CN1632818A - Encoding method for condition code of false proof code - Google Patents
Encoding method for condition code of false proof code Download PDFInfo
- Publication number
- CN1632818A CN1632818A CN 200310121877 CN200310121877A CN1632818A CN 1632818 A CN1632818 A CN 1632818A CN 200310121877 CN200310121877 CN 200310121877 CN 200310121877 A CN200310121877 A CN 200310121877A CN 1632818 A CN1632818 A CN 1632818A
- Authority
- CN
- China
- Prior art keywords
- code
- coding
- security code
- batch
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
It is a false proof character coding method, which comprises the following steps: first to code each product with clear code on batch; to turn the irregular false proof data though coding; the characteristic code generate a set of code according to the above code with sequence zero, which are the characteristic coded of the false proof codes; to turn these set o f codes into irregular codes; to store these coded in the computer database; to decode the characteristic codes into clear codes; the batch of false codes can be used in searching when this batch of codes are stored in the database.
Description
Technical field:
The present invention relates to a kind of date storage method, relate in particular to a kind of false proof date storage method by the condition code coding.
Background technology:
Chinese patent-cipher counterfeit-proof the marker of February 7 nineteen ninety-five application (application number: be that code, password (azimuth information) printed layers and covering layer by anti false information carrier layer, printing constitutes 95203425.5); Code and password are formed coding and are recorded to be stored in to the consumer and provide in the computer recognition system database of authentication password service, the consumer can verify authenticity of products to the computer recognition system input coding by phone, fax, internet, it will differentiate that this original complicated technology behavior of authenticity of products is converted into the simple behavior of calling input coding, be difficult for forging, being easy to identification, " systems engineering of national code telephone service " that Chinese false proof employer's organization tissue is promoted adopted its patent.Yet the discrimination method of finding present security code in practice is each bar security code to be stored in the database of verification system the security code that whether has the consumer to import in the validation database when the consumer inquires about.Do like this drawback of bringing mainly contain following some:
(1) security code is come into force, must be with all false proof digital unified being saved in the database, the transmission of this mass data one will bring divulging a secret of data slightly accidentally, and the lawless person who fakes for false making provides opportunity.
(2) verification system must be stored all false proof numbers, and the consequence of bringing like this is all false proof numbers of system all can be leaked to give the invador when system suffers assault, thereby loses the false proof effect of false proof number.
(3) because each bar security code is all preserved in system, along with the progressively popularization of system business, the capacity of database also can influence the whole inquiry velocity of system greatly rapidly with geometric growth, has improved the maintenance cost of system.
Summary of the invention:
Purpose of the present invention aims to provide a kind of false proof code coding method of science more, makes that the storage of security code is simple more, safety, secret, reduces the requirement to system memory space simultaneously, reduces the system implementation cost.
We call this novel coding method: the characteristic code coding method of security code
The present invention is achieved in that
1, security code coding: each of coded system made batch security code all is provided with one group of characteristic of correspondence sign indicating number with it; Security code is a 16-21 figure place sign indicating number, and its content comprises: company numbering, product coding, batch sign indicating number, sequence code, and can work out one group for each product and expressly encode, by the encryption of cryptographic algorithm, expressly coding just becomes the false proof number that has no rule.
2, condition code coding: according to above-mentioned false proof code coding method, when sequence code all was " 0 ", the coding that is generated was the condition code of this batch security code, and the plaintext coding of condition code is encrypted by cryptographic algorithm, just became the condition code that has no rule.
3, the storage of condition code: after depositing in the Computer Database through the condition code of encryption, just deciphering is plain code automatically, and leaves in separately the form by company numbering, product coding, batch sign indicating number, can't see complete condition code in database.
4, the contrast of security code and condition code checking: false proof database provides query interface for means of communications such as phone, mobile phone, internets, the inquiry can import the security code on the sign in order, system is the plaintext sign indicating number with the anti-forge cipher deciphering, the company numbering of the condition code of putting down in writing in the contrasting data storehouse, product coding, batch sign indicating number information, after the condition code information unanimity of putting down in writing in the information and date storehouse of confirming this security code, then system feedback is true to this security code of consumer, then is personation as inconsistent.
Employing the invention has the advantages that:
1, the proof procedure of security code be by check after the deciphering security code expressly with the condition code of database storing consistent finishing whether, a storage attribute code in the database of verification system and no longer need to store security code, that has stopped to leak security code from database may.
2, by adopting the condition code after encrypting to activate same batch security code, each the bar data that no longer needs to generate write in the database of verification system, the registration of hundreds of thousands or millions of data, activation inquiry only need several condition codes just to finish, improve work efficiency greatly, improved the availability of system.
3, registration process has adopted the condition code after encrypting to finish, and the condition code after encrypting does not comprise security code, thereby has stopped to occur in the security code registration process possibility of data leak.
4, authority is checked in a storage attribute code conduct in the database, system only need store the inquiry that several condition codes just can be supported hundreds of thousands or millions of security codes, with the storage space of system be reduced to tens0000 of conventional system/, reduced the operation maintenance cost of system.
Embodiment:
1, security code coding
The number that is encoded to the 16-21 position of false proof number.The coding method with 16 figure place sign indicating numbers now illustrates as follows:
Coding structure is described as follows:
The 1-3 position: company numbering, can work out the coding of 1000 tame enterprises;
The 4th: product coding, can work out the coding of 10 kinds of products;
The 5-6 position: batch sign indicating number, unfixing, can be two, can be described as 3.Identify the batch number of each batch security code;
The 7-16 position: sequence number, each that indicates each product is organized the sequence number of false proof number;
According to above-mentioned coding rule, can work out one group for each product and expressly encode, by the encryption of cryptographic algorithm, expressly coding just becomes the false proof number that has no rule.
2, the characteristic code coding method of security code
According to above-mentioned false proof code coding method, when sequence number all was 0, the coding that is generated was the condition code of the security code of this batch.For example:
When enterprise is numbered 001, production code member is 1, and the batch number of this batch security code is 01 o'clock, and then the condition code structure of 01 batch security code is as follows:
0011010000000000
The plaintext of above-mentioned condition code is encoded by the encryption of cryptographic algorithm, just become the condition code that has no rule.
3, the storage of condition code
After depositing in the Computer Database through the condition code of encryption, just deciphering is plain code automatically, and leaves in separately the form by enterprise's numbering, production code member, batch number.Like this, in database, also can't see complete condition code, guaranteed the safe and secret of condition code.
4, the contrast of security code and condition code checking
False proof database provides query interface for means of communications such as phone, mobile phone, internets, and the inquiry utilizes these means of communications to verify false proof number easily.
The checking flow process is as follows:
The consumer calls, security code on the input sign in order: system's logarithmic code deciphering, the anti-forge cipher deciphering is the plaintext sign indicating number, enterprise's numbering of the condition code of putting down in writing in the contrasting data storehouse, production code member, batch number information, after the condition code information of being put down in writing in enterprise's numbering of confirming this security code, production code member, batch number and the database is consistent, then system feedback is given consumer's enterprise name, name of product and product information of an established trade mark, if inconsistent, then feeds back the information that beware of imitations.
Claims (3)
1, a kind of characteristic code coding method of security code is characterized in that:
1. security code is encoded: each of coded system made batch security code all is provided with one group of characteristic of correspondence sign indicating number with it; Security code is a 16-21 figure place sign indicating number, and its content comprises: company numbering, product coding, batch sign indicating number, sequence code, and can work out one group for each product and expressly encode, by the encryption of cryptographic algorithm, expressly coding just becomes the false proof number that has no rule.
2. condition code is encoded: according to above-mentioned false proof code coding method, when sequence code all was " 0 ", the coding that is generated was the condition code of this batch security code, and the plaintext coding of condition code is encrypted by cryptographic algorithm, just became the condition code that has no rule.
3. the storage of condition code: after depositing in the Computer Database through the condition code of encryption, just deciphering is plain code automatically, and leaves in separately the form by company numbering, product coding, batch sign indicating number, can't see complete condition code in database.
4. the contrast of security code and condition code checking: false proof database provides query interface for means of communications such as phone, mobile phone, internets, the inquiry can import the security code on the sign in order, system is the plaintext sign indicating number with the anti-forge cipher deciphering, the company numbering of the condition code of putting down in writing in the contrasting data storehouse, product coding, batch sign indicating number information, after the condition code information unanimity of putting down in writing in the information and date storehouse of confirming this security code, then system feedback is true to this security code of consumer, then is personation as inconsistent.
2, coding method according to claim 1 is characterized in that: only need during the storage security code character pair sign indicating number of this batch security code is stored in the database, do not need whole security codes of made are stored in the Computer Database.
3, coding method according to claim 1 is characterized in that: after condition code was registered in database, Dui Ying security code just can have been inquired about with it.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310121877 CN1632818A (en) | 2003-12-24 | 2003-12-24 | Encoding method for condition code of false proof code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310121877 CN1632818A (en) | 2003-12-24 | 2003-12-24 | Encoding method for condition code of false proof code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1632818A true CN1632818A (en) | 2005-06-29 |
Family
ID=34844317
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200310121877 Pending CN1632818A (en) | 2003-12-24 | 2003-12-24 | Encoding method for condition code of false proof code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1632818A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102332080A (en) * | 2011-03-11 | 2012-01-25 | 贵阳高新华美龙技术有限公司 | Method for encrypting real-time data into product security codes |
CN103778352A (en) * | 2014-01-28 | 2014-05-07 | 福建伊时代信息科技股份有限公司 | Electronic evidence generation and verification method and device as well as electronic evidence generation system |
CN104091520A (en) * | 2013-04-01 | 2014-10-08 | 范卫平 | Anti-counterfeiting coding method |
CN106408308A (en) * | 2015-07-31 | 2017-02-15 | 陈光涛 | Anti-counterfeiting plain code and rebate anti-counterfeiting code |
CN106408307A (en) * | 2015-07-31 | 2017-02-15 | 陈光涛 | Anti-counterfeit code capable of being only inquired at dealer and brand authentication method |
CN115063804A (en) * | 2022-06-29 | 2022-09-16 | 支付宝(杭州)信息技术有限公司 | Seal identification and anti-counterfeiting detection method and system |
-
2003
- 2003-12-24 CN CN 200310121877 patent/CN1632818A/en active Pending
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102332080A (en) * | 2011-03-11 | 2012-01-25 | 贵阳高新华美龙技术有限公司 | Method for encrypting real-time data into product security codes |
CN104091520A (en) * | 2013-04-01 | 2014-10-08 | 范卫平 | Anti-counterfeiting coding method |
CN103778352A (en) * | 2014-01-28 | 2014-05-07 | 福建伊时代信息科技股份有限公司 | Electronic evidence generation and verification method and device as well as electronic evidence generation system |
CN103778352B (en) * | 2014-01-28 | 2017-02-01 | 福建伊时代信息科技股份有限公司 | Electronic evidence generation and verification method and device as well as electronic evidence generation system |
CN106408308A (en) * | 2015-07-31 | 2017-02-15 | 陈光涛 | Anti-counterfeiting plain code and rebate anti-counterfeiting code |
CN106408307A (en) * | 2015-07-31 | 2017-02-15 | 陈光涛 | Anti-counterfeit code capable of being only inquired at dealer and brand authentication method |
CN115063804A (en) * | 2022-06-29 | 2022-09-16 | 支付宝(杭州)信息技术有限公司 | Seal identification and anti-counterfeiting detection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guo et al. | A fragile watermarking scheme for detecting malicious modifications of database relations | |
CN101201886B (en) | Three-he-code method for recognizing commodity | |
CN111666540B (en) | Copyright storage and authentication method based on block chain and digital signature | |
CN1149797A (en) | Relicable control and access method and system for system resource in distribating system | |
GB2484382A (en) | Generating a test database for testing applications by applying format-preserving encryption to a production database | |
US20060095775A1 (en) | Fragile watermarks | |
CN108614961B (en) | Method for embedding and protecting digital watermark in database | |
CN1632818A (en) | Encoding method for condition code of false proof code | |
CN1424690A (en) | Network screen encoded anti-fakery method | |
CN108154207B (en) | Anti-counterfeiting unique code generation and anti-counterfeiting verification method | |
CN109359983B (en) | Multi-code mutual correction method and system | |
CN113536247B (en) | Hidden data watermarking method for mobile phone number with MD5 characteristic of traceable information | |
CN108229113B (en) | Database digital watermark extraction method | |
Kamel et al. | Toward protecting the integrity of relational databases | |
CN109271281B (en) | Data backup method and system for preventing data from being tampered | |
CN111080185A (en) | Privacy protection express delivery and pickup system and method based on intelligent contract | |
CN101059887A (en) | A bank card number and the second magnetic track main account number creation method and reading method | |
CN112307445B (en) | Identity management method and device based on block chain | |
CN114372248A (en) | Intelligent software system for stamp management | |
CN108063742B (en) | Sensitive information providing and tracking method and device | |
CN114240349A (en) | Ecological environment supervision method and system based on block chain | |
CN1271548C (en) | Primary and secondary cyphers anti-false method for goods | |
CN109088734B (en) | Coding method and system | |
Li et al. | A recoverable chaos‐based fragile watermarking with high PSNR preservation | |
CN1632807A (en) | Dual-code symmetric anti-faking method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |