CN1255757C - Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code - Google Patents

Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code Download PDF

Info

Publication number
CN1255757C
CN1255757C CN01132714.6A CN01132714A CN1255757C CN 1255757 C CN1255757 C CN 1255757C CN 01132714 A CN01132714 A CN 01132714A CN 1255757 C CN1255757 C CN 1255757C
Authority
CN
China
Prior art keywords
code
coding
character
eigenwert
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN01132714.6A
Other languages
Chinese (zh)
Other versions
CN1356665A (en
Inventor
肖祥省
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN01132714.6A priority Critical patent/CN1255757C/en
Publication of CN1356665A publication Critical patent/CN1356665A/en
Application granted granted Critical
Publication of CN1255757C publication Critical patent/CN1255757C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to realization of code multidimensional counterfeiting prevention of characteristic codes representing the positions and the number of deformed characters, which belongs to the field of counterfeiting prevention. Counterfeiting prevention of digital codes and strict checks of the digital codes are neglected in traditional code counterfeiting prevention. Characteristic values of codes are calculated after the codes are encrypted; the output shapes of partial characters of the codes are modified according to the characteristic values; the number and the positions of the partial characters are determined by the characteristic values; an anti-counterfeiting function is added to the codes. The codes can be checked at multiple stages by a computer and a network system with high precision, thereby realizing code multidimensional counterfeiting prevention. The method can be used for merchandise counterfeiting prevention and other code counterfeiting prevention or digital code verification.

Description

With the position of deformed characters and the commodity multidimensional method for anti-counterfeit of number presentation code eigenwert
The present invention relates to a kind of commodity multidimensional method for anti-counterfeit, utilizing in advance, seal is located at the anti-fake code on the article, the true and false that the consumer just can accurately sign these article.
Traditional method for anti-counterfeit is more, and comparatively popular method for anti-counterfeit has that antiforge laser holographic, watermark recovery are false proof, texture anti-fake and code telephone service.Because the identification of image information is difficult to be grasped by common people, along with popularizing of computing machine and phone, increasing product has been selected digital code anti-false for use.It is false proof that present many method for anti-counterfeit belong to one dimension, and its antifalse effect is all undesirable.Digital code anti-false provides false proof measure for commodity, but has ignored the false proof and digital own strictness check to self number.Though some company's logarithmic code has carried out encryption, can prevent that other people from decoding digital element.But in order to reduce the effective length of coding, many security codes only are provided with a check bit, with weighted factor method calculation check and (seeing the formula (4) of back for details), and verification and get remainder to 10 and promptly obtain its check code.The non-constant of mode effect of this set check code, any one character is made mistakes, if its with right value poor, multiply by its corresponding factor long-pending be 10 multiple, will ignore the variation of this character value, let alone can find the possibility of many places mistake.Another kind of computing method are that the value of weighting factor all is made as 1, be equivalent to the numerical value addition of each character promptly obtain verification with.Though the method can be found the variation of a certain bit value, can't find the exchange or the rightabout synchronous variation of any two character positions, this all provides convenience for the imitator.Be that each method of calibration all has its defective, the method of being used alone can't guarantee digital correctness own, only depend on the uniqueness of coding to go to judge the validity of security code, thereby can the out-trick check code check of many code violations is closed, the phenomenon that causes security code to fasten one person's story upon another person, networking enterprise is many more, and false proof database is big more, and this string sign indicating number phenomenon is just serious more.In addition, unified system mark, the paste position of marker is extremely lack of standardization, and anti-fake identification mark separates with treating false proof article, in kind being stealthily substituted, anti-fake identification mark is also at all harmless, and these defectives have seriously restricted the effect of present each method for anti-counterfeit.Along with electronic technology and development of computer network, the trend of product information digitalization is more and more obvious, as digital I.D., digital signature, digital film etc., all the validity of coding is had higher requirement.
The object of the present invention is to provide a kind of anti-fake code of inquiring about discrimination, can not altering with phone, Internet access or mobile phone short message.To identify that this complicated technology behavior of article genuine-fake is converted into the simple operations of checking coding validity.
With the position of deformed characters and the commodity multidimensional method for anti-counterfeit of number presentation code eigenwert, it is generated by coding and coding checking two parts are formed.It is to treat false proof article for each to produce only, as to have an anti-counterfeiting performance coding that coding generates, promptly original coding has been carried out a series of processing: add check bit, encrypt, ask for the eigenwert of encrypting the back coding, and determine to treat the position and the number of deformed characters with eigenwert; Sign indicating number is directly printed the key position that is located at trade mark or treats false proof article, and shape or character types exported in the character that changes some position in the sign indicating number when printing sign indicating number, and these characters promptly are called deformed characters.Thereby changed the face shaping feature of coding, formed final anti-fake code, added that tectal protection promptly becomes anti-fake identification mark.The coding verification system is made up of phone, computer network, server and central database, and the coded message unification of each article is kept in the database.System tests to the anti-fake code of user's input according to given flow process.Inspection content has the position of deformed characters and the uniqueness of number, check code and coding.Principal character is that sign indicating number contains deformed characters, and the position of deformed characters is relevant with the expression mode with the formation of sign indicating number with number; The coding verification system can carry out multistage check to the validity of coding.Concrete treatment scheme is as follows:
One, coding product process
Coding can be the coding of commodity or various important certificates, for the convenience of describing, and selected here commodity code.Whole coded message from left to right is producer's numbering, productive year, commodity sequence number, check code and five parts of condition code successively.2 check bit are set, and the generation of check code was promptly finished in the digital verification after being used to decipher before encrypting; The part deformed characters is used for the eigenwert of presentation code in last character and the coding, and it is calculated by the coding after encrypting, and is used for the check of input code.Totally 20 characters of whole commodity code is long, and each key element is all used the decimal number word code.Producer numbers with 6 character representations; It is long that the commodity sequence number is provided with 9 characters; In the commodity production time,, take two characters with representing with difference in 2000 then.Annotate: just set coding elements and length for convenience of description, can not think limitation of the present invention.
One), adds check bit.According to producer's numbering, time and the commodity sequence number of user's input, generate 17 original codings of corresponding goods successively.Be not the check of directly facing user's input code, so weighting factor all is changed to 1, the computing method of its check code such as formula (1) add 2 bit check decoding post-encoding length and become 19 by 17 herein.The digital verification of two bit check sign indicating numbers after as data decryption is for the indirect review user imports digital correctness, can prevent to decipher simultaneously the phenomenon of makeing mistakes again and take place.
