CN107944526B - Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method - Google Patents
Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method Download PDFInfo
- Publication number
- CN107944526B CN107944526B CN201710976043.7A CN201710976043A CN107944526B CN 107944526 B CN107944526 B CN 107944526B CN 201710976043 A CN201710976043 A CN 201710976043A CN 107944526 B CN107944526 B CN 107944526B
- Authority
- CN
- China
- Prior art keywords
- code
- information
- dimensional code
- counterfeiting
- resistant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06075—Constructional details the marking containing means for error correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention relates to the technical field of anti-counterfeiting, and discloses a tamper-resistant anti-copying two-dimensional code anti-counterfeiting method, which comprises the following steps: (1) editing information; (2) merging the information; (3) attached to a support; (4) verifying the two-dimension code; (5) and acquiring anti-counterfeiting information. The two-dimensional code comprises a main code of anti-counterfeiting information and an auxiliary code of anti-copying information, whether the two-dimensional code graph is copied or not is confirmed by checking the anti-copying information during verification, and the anti-counterfeiting information can be encrypted in order to prevent the anti-counterfeiting information from being tampered. The copy-proof information can be information which is not disclosed or content after encryption, and is converted into a graph according to an encoding rule, and the size of the printed graph is adjusted according to the precision of printing equipment, so that the graph generates distortion during printing. And recording the current time and the current geographic position during each verification, accumulating the verification times, setting an upper limit of the verification times, and copying the alarm two-dimensional code when the verification times exceed the times.
Description
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method.
Background
Symmetric encryption is the fastest and simplest encryption method, and the same key (secret key) is used for encryption (encryption) and decryption (decryption). Rijndael algorithm was selected by the National Institute of Standards and Technology (NIST-American National Institute of Standards and Technology) as a new Advanced Encryption Standard (AES-Advanced Encryption Standard) at 2.10.2000.
Asymmetric encryption provides a very secure method for encryption and decryption of data, using a pair of keys, a public key and a private key. The private key can only be safely kept by one party and cannot be leaked out, while the public key can be sent to any person who requests it. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key. For example, you request a public key from the bank, the bank sends the public key to you, you encrypt the message using the public key, and then only the holder of the private key, the bank, can decrypt your message. Different from symmetric encryption, the bank does not need to send out the private key through the network, so that the security is greatly improved. The most common asymmetric encryption algorithm at present is the RSA algorithm.
Because the two-dimensional code is convenient to use and low in cost, the two-dimensional code anti-counterfeiting and tracing are widely used. However, the traditional two-dimensional code is only a plaintext (generally a verification website and a serial number of a product), so that a counterfeiter can easily replace an official verification website with a fake website, thereby realizing low-cost mass counterfeiting. In order to make the two-dimensional code really have an ideal anti-counterfeiting effect, two problems need to be solved simultaneously:
1) tamper-proofing: the anti-counterfeiting information (including verification website) of the two-dimensional code can not be forged;
2) copy prevention: the two-dimensional code content is prevented from being copied and reused.
Disclosure of Invention
Aiming at the defects of easy tampering and easy copying in the prior art, the invention provides a tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method.
In order to solve the above technical problems, the present invention is solved by the following technical solutions.
A tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method comprises the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
Preferably, the step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
Preferably, in step (1), the copy protection information data is a ciphertext obtained by encrypting fixed data or randomly generated data.
Preferably, in the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
Preferably, in the step (4), when the two-dimensional code information is scanned, a decoding process is further included, the decoding process decrypts the encrypted primary code information and the encrypted secondary code information, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
Preferably, in the step (4), the scanning device is an intelligent terminal or a scanning gun.
Preferably, in step (4), after the verification is successful, the scanning time and the scanning location of the scanning operation are returned, and the number of times of verification is increased to the scanning device.
Preferably, in step (5), the anti-counterfeiting information includes authentication feedback information, product information, a place of manufacture, a date of manufacture, and a type of label.
Preferably, the step (5) further comprises an upper verification limit warning, the number of times of verification is set to be the highest, and if the number of times of verification is exceeded, a warning that the two-dimensional code is copied is given out during scanning.
Due to the adoption of the technical scheme, the invention has the remarkable technical effects that:
1. the anti-counterfeiting information in the two-dimensional code is encrypted, so that a counterfeiter is prevented from tampering and counterfeiting;
2. the anti-counterfeiting information of the two-dimensional code can be digitally signed or encrypted by using a digital certificate, so that the information contained in the anti-counterfeiting two-dimensional code cannot be tampered, and meanwhile, the corresponding identity information of a generator can be obtained by inquiring the information of the digital certificate, so that the aim of real-name authentication is fulfilled, and a counterfeiter can be invisibly made;
3. each two-dimensional code is provided with an anti-copy auxiliary code, the information contained in the auxiliary code can be private information or encrypted ciphertext, so that a counterfeiter cannot obtain the original information of the auxiliary code and can only copy the auxiliary code by a scanning or photographing method;
4. the anti-counterfeiting function can be efficiently realized by printing the anti-tampering and anti-copying two-dimensional code, so that the anti-counterfeiting cost is greatly reduced, and the anti-counterfeiting code can be widely applied to various commodities. If the anti-counterfeiting object is a graph, an enlarged image of some local details of the graph can also be used as an anti-copying auxiliary code, the graph details can be stored in a main code or a cloud end, when whether the graph is an original graph or not needs to be verified, the verified graph and the original graph can be compared, and if the distortion ratio of the verified graph and the original graph is larger than a set threshold value, the verified graph is judged not to be the original graph.
Drawings
FIG. 1 is a schematic flow chart of a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method according to the invention;
fig. 2 is a schematic diagram of positions of a primary code and a secondary code of a two-dimensional code in the tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
As shown in fig. 1 to fig. 2, a tamper-proof and copy-proof two-dimensional code anti-counterfeiting method includes the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value; the method aims to distort the original auxiliary code two-dimensional code with normal proportion, so that the purposes that the scanning of original auxiliary code two-dimensional picture data is effective, the accurate degree of a two-dimensional code picture cannot be achieved by simple copying simulation, the distortion degree is high, the accurate content of the auxiliary code cannot be scanned, meanwhile, the scanning of the reduced auxiliary code two-dimensional code can read a certain amount of accurate data, the authenticity can be conveniently judged, and the purpose that the copying cannot be achieved is achieved; the printing positions of the two-dimensional codes of the auxiliary codes can be various and can be set according to requirements, as shown in fig. 2;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
The step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
In the step (1), the anti-copy information data is a ciphertext obtained by encrypting fixed data or data generated randomly.
In the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
And (4) when the two-dimensional code information is scanned, a decoding process is also included, the encrypted main code information and the encrypted auxiliary code information are decrypted in the decoding process, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
In the step (4), the scanning device is an intelligent terminal or a scanning gun.
In the step (4), after the verification is successful, the scanning time and the scanning place of the scanning operation are returned, and the verification times are increased to the scanning equipment.
In the step (5), the anti-counterfeiting information comprises verification feedback information, product information, a production place, a production date and a label type.
And (5) further comprising a verification upper limit warning, wherein the verification times are set to be the highest times, and if the verification times are exceeded, a warning that the two-dimensional code is copied is sent out during scanning.
The two-dimensional code comprises a main code of anti-counterfeiting information and an auxiliary code of anti-copying information, whether the two-dimensional code graph is copied or not is confirmed by checking the anti-copying information during verification, and the anti-counterfeiting information can be encrypted in order to prevent the anti-counterfeiting information from being tampered. The copy-proof information can be non-public information, randomly generated content or encrypted content, and is converted into a pattern according to a certain coding rule, and the size of the printed pattern is adjusted according to the precision of the printing equipment, so that the pattern generates distortion during printing, and the distortion ratio is below a threshold value. And recording the current time and the current geographic position during each verification, accumulating the verification times, setting an upper limit of the verification times, and when the verification times exceed the times, even if the verification is passed, still warning that the two-dimensional code is copied.
Example 1
The anti-counterfeiting label is sprayed on the outer package of a certain white spirit, and after the anti-counterfeiting information of the product is obtained, the implementation steps are as follows:
step 1: encrypting the anti-counterfeiting information by using the USB-Key and encoding to generate a tamper-proof main code;
step 2: encrypting the copy-prevention information by using the USB-Key and coding to generate a copy-prevention auxiliary code;
and step 3: splicing the main code and the auxiliary code to obtain an anti-counterfeiting code which is anti-falsified and anti-copying;
and 4, step 4: before printing of the anti-counterfeiting code, setting a distortion threshold value of an auxiliary code to be 15%, controlling the distortion proportion to be smaller than the set threshold value in the operation process, and then completing packaging of a certain white spirit product;
and 5: when a customer verifies the anti-counterfeiting code, a scanning gun is used for reading the main code information and the auxiliary code information of the verified anti-counterfeiting code;
step 6: decrypting the main code information, and if the main code information is correct, executing the step 7;
and 7: comparing the sub-code information read in the step 5 with the original sub-code information generated in the step 2, if the distortion is lower than the threshold set in the step 4, prompting that the verification is successful, and displaying anti-counterfeiting information of the liquor product; if the distortion is higher than the threshold set in step 4, a failure in verification is prompted.
In summary, the above-mentioned embodiments are only preferred embodiments of the present invention, and all equivalent changes and modifications made in the claims of the present invention should be covered by the claims of the present invention.
Claims (9)
1. A tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method is characterized by comprising the following steps:
(1) editing information: acquiring anti-counterfeiting information data, and generating anti-copying information data corresponding to the anti-counterfeiting information data; encoding the anti-counterfeiting information data and the anti-copying information data to respectively generate a main code and an auxiliary code;
(2) and combining to generate a two-dimensional code: respectively generating two-dimensional codes according to the main codes and the auxiliary codes generated in the step (1), and then splicing the two-dimensional codes of the main codes and the two-dimensional codes of the auxiliary codes to form two-dimensional code original images;
(3) attaching to a carrier: inputting the two-dimensional code original image formed in the step (2) into a display device or printing equipment, and performing distortion display or printing on the secondary code two-dimensional code picture to enable the distortion rate of the secondary code two-dimensional code picture not to exceed a distortion threshold value;
(4) and (3) verifying the two-dimension code: scanning the two-dimensional code through scanning equipment, acquiring main code and auxiliary code information, and verifying the main code and the auxiliary code information:
firstly, judging main code information, and if the main code information is verified incorrectly, judging that the verification fails; if the primary code information is verified correctly, judging the secondary code;
comparing the scanned secondary code information with primary secondary code information acquired by scanning equipment, and if the information error rate exceeds a set distortion threshold, judging that the verification fails; if the distortion threshold is not exceeded, the verification is judged to be successful, and the next step is carried out;
(5) acquiring anti-counterfeiting information: and (4) displaying according to the main code information acquired in the step (4).
2. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: the step (1) further comprises an encryption process, wherein the encryption process encrypts the anti-counterfeiting information data and the anti-copying information data according to encryption requirements, and the encryption mode is USB-Key encryption or Key file encryption or encryption by an encryption machine.
3. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (1), the anti-copy information data is a ciphertext obtained by encrypting fixed data or data generated randomly.
4. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (2), after the secondary code two-dimensional code is subjected to distortion printing, the distortion threshold value range of the secondary code two-dimensional code is 5% -80%.
5. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: and (4) when the two-dimensional code information is scanned, a decoding process is also included, the encrypted main code information and the encrypted auxiliary code information are decrypted in the decoding process, and the decoding mode is USB-Key decryption or Key file decryption or encryption machine decryption.
6. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (4), the scanning device is an intelligent terminal or a scanning gun.
7. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (4), after the verification is successful, the scanning time and the scanning place of the scanning operation are returned, and the verification times are increased to the scanning equipment.
8. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: in the step (5), the anti-counterfeiting information comprises verification feedback information, product information, a production place, a production date and a label type.
9. The tamper-resistant and copy-resistant two-dimensional code anti-counterfeiting method according to claim 1, characterized in that: and (5) further comprising a verification upper limit warning, wherein the verification times are set to be the highest times, and if the verification times are exceeded, a warning that the two-dimensional code is copied is sent out during scanning.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710976043.7A CN107944526B (en) | 2017-10-19 | 2017-10-19 | Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710976043.7A CN107944526B (en) | 2017-10-19 | 2017-10-19 | Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107944526A CN107944526A (en) | 2018-04-20 |
CN107944526B true CN107944526B (en) | 2021-02-23 |
Family
ID=61936304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710976043.7A Active CN107944526B (en) | 2017-10-19 | 2017-10-19 | Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107944526B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960387B (en) * | 2018-07-12 | 2021-10-12 | 南京林业大学 | Anti-counterfeiting two-dimensional code and generation and identification method thereof |
CN109614805B (en) * | 2018-11-30 | 2023-03-28 | 南京林业大学 | Document anti-counterfeiting image generation and identification method and system |
CN110427580B (en) * | 2019-09-05 | 2023-05-30 | 睿芯(大连)股份有限公司 | System for realizing variable optical direct-reading identification code by passive silicon-free chip radio frequency technology |
CN111931890A (en) * | 2020-08-17 | 2020-11-13 | 福州智闽科技有限公司 | Method and system for realizing anti-theft and anti-fake dynamic two-dimensional code |
CN112865972B (en) * | 2021-03-31 | 2023-03-14 | 深圳市巽震科技孵化器有限公司 | Initialization method, device and system based on digital certificate platform and storage device |
CN118551783A (en) * | 2024-06-11 | 2024-08-27 | 北京海阳博创科技股份有限公司 | Information digital conversion and read-write device for radiation measurement and control method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103794135A (en) * | 2014-02-17 | 2014-05-14 | 立德高科(北京)数码科技有限责任公司 | Mark formed by dot matrixes and two-dimensional code and generation and identification method of mark |
CN104392260A (en) * | 2014-12-17 | 2015-03-04 | 肖学静 | Two-dimensional code anti-counterfeiting method based on additional information |
CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299245A (en) * | 2008-06-20 | 2008-11-05 | 王立国 | Bar code false proof card |
CN102236810A (en) * | 2010-04-23 | 2011-11-09 | 富港电子(昆山)有限公司 | QR (Quick Response) code with hidden codes, and formation and identification methods of hidden codes |
CN102887003B (en) * | 2011-07-21 | 2017-09-05 | 天津阿波罗电子有限公司 | A kind of laser beam marking method of New Two Dimensional bar code |
CN102842053B (en) * | 2012-08-21 | 2015-08-19 | 吉林省通程科技有限公司 | A kind of false proof figure code label and manufacture method thereof |
CN103226723B (en) * | 2013-04-26 | 2015-12-23 | 鸿博股份有限公司 | A kind of can the combined two-dimension code anti-counterfeiting method of anti-copying |
CN104700139A (en) * | 2013-12-06 | 2015-06-10 | 北京慧眼智行科技有限公司 | Method and device for generating bar code groups |
CN105335858B (en) * | 2014-08-13 | 2019-03-15 | 北大方正集团有限公司 | The method for anti-counterfeit and system of anti-copying QR code |
-
2017
- 2017-10-19 CN CN201710976043.7A patent/CN107944526B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103794135A (en) * | 2014-02-17 | 2014-05-14 | 立德高科(北京)数码科技有限责任公司 | Mark formed by dot matrixes and two-dimensional code and generation and identification method of mark |
CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
CN104392260A (en) * | 2014-12-17 | 2015-03-04 | 肖学静 | Two-dimensional code anti-counterfeiting method based on additional information |
Also Published As
Publication number | Publication date |
---|---|
CN107944526A (en) | 2018-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107944526B (en) | Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method | |
CN103198344B (en) | Tax control secure two-dimensional code coding, decoding processing method | |
CN105229965B (en) | Equipment identification system and equipment authenticating method | |
US6111953A (en) | Method and apparatus for authenticating a document | |
TWI718567B (en) | Two-dimensional code generation method, data processing method, device, server and computer readable storage medium | |
CN102164037B (en) | Digital signing system and method | |
WO2017016318A1 (en) | Credible label generation and verification method and system based on asymmetric cryptographic algorithm | |
CN107613316B (en) | Live network push stream verification method and system | |
CN102750510A (en) | Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm | |
KR101450291B1 (en) | Server for authenticating smart chips and method thereof | |
CN106953732B (en) | Key management system and method for chip card | |
CN104680202A (en) | Methods for generating and verifying two-dimension code of invoice | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
CN109635610A (en) | The read-write system and method for RFID tag data | |
CN104322003A (en) | Cryptographic authentication and identification method using real-time encryption | |
CN102004986A (en) | Product anti-counterfeiting method based on digital signature and public key system and verifying method | |
CN103810457A (en) | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code | |
CN111539496A (en) | Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system | |
CN106529977A (en) | Anti-counterfeiting method and system with support of terminal memory based on WeChat public account | |
JP2015213288A (en) | Optical code, information transmission method, and authentication method | |
US7916863B2 (en) | Security printing method and system for enhancing security printing | |
CN117527419A (en) | Safety transmission method for identification data | |
CN114726536B (en) | Time stamp generation method and device, electronic equipment and storage medium | |
CN111866547B (en) | Novel video tamper-proofing method | |
CN105490814A (en) | Ticket real name authentication method and system based on three-dimensional code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |