WO2020199393A1 - Système et procédé anti-contrefaçon - Google Patents

Système et procédé anti-contrefaçon Download PDF

Info

Publication number
WO2020199393A1
WO2020199393A1 PCT/CN2019/093585 CN2019093585W WO2020199393A1 WO 2020199393 A1 WO2020199393 A1 WO 2020199393A1 CN 2019093585 W CN2019093585 W CN 2019093585W WO 2020199393 A1 WO2020199393 A1 WO 2020199393A1
Authority
WO
WIPO (PCT)
Prior art keywords
counterfeiting
information
identification
area
authentication
Prior art date
Application number
PCT/CN2019/093585
Other languages
English (en)
Chinese (zh)
Inventor
陈成楷
陈庆伟
缪小微
黄伟忠
Original Assignee
广州市宝绅科技应用有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州市宝绅科技应用有限公司 filed Critical 广州市宝绅科技应用有限公司
Publication of WO2020199393A1 publication Critical patent/WO2020199393A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the invention relates to the technical field of anti-counterfeiting codes, in particular to an anti-counterfeiting system and an anti-counterfeiting method.
  • the inventor conceived that the authentication process of the anti-counterfeiting code is realized as the separation of the cloud and the device side. This can prevent the problem of being cracked at one end and causing the entire anti-counterfeiting code to become invalid during the process of anti-counterfeiting and identification. , There is no need to upgrade the identification program of the terminal, which helps to ensure the security of the anti-counterfeiting process, while reducing upgrade and maintenance costs.
  • an anti-counterfeiting system including: an identification module for obtaining identification information and anti-counterfeiting information from an anti-counterfeiting code set on a terminal device, and outputting the identification information and anti-counterfeiting information to the following anti-counterfeiting module;
  • the anti-counterfeiting module of the device is used to receive the identification information and the anti-counterfeiting information for authentication and generate the authentication result to output to the identification module.
  • the identification module the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication. This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
  • the identification module includes a first identification unit and a second identification unit.
  • the first identification unit is used to identify the anti-counterfeiting code set on the terminal device, and locate the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code.
  • the effective identification area is used to obtain identification information; the second identification unit is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting module.
  • the information of the anti-counterfeiting code can be effectively obtained, which is different from the direct identification of the anti-counterfeiting code in the prior art, which can effectively improve the security of the anti-counterfeiting process.
  • the identification information includes an anti-counterfeiting area encoding method and an anti-counterfeiting area encoding version
  • the second identification module decodes according to the anti-counterfeiting area encoding method and the anti-counterfeiting area encoding version to obtain the anti-counterfeiting information.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area code version it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information and guide the decoding method of the anti-counterfeiting module.
  • the anti-counterfeiting module includes an authenticating unit and a verification unit.
  • the authenticating unit is configured to perform a decoding operation to obtain anti-counterfeiting data according to the acquired anti-counterfeiting information and the identification information of the effective identification area;
  • the verification unit is configured to verify the anti-counterfeiting data, Generate output of authentication result.
  • the processing of the verification unit can give the anti-counterfeiting process of the anti-counterfeiting code a secondary line of defense, which can overcome the terminal program being cracked when the anti-counterfeiting code is used in the prior art, or the source code of the decoding (encoding) program is leaked. This will lead to a large number of forgeries of anti-counterfeiting codes and affect information security.
  • the anti-counterfeiting module further includes: a statistical unit configured to count the current number of authentication times based on the authentication result, and generate an early warning information output when it is judged that the authentication of the anti-counterfeiting code reaches a preset authentication number threshold.
  • the unit can identify suspicious or forged anti-counterfeiting codes in time, which is beneficial to improve the security of information.
  • an anti-counterfeiting method including the following steps: receiving identification information and anti-counterfeiting information; performing authentication processing according to the received identification information and anti-counterfeiting information, and generating an output of the authentication result; wherein, identifying The information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device.
  • the identification module the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication.
  • This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
  • obtaining identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device includes the following steps: obtaining candidate area information of the anti-counterfeiting code, and locating the effective identification area of the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code ;Acquire identification information based on the effective identification area; decode according to the identification information to obtain anti-counterfeiting information.