S=(∑Ai)Mod?100………………………………(1)
In the formula (1): i----represents the serial number that character is numbered from left to right, from 1 open numbering;
Ai----represents the numerical value of character on the i position;
Mod----represents to get remainder.
Two), encryption.Promptly original coding and two bit check sign indicating number unifications are carried out encryption.The purpose of encrypting is in order to prevent that other people from decoding the element and the shared character length of each key element of coding according to the coding composition characteristic.Ripe at present encryption method is more, there is multiple algorithm selective, in this design one simple encryption method, its implementation procedure is the serial number that earlier value of this character is added this character position, add the result after the last bit encryption, get surplusly then to 10,, see formula (3) as the numerical value of this position after encrypting.If first character, owing to there is not last position, its cryptographic algorithm is seen formula (2).
D1=(S1+1) Mod 10; First character ... (2)
Di=(Si+i+Dj) Mod 10; I from 2 to 19, j=i-1 ... (3)
In the formula (3): i----represents the serial number that character is numbered from left to right, from 1 open numbering;
Si----represents the initial value of character on the i position;
Di----represents to encrypt the numerical value on the i position, back.
Utilize above algorithm can finish encryption from left to right to whole coding.With the number after this algorithm for encryption, except a rightmost character, the change of other any one character value can influence it and the variation of character value thereafter simultaneously.
Three), ask for eigenwert, the printing false-proof coding of coding.Extract the composition characteristic of encoding with algorithm, its computing method and parameter arrangement changed with producer and productive year.With the eigenwert of unconventional mode presentation code, and its corresponding relation difference of different producers.When eigenwert is checked, can strictly check the element of coding and the validity of himself from many aspects, thereby the multidimensional that realizes coding is false proof like this.It is the key that this method is different from other digital code anti-false.Because each producer uses different parameters, thereby anti-fake code can generate, make anti-fake identification mark in real time in that commodity production is on-the-spot,, makes it and treats that false proof article more closely combine as carrier with the key position of trade mark or article.Unconventional representation feature value is that eigenwert is divided into digital and special two parts: a certain position of digital part character pair value, be placed on scrambled at last; Special part is that the variation with minority character output shape in the coding comes the remainder of representation feature value.For numerical character, its variation pattern of exporting shape has: the change of font (changing boldface type, italics into as Song typeface), band underscore, change color, band square frame, band circle, half-angle character, change type matrix or the combination with one another between them.Be to come the part of representation feature value in a word, but do not change the represented concrete numerical value of former character with the variation of character face shaping or the difference of character types.Ask for the eigenwert of encrypting the back coding with the weights method, for convenience of explanation, need to set value, expression mode and the computing formula of some parameters, these information can not be thought limitation of the present invention.Its treatment scheme is as follows:
The weights of each group of first step setting.The setting of weights is relevant with commodity production producer, and promptly different manufacturers uses different weights sequences.With one or two character is a group, and the weights of each group are set.The former need be provided with 19 weights; The latter needs to add one 0 at the end of coding in advance, is one group with two characters again and divides into groups, and is divided into into 10 groups.With the latter is example, and the weights of selected certain factory are: 2,4,6,3,1,4,2,5,3,1.
Second step was asked for eigenwert.Multiply each other with the weights of each group character numerical value with corresponding group, and the product addition, computing method such as formula (4) have promptly obtained the eigenwert of coding.
S=∑(Gi×Wi)……………………………………(4)
In the formula (4): i----represents the serial number organized from left to right, from 1 open numbering;
Gi----represents the numerical value of i group;
Wi----represents the weights of i group.
The 3rd step characteristics of decomposition value.Can represent and S with different group modes with different numeral systems.For convenience of explanation, be decomposed into example with the decimal system, a position character of getting earlier with S is added on the last of encrypted code.Turn left from the right side, be one group with 9 characters, 20 characters are divided into into 3 groups, and from left to right every group character number is respectively 2,9,9.Get the kilobit of eigenwert, if numerical value is not revised greater than 1; Otherwise this numerical value is added that 1 begins the location revision of counting (down with) as turning right from the first left character.Then take out hundred bit value of eigenwert, if this number equals 9 and do not make an amendment; Otherwise add that with 3 resulting numerical value is as treating location revision.Take out the ten digit value of eigenwert at last, if this number is 9 also not make an amendment; Otherwise deduct this numerical value with 20, wait to revise the position of character as last, so promptly obtain remain to be revised the position of character.
The 4th step printing false-proof coding.Select trade mark or treat the carrier of the key position of false proof article as sign indicating number, the location revision that calculates according to the front, outputing to when waiting to revise character, promptly the output shape or the character types of this character are controlled, thereafter to the next still normally output of waiting to revise between the character of character.Remove to revise next one character to be revised according to the method for front again, up to handling whole modification objects, thereafter or character therebetween still normally output.In the coding output print, promptly finish the variation that shape or character types exported in the part character in the coding like this, finished the expression of condition code, obtained the pairing anti-fake code of these article.The way of output of sign indicating number can be the combination of character or character and bar code.
Four), increase overlayer.The security code of output can determine whether to add overlayer according to anti-counterfeiting object or deposit position.Add that tectal protection promptly becomes anti-fake identification mark; just can prevent effectively that other people from directly seeing storewide all coded messages; even destroy the overlayer of commodity code; also can only see the coding of part commodity; duplicate the anti-fake code that he sees, can't infer the element, encryption mechanism, the acquiring method of eigenwert, the composing law of weighting factor, many-sided contents such as checking computations rule of check code of sign indicating number according to existing sign indicating number.
Two, coding checking flow process
In order to verify the article genuine-fake that has above coding, also need the checking work that a system finishes coding, could determine the correctness of sign indicating number, infer thus its true and false of corresponding article.The checking of coding has three kinds of implementations: phone, SMS and Internet.Unified service centre and the central database set up of three is in order to preserve each article code information and its request for information that has come into operation.The treatment scheme basically identical of three kinds of inquiry modes, main difference is on the front end services instrument: one is used plain old telephone or mobile phone; Another uses Internet access.Background process is all the same---promptly provide service for them with same central database.For Help by Phone, an inquiry workstation should be set in each area code, be used to serve the simple inspection of local Help by Phone, input code and carry out exchanges data etc. with the server of service centre.The network structure of security code Help by Phone is seen accompanying drawing, and treatment scheme is as follows:
1, the user dials local anti-counterfeiting phone number, computer automatic off-hook;
2, the subscriber-coded typing mode of voice suggestion waits for that the user imports anti-fake code;
3, the validity of user inputs character number is judged, judge that promptly the character number of being imported equals 20? it is wrong to be not equal to the coding number of then pointing out the user to import, returns 2; Otherwise change next step;
4, to the processing of deformed characters:
A, voice suggestion user import the pairing position of deformed characters (1 open numbering from the left side), import the deformed characters present position successively.Be one group with two digits during its position input, two fronts of less than, 0 the mode of mending is imported, and finishes input with ' # ';
The content that B, voice suggestion user are imported waits for that the user confirms its correctness.If the user answers ' 1 ' expression correctly, change next step; Other numeral is then represented input error, requires the user to re-enter, and promptly returns A or finishes service;
5,20 figure place sign indicating numbers are added the numerical value and the workstation numbering of the deformed characters position that the user imports, after encrypting, take the server at affair center, by the responsible coding check thereafter of server;
More than handle, all carry out by the control of inquiry workstation.Below finish by the server of service centre.
6, server receives digitally, and the number that receives is decrypted, the data after the deciphering are carried out the correctness inspection, and check whether this inquiry workstation is arranged, talented commentaries on classics next step; Otherwise do not return any information, server promptly withdraws from service;
7, preserving the 20th character earlier, is this disposal 0 then, and 20 characters are divided into groups by two one group, and 10 groups weights from left to right are successively: 2,4,6,3,1,4,2,5,3,1; Press formula (4) computation of characteristic values of front, and its units value and the 20th character of being preserved are checked, change next step if both are consistent; Otherwise return " vacation ", server withdraws from this service;
8, the high position of characteristics of decomposition value is asked for position and the number of respectively revising character.The data that result of calculation and user provide are checked one by one, all consistently changeed next step; Otherwise return " vacation ", server withdraws from this service;
9, coding is decrypted, promptly reduces preceding 19 characters.Decipher and appropriate to the occasionly turn left from the right side, it is the inverse operation of formula (2) and (3), and its algorithm is seen formula (5) and (6).Use formula (1) to calculate the check code of preceding 17 characters after the deciphering again, result of calculation and the 18th and 19 two character are checked, promptly check the check code after the deciphering.Commentaries on classics in full accord next step; Otherwise return " vacation ", server withdraws from this service automatically;
S1=(10+D1-1) Mod 10; First character ... (5)
Si=(30+Di-i-Dj) Mod 10; I from 2 to 19, j=i-1 ... (6)
In the formula (6): i----and last same;
Si----represents the numerical value after the reduction of i position;
After Di----represents to encrypt, i.e. numerical value on the preceding i of the reduction position.
10, Help Center's database, does inspection have this article code and was inquired about? the coded message of these article is not then returned the sign of " nothing ", and server withdraws from this service; This article code is arranged and do not inquired about, record time and date of inquiry this time then, and return " very " and indicate that this pairing inquiry times of encoding is changed to 1, and server withdraws from this service; This article code is arranged but by being inquired about, then return time, date true and that inquired about for the first time, simultaneously pairing, the total inquiry times of this article code is added 1, server withdraws from this service;
More than being to be responsible for processing by central server, is the result that the response of inquiry workstation is returned below.
11, the inquiry workstation carries out corresponding voice response according to the data that receive to the user, several possibilities is arranged: overtime; False; Do not have; Very; True but quilt was inquired about;
12, the prompting user continues to inquire about or withdraw from, and answers " 1 ", returns 2 and continues; Otherwise withdraw from.
Adopt the advantage of this anti-fake code to be:
1, is difficult to forge.Coding contains the deformed characters of indefinite number and position, and not only the position of deformed characters is formed relevant with coding; And its number is also relevant with the coding composition, is coding itself and is provided with antiforge function, is different from the anti-fake code that digital character is formed fully.Other has being provided with because of type of items and manufacturer of a plurality of parameters different, and other people are difficult to decode formation, argument sequence and the corresponding relation of sign indicating number.Even be decrypted or divulge a secret, also only influence the antifalse effect of single product, will never feed through to the false proof of other products.
2, be easy to identification.The consumer only need import whole anti-fake code to the computer Recognition database server by phone, online computer or SMS, database server can carry out strictly multistage check to the validity of security code, thus accurately determine its true and false of corresponding article.
3, overcome the defective of existing digital code anti-false, had the false proof function of multidimensional.Existing digital code anti-false, its security code is formed by the digital character of fixed length, is altered by the people easily; Encode self testing accuracy is low, objectively provides convenience for the fake producer; Moreover anti-fake identification mark sticks on the packing box of commodity but not treats false proof article itself, also for the fake producer more than one yard with providing convenience.Eigenwert with the deformed characters presentation code, the calculating parameter of eigenwert is all relevant with type of items and manufacturer with the expression mode, it integrates the validity check of coding element and number self, and its anti-counterfeiting performance exceeds the false proof scope of one dimension, has the false proof function of two dimension.The validity of logarithmic code is carried out two level testings, and its verify error can be kept various invalid codes outside of the door less than 0.12 ‰.Encryption measures is arranged and, realized the false proof of the 3rd aspect of encoding because of the different a plurality of parameter settings of factory.Coding is delivered to central server, and server will be checked the uniqueness of coding, thereby realize the false proof of the 4th aspect.Generate anti-fake code in real time, make anti-fake identification mark by article manufacturer oneself, utilize trade mark or treat the carrier of the key position of false proof article, can make full use of the anti-counterfeiting characteristic that article itself are had, thereby realize the integrated anti-counterfeit of article as security code.Need not decals, security code and material object combine together, and other people can't steal the beams and change the pillars; Both reduce centralized system and marked existing a lot of intermediate link, stopped the possibility that security code is stolen and divulge a secret again, also greatly reduced the false proof cost of Individual Items.
4, reduce the length of coding, but increased the decoding difficulty.With the eigenwert of the deformed characters presentation code of indefinite number and position, reduced effective length, printing area and the storage space of coding; Reduce the user and imported the probability that number is made mistakes; Each character is increased to three-dimensional by two traditional dimension attributes.Traditional digital code anti-false only uses encryption mechanism protection security code, and the correctness of only removing test code itself with simple check code; And have the anti-fake code of deformed characters, except using cryptographic means, also have the composition of coding itself more complicated, use the eigenwert of unconventional mode indication code and the validity of multiple mode test code self again, thereby having increased the difficulty that coding is decrypted greatly, the fake producer is duplicating effective code only.
5, can in time grasp the personation situation of each article.Owing to preserve the number of times that each article code is repeated to inquire about in the database, be its situation of being palmed off of deducibility in view of the above, and can find the main market of fake products.
Embodiment:
In order to further specify this anti-fake code, now the present invention is illustrated in conjunction with example.This example only is used for explaining, can not thinks limitation of the present invention.
Suppose that producer's numbering is 01, No. 06 commodity that calendar year 2001 produces, its coding generation and proof procedure are as follows:
One, coding generates
Generate the original coding of these commodity according to the numerical value that provides above: 00000101000000006.
By formula (1) calculates its check code, and coding promptly becomes 19 by 17: 0000010100000000608.
To its encryption, coding becomes with cryptographic algorithm: 1360574544570495863.
The eigenwert of calculation code is according to the position of deformed characters in the definite coding of eigenwert.With five characters is that one group of last anti-fake code of exporting is: 1,360,574,544 57,049 58636 or 1 3605 7454 45 704958636 or 1 605 7,454 5 049 58636 or 13,605 74544,57,049 58636 or 1 3. 6057454 4. 5 7. 49 58636 etc., the deformed characters in can representing to go here and there with multiple mode in a word.It is directly printed the key position that is located at trade mark or treats false proof article, i.e. generation has false proof and coding that can't forge, adds that tectal protection promptly becomes anti-fake identification mark.
Two, coding checking
So that be verified as example with phone, the consumer buys the commodity that have this anti-fake identification mark, scrapes overlayer off or destroys its packing material and can see the pairing anti-fake code of these article.The consumer puts through local anti-counterfeiting phone, computer automatic off-hook, the digital input method of voice suggestion user.The user is by prompting input " 13605745445704958636# ", and character number equals 20, checks that character number is correct.Voice suggestion user " the character present position that input has font to change is from first left character 1 open numbering " waits for user's input, and the user imports " 021012# " successively.The result that the voice suggestion user imported just now, user's input " 1 " confirms that input is correct, then send server the data of user's input and inquiry workstation numbering (representing with XXXXX), the coded sequence that send this moment is: " 13605745445704958636021012XXXXX ".
Central server receives digital, utilize the eigenwert of formula calculation code, and with actual reception to content compare, both consistent servers can be to its deciphering reduction, remove Help Center's database, whether this Item Number and its request for information etc. are arranged according to reduction result, return Query Result according to actual conditions and send the inquiry workstation.
Workstation is informed the true and false of this anti-fake code of user according to the result who returns with the mode of voice.

Claims (5)

1, a kind of phone that utilizes, Internet access or mobile phone short message are inquired about the commodity multidimensional method for anti-counterfeit of discriminating, it is characterized in that: treat false proof commodity unification coding is set, ask for the eigenwert of encrypting the back coding with the weights method, decompose this eigenwert according to numeral system of selecting for use and expression mode, subtracting one with selected numeral system value divides into groups as the coding of block length after to whole encryption, one of every group of character pair value, the no corresponding character of certain value in the group specified, a character in all corresponding group of other value, represent corresponding relation between them by the output shape of revising these characters, thereby generate the deformed characters coding that contains indefinite number and position, it is directly printed the key position that is located at trade mark or treats false proof article, make each article have an anti-fake code that only belongs to it; Original coding and its query State unification are delivered in the database of coding verification system; The consumer buys the commodity that have this anti-fake code, has only and destroys the overall picture that its integrality just can be seen this anti-fake code; By means of communication commonly used, the consumer can set up with the coding verification system and get in touch, the number that it provides according to the user, ask for its eigenwert with the weights method, determine yard position and the number of internal strain character according to numeral system that is adopted and expression mode, and the physical location of the deformed characters that is provided with the user contrasts one by one, confirm the input code deciphering of ability in full accord to the user, the calculation check sign indicating number, and check code with the deciphering after end double figures value compare, confirm the uniqueness inspection that just enters coding in full accord, promptly check validity and its request for information of this coding by database server, successfully inquiry can be revised corresponding Status Flag at every turn; System can be automatically determines running route, responds user's request with corresponding voice or short message according to comparing result in whole checkout procedure, and the user knows the true and false of its commodity of holding by this.
2, according to the described commodity multidimensional of claim 1 method for anti-counterfeit, it is characterized in that: coding contains the deformed characters of indefinite number and position, these characters are different from other character in the sign indicating number aspect face shaping or character types, the part of these deformed characters character pair values, self verifying correctness is used to encode.
3, according to the described commodity multidimensional of claim 1 method for anti-counterfeit, the descriptor of existing article had check code and eigenwert again in its feature also was to encode; Adopt the weights method to ask for eigenwert, exist corresponding relation between the expression mode of eigenwert and the selection of weights and producer's numbering and the product type.
4, according to the described commodity multidimensional of claim 1 method for anti-counterfeit, its feature is that also the expression mode of eigenwert adopts numeral and non-numeric combination; Deformed characters in the nonnumeric part correspondence code, it can select for use different numeral systems, group mode and and the deformed characters position between corresponding relation.
5, according to the described commodity multidimensional of claim 1 method for anti-counterfeit, its feature also be the to encode number and position of internal strain character all is not the constant of fixing, they with eigenwert ask for parameter, algorithm is relevant with the expression mode, hidden the element and the regularity of distribution of sign indicating number.
CN01132714.6A 2001-09-01 2001-09-01 Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code Expired - Fee Related CN1255757C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN01132714.6A CN1255757C (en) 2001-09-01 2001-09-01 Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN01132714.6A CN1255757C (en) 2001-09-01 2001-09-01 Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code

Publications (2)

Publication Number Publication Date
CN1356665A CN1356665A (en) 2002-07-03
CN1255757C true CN1255757C (en) 2006-05-10

Family

ID=4671530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN01132714.6A Expired - Fee Related CN1255757C (en) 2001-09-01 2001-09-01 Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code

Country Status (1)

Country Link
CN (1) CN1255757C (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609330B (en) * 2012-02-06 2015-05-20 中国农业银行股份有限公司 Document number generating method and document number generating system
CN104376352B (en) * 2013-08-14 2017-06-27 深圳正峰印刷有限公司 The production method and its generation device of false proof plating
CN103778352B (en) * 2014-01-28 2017-02-01 福建伊时代信息科技股份有限公司 Electronic evidence generation and verification method and device as well as electronic evidence generation system
CN106339881A (en) * 2016-08-24 2017-01-18 莫小成 Commodity information anti-counterfeiting method, commodity information anti-counterfeiting device and terminal
CN108848164B (en) * 2018-06-15 2022-02-25 广州视源电子科技股份有限公司 Display device connection method, display device and system
CN110392124B (en) * 2019-06-11 2022-04-08 广州视源电子科技股份有限公司 Method, device and system for generating communication code of electronic equipment and electronic equipment
CN111740830B (en) * 2020-08-12 2020-12-11 科大讯飞(苏州)科技有限公司 Information encryption and decryption method and device, information processing equipment and storage medium
CN113052616A (en) * 2021-03-15 2021-06-29 北京金和网络股份有限公司 Cold chain product tracing method, device and system

Also Published As

Publication number Publication date
CN1356665A (en) 2002-07-03

Similar Documents

Publication Publication Date Title
US7580895B2 (en) Product protection gateway and method for checking the authenticity of products
US6807634B1 (en) Watermarks for customer identification
CN101201886A (en) Three-he-code for recognizing commodity
CN106850187A (en) A kind of privacy character information encrypted query method and system
CN101082950A (en) Software encrypting registration piracy-preventing method
CN1255757C (en) Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code
US20050038774A1 (en) System and method for committing to a set
CN101553827A (en) Marking processing system for article management code, code judging system, article management system, method for marking article management code, code judging method and information displaying object
CN111461751A (en) Block chain-based house property information chain organization method, historical state tracing method and device
CN106649360A (en) Data repeatability check method and apparatus
CN103824102B (en) A kind of two-dimension code anti-counterfeit encryption method
CN113849783A (en) Structured data label watermark tracing method based on state encryption
CN113065151A (en) Relational database information security enhancement method, system, terminal and storage medium
CN106953880A (en) Data processing method and system, sub server and main server
CN1702669A (en) Digital short message counterfeit technique
CN111311284A (en) Cosmetics traceability platform system based on block chain
CN115331241A (en) Method for generating and identifying anti-counterfeiting seal of unique ID ticket
CN105005905A (en) Generating and examination method and system for printing product with traceable anti-counterfeit medallion plate texture
CN112149186B (en) Data tamper-proofing method and system based on abstract algorithm
CN100486156C (en) Forming and verifying system for bill anti-fake code
CN113902456A (en) Product anti-counterfeiting method and device
CN100583113C (en) Magic square digital antifake method and its antifake system
CN113010865A (en) Big data basic component safety management method and system of intelligent education platform
CN111507448A (en) Commodity anti-counterfeiting calculation method based on block chain
CN201465180U (en) System by using digital encryption identification to prevent counterfeiting to commodity

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C57 Notification of unclear or unknown address
DD01 Delivery of document by public notice

Addressee: Xiao Xiangsheng

Document name: Notification to Pay the Fees

C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee