present invention, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the invention.

Claims (9)

1. A microcode decryption method, comprising the steps of:
acquiring input image data;
identifying a first identifier in the image data according to preset first identifier information and identifying the position of the first identifier as an origin position;
identifying a plurality of second identifiers in the image data according to a preset second identifier information set, and identifying a plurality of coordinate values of the plurality of second identifiers relative to the origin position;
calculating the distances between the second identifiers and the origin according to the coordinate values and the origin position, connecting lines, calculating the included angles between adjacent connecting lines, rounding according to the distances and the included angles, and sequentially arranging to obtain a sequence value, and obtaining a decoded value by adopting a preset decoding algorithm according to the sequence value;
when the number of the first identifiers is plural, an identification area is defined according to the average value of the distances between two adjacent identifiers, the second identifier is identified in the identification area, and the sequence value operation is performed according to the second identifier identified in one identification area.
2. The method of decrypting a microscopic code according to claim 1, further comprising the steps of: if the first identifier is not recognized, the third identifiers of two of the image data are recognized directly according to the preset third identifiers, and the origin position of the first identifier is determined according to the positions of the preset two third identifiers in the image.
3. The method of claim 1, wherein the distance is rounded to a value obtained by rounding the distance between the center of the second identifier and the center of the first identifier divided by the distance between the centers of the two third identifiers.
4. The method of decrypting a microscopic code according to claim 1, further comprising the steps of: and sequentially comparing the second identifiers in different identification areas, and if the second identifiers in the same position in different identification areas are missing, supplementing the missing second identifiers to the missing areas according to the identification areas with the second identifiers.
5. The method of claim 1, wherein the second identifier information set includes a sequence number corresponding to the second identifier, and the identifying the second identifier further includes identifying the sequence number of the second identifier according to the sequence number of the second identifier; the step of obtaining the sequence value by sequentially arranging the obtained sequence value after rounding according to the distance and the included angle comprises the following steps:
and arranging according to the distance, the second identifier serial number and the included angle in sequence to obtain a sequence value.
6. The method of claim 1, wherein the number of turns of the second identifier is determined according to the distance between the second identifier and the origin and the distance between each turn of the second identifier, and the sequence value is obtained by arranging the turns in sequence from the outer circle to the inner circle.
7. The method of claim 1, wherein the distance is rounded to a value obtained by rounding the distance between the center of the second identifier and the center of the first identifier after dividing the distance by the diameter of the circle on which the periphery of the first identifier is located.
8. A microcode decryption system, characterized by: comprising a memory, a processor, said memory having stored thereon a computer program which, when executed by the processor, implements the steps of the method according to any of claims 1 to 7.
9. The microcode-encoding system of claim 8 wherein: the camera is used for acquiring image data and transmitting the image data to the processor.
CN202111492450.3A 2021-12-08 2021-12-08 Microcode decryption method and microcode decryption system Active CN114169353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111492450.3A CN114169353B (en) 2021-12-08 2021-12-08 Microcode decryption method and microcode decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111492450.3A CN114169353B (en) 2021-12-08 2021-12-08 Microcode decryption method and microcode decryption system

Publications (2)

Publication Number Publication Date
CN114169353A CN114169353A (en) 2022-03-11
CN114169353B true CN114169353B (en) 2023-07-04

Family

ID=80484235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111492450.3A Active CN114169353B (en) 2021-12-08 2021-12-08 Microcode decryption method and microcode decryption system

Country Status (1)

Country Link
CN (1) CN114169353B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7270277B1 (en) * 2004-05-21 2007-09-18 Koziol Jeffrey E Data encoding mark for placement in a compact area and an object carrying the data encoding mark
CN107886147A (en) * 2017-09-26 2018-04-06 朱恩彤 The preparation method of ring code and recognition methods
CN108985421A (en) * 2018-08-14 2018-12-11 上海掌门科技有限公司 The generation method and recognition methods of encoded information
CN111461747A (en) * 2020-03-30 2020-07-28 深圳前海量子云码科技有限公司 Production method and system for canned product traceability anti-fleeing codes
CN111587445A (en) * 2017-07-20 2020-08-25 拉瓦艾迪私人有限公司 Security tag

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7270277B1 (en) * 2004-05-21 2007-09-18 Koziol Jeffrey E Data encoding mark for placement in a compact area and an object carrying the data encoding mark
CN111587445A (en) * 2017-07-20 2020-08-25 拉瓦艾迪私人有限公司 Security tag
CN107886147A (en) * 2017-09-26 2018-04-06 朱恩彤 The preparation method of ring code and recognition methods
CN108985421A (en) * 2018-08-14 2018-12-11 上海掌门科技有限公司 The generation method and recognition methods of encoded information
CN111461747A (en) * 2020-03-30 2020-07-28 深圳前海量子云码科技有限公司 Production method and system for canned product traceability anti-fleeing codes

Also Published As

Publication number Publication date
CN114169353A (en) 2022-03-11

Similar Documents

Publication Publication Date Title
US10878213B2 (en) Two-dimensional code and method, terminal, and apparatus for recognizing two-dimensional code
TWI746882B (en) Two-dimensional barcode, printed publication, generating device, and information processing method
EP3138048B1 (en) Encoded cells and cell arrays
JP5229653B2 (en) Two-dimensional code, two-dimensional code generation method, computer-readable program for displaying two-dimensional code, authentication method using two-dimensional code, and information providing method using two-dimensional code
CN104657768A (en) Colorful three-dimensional code structure and colorful three-dimensional code reading method
CN101159028B (en) Multiple graphics matrix type two-dimension bar code implementing method and device
SG175103A1 (en) Two-dimensional array code
CN103927572B (en) By coding segment to form the method and apparatus of dot pattern
CN114169353B (en) Microcode decryption method and microcode decryption system
CN114169482B (en) Microcosmic code encryption method and microcosmic code encryption system
CN105069498B (en) The colour-enciphered method and device of Quick Response Code
CN111428532B (en) Coding and decoding method capable of encrypting three-dimensional code
US10997482B2 (en) Two-dimensional cryptographic poly-chromatic poly-digital code
CN103927575B (en) By coding pattern to form the method and device of dot pattern
CN108734048A (en) Various dimensions Quick Response Code based on proprietary code generates and interpretation method
US8672226B2 (en) Decoding a physical image
CN114186655B (en) Identity application method and system based on microcosmic code
CN111222610B (en) Coding and decoding method and system for double-ID two-dimensional code micro-code element
US10977466B2 (en) Multi-dimensional cyclic symbols
JP6617302B1 (en) Optical code, optical code generation method and program thereof, and optical code reading method and program thereof
KR102066391B1 (en) Data embedding appratus for multidimensional symbology system based on 3-dimension and data embedding method for the symbology system
CN111291583A (en) Circular two-dimensional bar code decoding method
CN114202044A (en) Anti-counterfeiting application method and system based on microcodes
CN112862045B (en) Encryption graphic structure, encoding method and device, and identification method and device
CN114254719B (en) Anti-counterfeiting two-dimensional code generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant