CN1588847A - Random doped material common key cipher anti-fake method - Google Patents
Random doped material common key cipher anti-fake method Download PDFInfo
- Publication number
- CN1588847A CN1588847A CN 200410056939 CN200410056939A CN1588847A CN 1588847 A CN1588847 A CN 1588847A CN 200410056939 CN200410056939 CN 200410056939 CN 200410056939 A CN200410056939 A CN 200410056939A CN 1588847 A CN1588847 A CN 1588847A
- Authority
- CN
- China
- Prior art keywords
- random
- numeral
- key
- dopant material
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
Abstract
This invention relates to a random doped material shared key ciphered code anti-false method including method of randomly doping identification materials to generate a anti-false verifying digit and a method of combining an identification material with ciphered code of the verifying digit to form anti-false identification. The identifying material composed of opaque substance randomly scattered inside of a transparency is illuminated to generate a dot pattern to be digitalized to generate a verification digit to be operated by a public key ciphered algorithm together with the ciphered key of a manufacturer to a generate ciphered code to be combined with the random doped identifying material to form anti-false identification.
Description
Technical field
The method for anti-counterfeit that the present invention relates to identify belongs to information security technology, is specifically related to a kind of public key cryptography of dopant material at random method for anti-counterfeit, belongs to the International Classification of Patents H04L9/14 technical field of " using special key or algorithm ".
Background technology
General in the world public-key cryptosystem respectively has the characteristics of oneself, and advantage is separately arranged in different application scenarios.In anti-counterfeiting mark, general anti-counterfeiting mark is that in fact result can copy to the processed of identification image or numeral, and antifalse effect is not good.
Summary of the invention
Purpose of the present invention is to overcome deficiency of the prior art, and provide a kind of will be at random dopant material and public key algorithm combines, be the dopant material public key cryptography method for anti-counterfeit of a kind of method for anti-counterfeit that in fact can't duplicate-at random.
Technical scheme of the present invention is as follows.
A kind of public key cryptography of dopant material at random method for anti-counterfeit is a kind of method for anti-counterfeit that is used to identify, and comprises marking materials and password in generation, making and the identification marking, and it is characterized in that: its concrete generation, manufacturing process comprise:
The 3 D antiforge of a, the inner embedding of making random distribution second phase is dopant material at random;
B, produce numeral by dopant material at random;
C, digital encryption is obtained password with public key encryption algorithm;
Its identifying is:
A, produce numeral once more by the preceding dopant material of having produced at random, with produce the preceding first time digital identical;
B, obtain numeral with public-key cryptography decipherment algorithm clear crytpographic key;
D, the numeral and the clear crytpographic key that relatively produce once more by dopant material at random obtain numeral, and two digitally represent that sign is real when identical;
The open decruption key that the public-key cryptography decipherment algorithm is used is represented with numeral or bar code form, and the mode of downloading, buy books and periodicals or computer software by computer network transmits.
The manufacturing process of its used dopant material at random of described anti-counterfeiting mark is to constitute the anti-counterfeiting mark material at the inner opaque material that embeds the second phase random distribution of the transparent body, and the mode of the opaque materials material that is embedded in by its body of illumination produces dot pattern.
Described public key encryption method, it is the encryption key of representing with digital form that utilizes the producer, with the corresponding numeral that obtains after the digitized processing that is produced dot pattern by the marking materials that mixes at random, the processing by public key encryption algorithm produces the password of representing with numeral or bar code form.
Described public-key cryptography decipherment algorithm and comparatively validate method, the verifier utilizes the disclosed decruption key of representing with numeral or bar code form, by the public-key cryptography decipherment algorithm, relatively verify unique mark by the figure that illumination produces through the numeral after the digitized processing once more to the numeral that obtains behind the password to decipher of representing with numeral or bar code form with by the marking materials that mixes at random.
Described false proof key load mode is the deciphering key of representing with numeral or bar code form that the mode of utilizing computer network to download, buy books and periodicals or computer software transmits dopant material public key cryptography anti-counterfeiting mark at random.
Above-mentioned " second phase " is the term of material specialty, and the meaning is to include a kind of materials with different properties in addition in a kind of material.
Above-mentioned " public-key cryptography (abbreviation PKI) adds (separating) close algorithm " is the term of password specialty, with it be: during encryption, set of number (is made as a) and encryption key (representing with digital form) mixing generation password (representing with digital form) to digital encryption and decryption process.During deciphering, use decruption key (representing) and password to mix the reduction numeral and (be made as a) with digital form.Be characterized in: encryption key and decruption key are inequality.
According to the manufacturing process of the random distribution second phase anti-counterfeiting mark material as can be known, the random distribution second phase anti-counterfeiting mark material is actually not reproducible.Therefore, the anti-counterfeiting mark material has uniqueness characteristic.According to the principle of public key algorithm as can be known the private cipher key numeral selected at random of producer be actual can't the decoding and forge.The combination of marking materials uniqueness and producer's private cipher key numeric security will produce the exclusive anti-counterfeiting mark of not reproducible producer.
Embodiment
The present invention is achieved in that
One, the producer gets in the second phase opaque materials material random dispersion to the 3 dimension transparent body, makes the inner 3 dimension anti-counterfeiting mark materials that embed random distribution second phase.
Two, the producer produces a kind of dot matrix pattern by 3 modes of tieing up random distribution opaque materials materials that embed in the illumination transparent body, and pattern is obtained by the means of IMAQ, utilizes the image digitazation treatment technology to produce the checking of one group of correspondence with digital.
Three, the producer will verify with numeral and be input in the computer.Import the private cipher key (representing long more difficult more being decrypted of numeral with digital form) that the producer selects at random again, produce password (representing) with numeral or bar code form by public key encryption algorithm.
Four, the producer is printed as password numeral or bar code at last and pastes side by side or be embedded into random distribution second anti-counterfeiting mark material mutually and form anti-counterfeiting mark on the article.
Five, the identifier, is input to the numeral of verifying usefulness in the computer by the illumination of dopant material at random, IMAQ and the digitized processing of having produced produced identical checking with numeral with the same method of producer.
Six, the identifier is input to password in the computer, imports the producer again to the disclosed decruption key of society (representing that with numeral or bar code form the long more fail safe of numeral is good more), produces in computer by the public-key cryptography decipherment algorithm and differentiates with numeral.
Seven, the automatic contrast verification of computer is with numeral and discriminating numeral, if both are identical, computer shows that anti-counterfeiting mark is true, if both difference demonstration anti-counterfeiting marks are false.
This method has been compared following advantage with existing method:
One, this method is a kind of method for anti-counterfeit that in fact can't duplicate that is used to identify.
Two, the manufacture method of the anti-counterfeiting mark material in this method is open; The encrypting and decrypting algorithm
Open; Anti-counterfeiting mark IMAQ and digitalized processing method are open; Password (representing with numeral or bar code form) after decruption key and the encryption is open, has only encryption key (representing with digital form) by producer's picked at random and secret.
Three, the encrypting and decrypting processing procedure in this method can be used cryptographic processing technology such as the generation automatically of existing key, encryption key distribution, key call automatically.
Claims (5)
1, a kind of public key cryptography of dopant material at random method for anti-counterfeit is a kind of method for anti-counterfeit that is used to identify, and comprises marking materials and password in generation, making and the identification marking, and it is characterized in that: its concrete generation, manufacturing process comprise:
The 3 D antiforge of a, the inner embedding of making random distribution second phase is dopant material at random;
B, produce numeral by dopant material at random;
C, digital encryption is obtained password with public key encryption algorithm;
Its identifying is:
A, produce numeral once more by the preceding dopant material of having produced at random, with produce the preceding first time digital identical;
B, obtain numeral with public-key cryptography decipherment algorithm clear crytpographic key;
D, the numeral and the clear crytpographic key that relatively produce once more by dopant material at random obtain numeral, and two digitally represent that sign is real when identical;
The open decruption key that the public-key cryptography decipherment algorithm is used is represented with numeral or bar code form, and the mode of downloading, buy books and periodicals or computer software by computer network transmits.
2, the public key cryptography of dopant material at random method for anti-counterfeit according to claim 1, it is characterized in that: the manufacturing process of its used dopant material at random of described anti-counterfeiting mark, be to constitute the anti-counterfeiting mark material at the inner opaque material that embeds the second phase random distribution of the transparent body, the mode of the opaque materials material that is embedded in by its body of illumination produces dot pattern.
3, the public key cryptography of dopant material at random method for anti-counterfeit according to claim 1, it is characterized in that: described public key encryption method, it is the encryption key of representing with digital form that utilizes the producer, with the corresponding numeral that obtains after the digitized processing that is produced dot pattern by the marking materials that mixes at random, the processing by public key encryption algorithm produces the password of representing with numeral or bar code form.
4, the public key cryptography of dopant material at random method for anti-counterfeit according to claim 1, it is characterized in that: described public-key cryptography decipherment algorithm and comparatively validate method, the verifier utilizes the disclosed decruption key of representing with numeral or bar code form, by the public-key cryptography decipherment algorithm, relatively verify unique mark by the figure that illumination produces through the numeral after the digitized processing once more to the numeral that obtains behind the password to decipher of representing with numeral or bar code form with by the marking materials that mixes at random.
5, the public key cryptography of dopant material at random method for anti-counterfeit according to claim 1, it is characterized in that: described false proof key load mode is the deciphering key of representing with numeral or bar code form that the mode of utilizing computer network to download, buy books and periodicals or computer software transmits dopant material public key cryptography anti-counterfeiting mark at random.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410056939 CN1588847A (en) | 2004-08-23 | 2004-08-23 | Random doped material common key cipher anti-fake method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410056939 CN1588847A (en) | 2004-08-23 | 2004-08-23 | Random doped material common key cipher anti-fake method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1588847A true CN1588847A (en) | 2005-03-02 |
Family
ID=34603253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410056939 Pending CN1588847A (en) | 2004-08-23 | 2004-08-23 | Random doped material common key cipher anti-fake method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1588847A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2428948A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Key distribution by combination with a signature obtained from a scan of an unmodified token |
US7812935B2 (en) | 2005-12-23 | 2010-10-12 | Ingenia Holdings Limited | Optical authentication |
US7853792B2 (en) | 2004-03-12 | 2010-12-14 | Ingenia Holdings Limited | Authenticity verification methods, products and apparatuses |
US8078875B2 (en) | 2005-07-27 | 2011-12-13 | Ingenia Holdings Limited | Verification of authenticity |
US8103046B2 (en) | 2004-08-13 | 2012-01-24 | Ingenia Holdings Limited | Authenticity verification of articles using a database |
US8615475B2 (en) | 2008-12-19 | 2013-12-24 | Ingenia Holdings Limited | Self-calibration |
US8699088B2 (en) | 2004-03-12 | 2014-04-15 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
CN103793732A (en) * | 2014-02-18 | 2014-05-14 | 立德高科(北京)数码科技有限责任公司 | Method and device for identifying anti-counterfeiting mark composed of electronic monitoring code and raster graphic |
CN103942587A (en) * | 2013-12-20 | 2014-07-23 | 庞德兴 | Multi-dimensional random identification structure |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
WO2015081810A1 (en) * | 2013-12-02 | 2015-06-11 | 阳俊 | Anti-counterfeit label, manufacturing method therefor, and anti-counterfeit method |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
-
2004
- 2004-08-23 CN CN 200410056939 patent/CN1588847A/en active Pending
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US8699088B2 (en) | 2004-03-12 | 2014-04-15 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
US9019567B2 (en) | 2004-03-12 | 2015-04-28 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
US7853792B2 (en) | 2004-03-12 | 2010-12-14 | Ingenia Holdings Limited | Authenticity verification methods, products and apparatuses |
US8896885B2 (en) | 2004-03-12 | 2014-11-25 | Ingenia Holdings Limited | Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure |
US8766800B2 (en) | 2004-03-12 | 2014-07-01 | Ingenia Holdings Limited | Authenticity verification methods, products, and apparatuses |
US8421625B2 (en) | 2004-03-12 | 2013-04-16 | Ingenia Holdings Limited | System and method for article authentication using thumbnail signatures |
US8757493B2 (en) | 2004-03-12 | 2014-06-24 | Ingenia Holdings Limited | System and method for article authentication using encoded signatures |
US8502668B2 (en) | 2004-03-12 | 2013-08-06 | Ingenia Holdings Limited | System and method for article authentication using blanket illumination |
US8749386B2 (en) | 2004-03-12 | 2014-06-10 | Ingenia Holdings Limited | System and method for article authentication using signatures |
US8103046B2 (en) | 2004-08-13 | 2012-01-24 | Ingenia Holdings Limited | Authenticity verification of articles using a database |
GB2428948A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Key distribution by combination with a signature obtained from a scan of an unmodified token |
US8078875B2 (en) | 2005-07-27 | 2011-12-13 | Ingenia Holdings Limited | Verification of authenticity |
GB2428948B (en) * | 2005-07-27 | 2007-09-05 | Ingenia Technology Ltd | Keys |
US8497983B2 (en) | 2005-12-23 | 2013-07-30 | Ingenia Holdings Limited | Optical authentication |
US7812935B2 (en) | 2005-12-23 | 2010-10-12 | Ingenia Holdings Limited | Optical authentication |
US8615475B2 (en) | 2008-12-19 | 2013-12-24 | Ingenia Holdings Limited | Self-calibration |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
WO2015081810A1 (en) * | 2013-12-02 | 2015-06-11 | 阳俊 | Anti-counterfeit label, manufacturing method therefor, and anti-counterfeit method |
CN103942587A (en) * | 2013-12-20 | 2014-07-23 | 庞德兴 | Multi-dimensional random identification structure |
CN103793732A (en) * | 2014-02-18 | 2014-05-14 | 立德高科(北京)数码科技有限责任公司 | Method and device for identifying anti-counterfeiting mark composed of electronic monitoring code and raster graphic |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102201100B (en) | Object anti-counterfeiting method and system | |
Wong et al. | Secret and public key image watermarking schemes for image authentication and ownership verification | |
CN100530253C (en) | System and method of authenticating an article | |
CN104816685A (en) | Program control variable two-dimension code-based anti-counterfeiting license plate and application method thereof | |
CN1588847A (en) | Random doped material common key cipher anti-fake method | |
CN1433558A (en) | Method of authenticating tag | |
KR20020068471A (en) | Proprietary watermark system for secure digital media and content distribution | |
CN1421814A (en) | Digital anti-fake method | |
CN1805337A (en) | Secret shared key mechanism based user management method | |
EP0998800B1 (en) | Document or message security arrangements using a numerical hash function | |
CA2570340A1 (en) | Systems and methods for digital content security | |
CN102004986A (en) | Product anti-counterfeiting method based on digital signature and public key system and verifying method | |
CN111539496A (en) | Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system | |
WO2023041212A1 (en) | Method of verification for machine learning models | |
CN111612961A (en) | Electronic voting method for encrypting voter vote information | |
CN111131657B (en) | Chaos medical image tamper-proof encryption method based on self-verification matrix | |
CN101877118A (en) | Electronic document authenticity identification system | |
Penubadi et al. | Sustainable electronic document security: A comprehensive framework integrating encryption, digital signature and watermarking algorithms | |
JP3864656B2 (en) | Data transmission method | |
CN102034217A (en) | Authenticity self-identifying and tampering self-positioning method for digital image | |
Nagm et al. | A novel watermarking approach for protecting image integrity based on a hybrid security technique | |
Radhi et al. | Enhancing security for document exchange using authentication and GAN encryption | |
Nagm et al. | A New Approach for Image Authentication Framework for Media Forensics Purpose | |
CN113612603B (en) | Unauthorized strong assignment verifier signcryption method | |
Li et al. | Fragile authentication watermark combined with image feature and public key cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20050302 |