  • the setting of candidate identification areas and effective areas can increase the difficulty of cracking the anti-counterfeiting code to obtain identification information.
  • the identification information includes positioning information and color information
  • decoding according to the identification information to obtain the anti-counterfeiting information includes the following steps: determining the spatial arrangement of the anti-counterfeiting area and the identification area according to the positioning information; extracting the anti-counterfeiting area according to the color information information.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area coding version it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information, guide the decoding method of the anti-counterfeiting module, and realize the separation of identification information and anti-counterfeiting information, and then realize the separation of identification and anti-counterfeiting processing.
  • each terminal program corresponding to the analysis does not need to be upgraded simultaneously, and only the anti-counterfeiting codes can be upgraded, which is beneficial to reduce costs.
  • the identification information includes an anti-counterfeiting area coded version
  • generating an authentication result includes the following steps: decoding the anti-counterfeiting information according to the anti-counterfeiting area coded version to generate final data; verifying the validity of the final data to generate an authentication result output.
  • the method further includes the following steps: setting a threshold for the number of authentication times, setting a threshold for the number of authentication times, and counting the current number of authentication times according to the authentication result; judging the number of authentication times, when it is judged that the authentication of the anti-counterfeiting code reaches the number of authentication times The warning information output is generated when the threshold is reached.
  • setting a threshold for the number of authentication times setting a threshold for the number of authentication times, and counting the current number of authentication times according to the authentication result
  • judging the number of authentication times when it is judged that the authentication of the anti-counterfeiting code reaches the number of authentication times
  • the warning information output is generated when the threshold is reached.
  • Fig. 1 is a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention
  • FIG. 2 is a block diagram of the principle of an anti-counterfeiting system according to another embodiment of the present invention.
  • FIG. 3 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention.
  • FIG. 5 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention.
  • Fig. 6 is a flowchart of an anti-counterfeiting method according to an embodiment of the present invention.
  • Fig. 1 schematically shows a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention, as shown in Fig. 1,
  • the anti-counterfeiting system includes: an identification module 1 and an anti-counterfeiting module 2.
  • the identification module 1 is used to obtain identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device, and output to the following anti-counterfeiting module 2; the anti-counterfeiting module 2 is set in the remote device to receive the identification information and anti-counterfeiting information for authenticating And generate the authentication result and output it to the recognition module 1.
  • the identification module 1 can be set on terminal devices such as mobile phones and tablet computers. For example, when the identification module 1 is set, an application corresponding to the mobile phone system (such as Android, Iphone) is developed through the existing technology, and the mobile phone comes with Camera to scan the security code.
  • an application corresponding to the mobile phone system such as Android, Iphone
  • the anti-counterfeiting module 2 can be deployed on a remote server. Since the anti-counterfeiting module 2 is deployed on the server, it is much more difficult to break a server than a fixed program. Therefore, compared with the anti-counterfeiting code of the prior art The system has higher security.
  • the identification module 1 and the anti-counterfeiting module 2 are arranged at different ends and can communicate wirelessly.
  • the anti-counterfeiting code provided in this embodiment, as shown in FIG. 3, includes: an identification area 3 and an anti-counterfeiting area 4.
  • the identification area 3 is used to place identification information.
  • the anti-counterfeiting area 4 is used to place anti-counterfeiting information.
  • the identification area 3 and the anti-counterfeiting area 4 are arranged according to a preset spatial structure, that is, the anti-counterfeiting area 4 is arranged inside the identification area 3.
  • the spatial structure can also be implemented as setting a part of the anti-counterfeiting area 4 in the identification area 3.
  • the space structure can also be implemented as setting the anti-counterfeiting area 4 around the identification area 3, that is, the identification area is regarded as a single whole, and the anti-counterfeiting area is divided into four parts, respectively.
  • the identification area a part of the anti-counterfeiting area is set inside the identification area
  • the other part is set around the identification area, that is, the anti-counterfeiting area is divided into five areas, and the identification area is a single whole.
  • the space structure can also be implemented as setting the anti-counterfeiting area 4 around the identification area 3, that is, the identification area is regarded as a single whole, and the anti-counterfeiting area is divided into four parts, respectively.
  • the identification area is a part of the anti-counterfeiting area is set inside the identification area
  • the other part is
  • the spatial structure of the identification area is divided into non-overlapping identification blocks during construction, and identifiers are filled in corresponding positions of each identification block to form binary data; the binary data is sliced to generate information for identification.
  • each identification block is used to represent 1 bit of information. If the identifier filled in the identification block is black, it means 1, and when it is white, it means 0, and these identification blocks form binary data of a certain length. Afterwards, the binary data is fragmented (the specific implementation method can refer to the prior art implementation), which can be used to express a large amount of information.
  • the information used for identification includes first identification information, and the first identification information includes an encoding method, an encoding version, positioning information, and color information of the anti-counterfeiting area.
  • the first 4 bits of the binary data are used to indicate the encoding method of the anti-counterfeiting code
  • the 5th to 8th bits are used to indicate the encoding version of the anti-counterfeiting area.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area coded version are used to assist the terminal or server that authenticates the anti-counterfeiting code to decode its anti-counterfeiting area information.
  • the positioning information is used to describe the relative position of the anti-counterfeiting area and the identification area, and the size of the anti-counterfeiting area (the number of pixels in the width and height of the anti-counterfeiting area).
  • Color information is used to describe the color system used in the anti-counterfeiting area, such as Black-White, YUV, RGB, HSV, etc.
  • the specific spatial relationship between the anti-counterfeiting area and the recognition area is also reflected in the mapping relationship between the anti-counterfeiting area and the recognition area through the positioning information, so that the anti-counterfeiting information can be extracted through the positioning information and color information, and when extracting the anti-counterfeiting information, pass
  • the color information in the identification information can obtain the image information of the anti-counterfeiting area corresponding to the identification area, that is, the encrypted anti-counterfeiting information, which effectively improves the security of the anti-counterfeiting code.
  • the information used for identification also includes second identification information.
  • the second identification information includes an information error correction code and an information verification code, which are used to identify and distinguish the identification area.
  • the identification area is divided into a candidate identification area and a valid identification. Area, the candidate identification area is configured to include the first identification information, and the effective identification area is configured to include the first identification information and the second identification information. In specific applications, the candidate identification area can be scanned and searched, and the second Identification information verification to distinguish and determine the effective identification area.
  • the process of determining the effective identification area through the candidate identification area is specifically realized as: searching for the candidate identification area information to determine, if the identification information of the candidate identification area can perform information code error correction by itself, and also pass its own information check code verification, Then the candidate identification area is used as the effective identification area, that is, the first identification information can be corrected and verified by the detected second identification information, which means that the area includes both the second identification information and the first identification information. That is to determine the area as a valid recognition area.
  • the identification of the candidate area can be achieved by setting the structure of the candidate area and performing scanning judgment on the structure.
  • the candidate area is implemented as including four candidate positioning points forming an approximate matrix.
  • the candidate anchor point is: if there are at most m other black points in a circle with a black point as the center and radius n, then the black point is a candidate anchor point, and the size of n is determined by the radius r of the black point ,
  • An exemplary n 3 ⁇ r, the value range of m can be diversified, usually 1 or 0.
  • the candidate candidate area is implemented as including three candidate positioning points forming an approximate right triangle, and the fourth point can be calculated through the three positioning points.
  • the calculation method can be implemented with reference to the prior art (exemplary). In QR Code, 3 " ⁇ " fonts are used as anchor points, and the position of the fourth point is calculated through these 3 " ⁇ " fonts).
  • the candidate area can be identified through the candidate positioning point, and the candidate area has no obvious recognition pattern.
  • QR Code has an obvious "back" character pattern
  • Maxi Code has an obvious bull's eye pattern
  • DataMatrix has an obvious pattern. The two straight lines make the security of anti-counterfeiting higher.
  • the identification module of the anti-counterfeiting system of this embodiment includes a first identification unit 101 and a second identification unit 102.
  • the first identification unit 101 is used to identify the anti-counterfeiting code set on the terminal device, including first obtaining one or more candidate identifications.
  • the effective identification area of the anti-counterfeiting code is located from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, the second identification information in the anti-counterfeiting code is used for error correction and verification, so as to perform the obtained candidate identification area Distinguish to determine the effective identification area), and obtain identification information from the effective identification area after the effective identification area is determined (that is, read the first identification information and the second identification information in the effective identification area to obtain the first identification information And the identification information of the second identification information).
  • the second identification unit 102 is used to obtain the anti-counterfeiting information based on the identification information of the effective identification area and the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), realize the extraction of anti-counterfeiting information, and effectively identify the identification information of the area And the anti-counterfeiting information is output to the anti-counterfeiting module 2.
  • the second identification unit 102 extracts the anti-counterfeiting information according to the positioning information and the color information in the identification information of the anti-counterfeiting code, thereby achieving the acquisition of the anti-counterfeiting information based on the identification information.
  • Obtaining anti-counterfeiting information through the positioning information and color information in the identification information can be specifically realized as: obtaining the spatial arrangement structure of the anti-counterfeiting area and the identification area through the positioning information.
  • the exemplary anti-counterfeiting area is inside the identification area, that is, the anti-counterfeiting information is in the identification information.
  • the inside of the anti-counterfeiting area then through the mapping relationship between the color information in the identification information and the anti-counterfeiting area, the anti-counterfeiting area is obtained using color information, and then the anti-counterfeiting area is extracted according to the determined color information.
  • the color information of the anti-counterfeiting area is White- Black
  • the color information includes black and white color blocks. If a color block in the anti-counterfeiting area is black, it is represented by 1, and if a certain color block is white, it is represented by 0, thereby obtaining binary anti-counterfeiting information.
  • the anti-counterfeiting module 2 includes an authenticating unit 201 and a verification unit 202.
  • the authenticating unit 201 is used to perform a decoding operation to obtain anti-counterfeiting data according to the obtained anti-counterfeiting information and the identification information of the effective identification area, which is specifically implemented as follows: according to the code in the identification information
  • the version information auxiliary anti-counterfeiting module 2 decodes the anti-counterfeiting information, that is, through the anti-counterfeiting area coding method and the anti-counterfeiting area code version.
  • the decoding rules and methods have been reflected in the anti-counterfeiting area coding method and the anti-counterfeiting area code version in the identification information.
  • the encoding method and encoding version information can be decoded according to the agreed protocol, and the anti-counterfeiting data can be obtained after decoding.
  • the encoding method is expandable. Specifically, when writing the encoding method of the anti-counterfeiting code, multiple encoding methods will be written at the same time. After the current encoding method has a problem, it will be written into other encoding methods. Replacement, exemplarily, for the anti-counterfeiting code of version 2019-4-3, three encoding methods are provided when writing (the codes of these three encoding methods are 0, 1, 2).
  • a new encoding method code 3 will be added, and the old encoding method is no longer used, and the new encoding method 3 is used for the newly generated anti-counterfeiting code through this encoding method.
  • a new encoding method is added to generate new encoding version information, and according to the new The encoding version information generates a new anti-counterfeiting code, and the old insecure encoding method is no longer used.
  • the verification unit 202 is used for verifying the anti-counterfeiting data, generating an output of the authentication result, and then returning the result to the identification module 1, wherein the authentication data is obtained after the authentication data is verified based on the selected verification method (which can be implemented with reference to the prior art)
  • the result of authentication is realized as a serial number.
  • an anti-counterfeit code that converts an image into digital information (such as White-Black color space, black is converted to 1, white is converted to 0), according to the code of the security code
  • the position of these digital information is rearranged, and the rearranged information is decrypted according to the encoded version information of the anti-counterfeiting area (for example, the existing DES algorithm, RSA algorithm), and finally a serial number is generated .
  • the serial number corresponding to the anti-counterfeiting code will be pre-stored in the anti-counterfeiting module (or pre-stored in the remote device where the anti-counterfeiting module is located, which can be accessed by the anti-counterfeiting module).
  • the anti-counterfeiting module If the anti-counterfeiting module is in the process of authenticating, it is judged according to the verification result The serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint conditions may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication result is Failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the output will be associated with the serial number The pictures, descriptions of the items, etc. (the serial number and its corresponding related information can be set and pre-stored when setting the coding rules corresponding to the anti-counterfeiting information).
  • the anti-counterfeiting module further includes a counting unit 203, which is used to count the current times of authentication based on the authentication result, and make a judgment every time the identification module initiates an authentication request to the anti-counterfeiting module. After each authentication is successful, the anti-counterfeiting module 2 will record the authentication times of the serial number. When it is judged that the authentication of the anti-counterfeiting code reaches the preset authentication times threshold, the warning information output is generated, and the warning information can be realized as specific text or graphic information to indicate that the code may be forged.
  • the security factor of the anti-counterfeiting process of the anti-counterfeiting code can be effectively improved, and the difficulty of being cracked is increased by the identification and anti-counterfeiting modules provided at both ends.
  • FIG. 6 schematically shows a flow chart of an anti-counterfeiting method according to an embodiment of the present invention. As shown in FIG. 6, this embodiment includes the following steps:
  • Step S601 receiving identification information and anti-counterfeiting information.
  • the identification information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device.
  • the specific acquisition method first obtain one or more candidate identification areas, and locate the effective identification area of the anti-counterfeiting code from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, correcting by the second identification information in the anti-counterfeiting code) Wrong sum check, so as to distinguish the obtained candidate identification areas to determine the effective identification area), and after the effective identification area is determined, the identification information is obtained from the effective identification area (that is, the first identification information in the effective identification area is read And second identification information to obtain identification information including the first identification information and the second identification information).
  • the second identification unit 102 is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, according to the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting information Module 2.
  • the second identification module 102 decodes the anti-counterfeiting area encoding method and the anti-counterfeiting area code version of the anti-counterfeiting code to obtain the anti-counterfeiting information.
  • Step S602 Perform authentication processing according to the received identification information and anti-counterfeiting information, and generate an authentication result output.
  • the specific authentication processing includes: the authentication result obtained after verifying the authentication data based on the selected authentication method (which can be implemented with reference to the prior art) is realized as a serial number, if the authentication is performed in the anti-counterfeiting module If the serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint condition may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication The result is a failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the serial number will be output
  • the picture and description of the item associated with the number (the serial number and its corresponding associated information can be set and pre-stored when setting the coding rule corresponding to the anti-counterfe
  • the method further includes the following steps: setting a threshold for the number of times of authentication, and counting the current number of times of authentication based on the results of authentication, each time the identification module initiates an authentication request to the anti-counterfeiting module, each time after the authentication is successful ,
  • the anti-counterfeiting module 2 will record the identification times of the serial number. The number of times of forgery is judged, and when it is judged that the authentication of the anti-counterfeiting code reaches the threshold of the number of times of authentication, an early warning information output is generated.
  • the early warning information can be realized as specific text or graphic information to indicate that the code may be forged.
  • the anti-counterfeiting method can identify and authenticate the counterfeit at both ends, so that the security factor of the anti-counterfeiting code in the authentication process is higher, and the anti-counterfeiting effect of the entire anti-counterfeiting code will not be invalidated because the single-end is cracked.
  • the anti-counterfeiting code includes both identification information and anti-counterfeiting information
  • the identification of the identification information is realized through one end (which can be the identification module set in the terminal device), and the authentication of the anti-counterfeiting information is through the other end (which can be It is implemented by setting up the authentication module on the remote device (such as the cloud server). Therefore, when the anti-counterfeiting program is upgraded, only the cloud server needs to be upgraded. There is no need to upgrade various terminal devices or devices with anti-counterfeiting codes. The upgrade is more convenient and feasible.

Landscapes

  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

La présente invention concerne un système anti-contrefaçon, comprenant : un module d'identification (1), utilisé pour obtenir des informations d'identification et des informations anti-contrefaçon à partir d'un code anti-contrefaçon fourni sur un dispositif terminal, et délivrer en sortie les informations d'identification et les informations anti-contrefaçon à un module anti-contrefaçon (2) ; et un module anti-contrefaçon (2) fourni sur un dispositif distant, utilisé pour recevoir les informations d'identification et les informations anti-contrefaçon pour une authentification, générer le résultat d'authentification, et délivrer en sortie le résultat d'authentification au module d'identification (1). L'invention concerne également un procédé anti-contrefaçon. Selon le procédé et le système, le problème selon lequel le code anti-contrefaçon est contrefait par un grand nombre de personnes en raison du fait qu'un programme de terminal est compromis ou qu'un code source a été divulgué, ce qui provoque la perte d'une fonction d'anti-contrefaçon, peut être résolu.
PCT/CN2019/093585 2019-04-04 2019-06-28 Système et procédé anti-contrefaçon WO2020199393A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910272268.3A CN109978574A (zh) 2019-04-04 2019-04-04 一种防伪系统及防伪方法
CN201910272268.3 2019-04-04

Publications (1)

Publication Number Publication Date
WO2020199393A1 true WO2020199393A1 (fr) 2020-10-08

Family

ID=67083048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/093585 WO2020199393A1 (fr) 2019-04-04 2019-06-28 Système et procédé anti-contrefaçon

Country Status (2)

Country Link
CN (1) CN109978574A (fr)
WO (1) WO2020199393A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978115B (zh) * 2019-04-04 2020-06-09 广州市宝绅科技应用有限公司 一种防伪码及其构建方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246863A (zh) * 2013-04-02 2013-08-14 包晗 一种基于识别码的互动防伪识别系统及识别方法
CN103310344A (zh) * 2012-09-10 2013-09-18 成都菲普迪斯科技有限公司 Ccqr码防伪方法
US9076024B2 (en) * 2013-03-07 2015-07-07 Authentag, Llc Anti-counterfeiting system and method
CN106203573A (zh) * 2016-07-26 2016-12-07 闫河 防伪标签及防伪系统
CN108122020A (zh) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 二维码生成方法及装置以及二维码识别方法及装置
CN108960387A (zh) * 2018-07-12 2018-12-07 南京林业大学 一种防伪造二维码及其生成和识别方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807285A (zh) * 2010-04-09 2010-08-18 周锡卫 一种交互式动态防伪与验证的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310344A (zh) * 2012-09-10 2013-09-18 成都菲普迪斯科技有限公司 Ccqr码防伪方法
US9076024B2 (en) * 2013-03-07 2015-07-07 Authentag, Llc Anti-counterfeiting system and method
CN103246863A (zh) * 2013-04-02 2013-08-14 包晗 一种基于识别码的互动防伪识别系统及识别方法
CN106203573A (zh) * 2016-07-26 2016-12-07 闫河 防伪标签及防伪系统
CN108122020A (zh) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 二维码生成方法及装置以及二维码识别方法及装置
CN108960387A (zh) * 2018-07-12 2018-12-07 南京林业大学 一种防伪造二维码及其生成和识别方法

Also Published As

Publication number Publication date
CN109978574A (zh) 2019-07-05

Similar Documents

Publication Publication Date Title
US20180219681A1 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and id validation methods
US11210510B2 (en) Storing anonymized identifiers instead of personally identifiable information
US9805296B2 (en) Method and apparatus for decoding or generating multi-layer color QR code, method for recommending setting parameters in generation of multi-layer QR code, and product comprising multi-layer color QR code
US8908977B2 (en) System and method for comparing images
CN108665041B (zh) 二维码生成及识别方法、装置、计算机设备及存储介质
CN104834839B (zh) 一种条码生成方法、基于条码的鉴权方法及相关终端
KR20200005639A (ko) 데이타 확인
US20180121933A1 (en) Inspection system and inspection method for commodity uniqueness confirmation
CN106850209A (zh) 一种身份认证方法及装置
US20200074130A1 (en) Item identification
CN105450411A (zh) 利用卡片特征进行身份验证的方法、装置及系统
CN106599964A (zh) 一种二维码生成、验证方法及装置
Li et al. Authpaper: Protecting paper-based documents and credentials using authenticated 2D barcodes
CN106886707B (zh) 一种图像鉴权的方法及装置
CN112307520A (zh) 电子印章添加和验证方法及系统
US9064138B2 (en) Method for detecting reorgination of barcodes
WO2020199393A1 (fr) Système et procédé anti-contrefaçon
KR101654797B1 (ko) 피싱 대응 상호 작용 캡차 시스템
KR102515358B1 (ko) 진위 판별 정보가 삽입된 식별 코드 이미지 생성 시스템 및 이를 통해 생성된 식별 코드 이미지를 이용한 객체 진위 여부 판별 방법
WO2020199394A1 (fr) Code anti-contrefaçon et procédé de construction associé
CN113988242A (zh) 基于多区域的防伪码生成与校验方法、系统、设备及介质
Mantoro et al. Real-time printed document authentication using watermarked qr code
CN109840574B (zh) 一种二维码信息的隐藏方法、装置、电子设备及存储介质
CN113076528A (zh) 防伪信息嵌入方法、提取方法、装置及存储介质
CN112418371A (zh) 用于区块链的安全三维码以及生成和解码方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19922492

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19922492

Country of ref document: EP

Kind code of ref document: A1