CN109272090B - Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof - Google Patents
Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof Download PDFInfo
- Publication number
- CN109272090B CN109272090B CN201810869839.7A CN201810869839A CN109272090B CN 109272090 B CN109272090 B CN 109272090B CN 201810869839 A CN201810869839 A CN 201810869839A CN 109272090 B CN109272090 B CN 109272090B
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- data
- encrypted information
- optical
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Finance (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Development Economics (AREA)
- Toxicology (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention relates to a two-dimensional code, a modulation encryption method and a production identification system thereof, wherein the modulation encryption method comprises the following steps: step S1: generating a two-dimensional code graph; step S2: printing the generated two-dimensional code graph by using optical ink; the optical gradient material is added in the optical ink, and accounts for less than 70% of the total volume of the optical ink, so that only part of matrix points in the printed two-dimensional code graph have optical gradient characteristics, and the positions of the matrix points having the optical gradient characteristics are random. The invention prints the two-dimensional code graph by the optical ink covered randomly, and the randomness of the position and color angle effect of the optical gradient material in the optical ink fundamentally avoids the phenomenon that counterfeiters copy the two-dimensional codes of products in batches, so that the products do not need to be covered with the two-dimensional codes before being sold, and can be checked and checked at any time in the whole links of delivery, transportation and sale of the products.
Description
Technical Field
The invention relates to the technical field of data acquisition and information processing safety, in particular to an anti-counterfeiting two-dimensional code, an optical modulation encryption method and a production application system thereof.
Background
Two-dimensional codes have gained attention from many countries since birth as a technology for storing, transferring and identifying information. It is understood that countries such as the united states, germany, japan, mexico, egypt, columbia, barren, singapore, philippines, south africa, canada, etc., apply the two-dimensional code technology to the management of various certificates in departments such as public security, external transportation, military, etc., and apply the two-dimensional code technology to the management of various newspapers and bills in departments such as customs, tax, etc., the management of goods and goods transportation in departments such as business, transportation, etc., the management of postal parcels in postal departments, and the automated management of industrial production lines in the field of industrial production. The application of the two-dimensional code greatly improves the speed of data acquisition and information processing, improves the working and living environments of people, and makes important contribution to the scientification and modernization of management.
The matrix type two-dimensional bar code is formed in a matrix form, on the corresponding element position of the matrix, binary '1' is represented by the appearance of a point (4070t), binary '0' is not represented, and the arrangement combination of the points determines the meaning represented by the matrix code. Where the dots may be squares, dots or other shaped dots. The matrix code is a code system which is established on the basis of computer image processing technology, combined coding principle and the like and can automatically identify graphic symbols, the two-dimensional code is scanned through a mobile phone photographing function, information stored in the two-dimensional code is quickly acquired, and surfing the internet, sending short messages, dialing, data exchange, automatic character input, commodity tracing and anti-counterfeiting and the like are carried out. However, the existing two-dimensional code still has some defects and technical problems in the application process of the anti-counterfeiting label:
firstly, the common two-dimensional code has no anti-counterfeiting function: because the two-dimension code standard is open, anyone can generate the two-dimension code label according to the appointed character string only by knowing the two-dimension code coding method, so that the two-dimension code label is printed or pasted on the commodity only by the information of product numbers, enterprise websites and the like, and the batch imitation can be simply carried out.
Secondly, the current anti-counterfeiting two-dimensional code scheme: most of the existing two-dimensional code anti-counterfeiting labels cover a part or all of two-dimensional codes by scraping ink so as to prevent information leakage. This technique has the following problems:
1) and the query is complex: because the label two-dimension code is covered, the consumer can obtain the result after several steps; (1) scraping off ink, scanning a two-dimensional code, logging in an anti-counterfeiting inquiry platform of a merchant or making a call, inputting a verification password with more than 10 digits, and receiving an inspection result.
2) The goods can not be checked by inspectors before being sold; once the covered two-dimensional code label is scraped, the piece of commodity cannot be listed and circulated. The tag cannot be used for merchandise inspection and supervision.
3) Due to the fact that the two-dimension code label is covered, commodity process management such as logistics and tracing needs an additional independent two-dimension code; the repeated printing causes time and cost waste, and simultaneously causes that the authenticity of the commodities can not be judged in the logistics and tracing management process.
4) The consumer can only scratch off the ink after purchasing the commodity, so that the authenticity of the product cannot be detected before purchasing the commodity.
5) Most of the query platforms are built at the webpage end, so that a fake producer is provided with a good chance of simulating the webpage, a webpage is simply copied, and a phishing website is built, so that consumers can log in to query all real commodities.
Therefore, a new method for generating a two-dimensional code is urgently needed to solve the above problems.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides an optical modulation encryption method of a two-dimensional code, which comprises the following steps:
step S1: generating a two-dimensional code graph;
step S2: printing the generated two-dimensional code graph by using optical ink;
the optical gradient material is added in the optical ink, and accounts for less than 90% of the total volume of the optical ink, so that only part of matrix points in the printed two-dimensional code graph have optical gradient characteristics, and the positions of the matrix points having the optical gradient characteristics are random.
Wherein the coded data for each matrix point for which an optically gradient characteristic exists is obtained by:
step S3: acquiring row change and column change marks of matrix points;
step S4: acquiring a starting point of color change of a matrix point mark;
step S5: acquiring an end point of the color change of the matrix point mark;
step S6: acquiring a type mark with color change of a matrix point mark;
step S7: and calculating color difference dot matrix data of matrix points according to the data information acquired in the steps S3-S6.
In step S1, the two-dimensional code pattern is generated by:
step S11: encoding basic two-dimensional Code data by adopting a QR Code encoding method to obtain a basic two-dimensional Code graph;
step S12: randomly generating a string of random sequences;
step S13: selecting an anti-counterfeiting coding region with the size of n multiplied by n from the basic two-dimensional code pattern according to the random sequence;
step S14: dividing the anti-counterfeiting coding region into an encrypted information generation region with the size of n multiplied by m and an encrypted information verification region with the size of n multiplied by k, wherein m + k = n;
step S15: according to the random sequence, regenerating binary data in the encrypted information generation area so as to obtain a modulated and encrypted two-dimensional code graph;
in step S14, the data in the encrypted information check area is consistent with the basic two-dimensional code data generated in this area in step S11;
the verification method of the encrypted information verification area comprises the following steps: in the process of scanning the two-dimensional code, if certain two-dimensional code data in the scanned encrypted information generation area is inconsistent with the two-dimensional code data generated in the modulation encryption stage, comparing verification two-dimensional code data corresponding to the inconsistent two-dimensional code data in the encrypted information verification area, and under the condition that the verification two-dimensional code data corresponding to the encrypted information verification area are consistent, considering that the two-dimensional code data in the encrypted information generation area are correct.
In step S14, an encrypted information generation area and an encrypted information verification area are generated by transversely cutting the anti-counterfeiting coding area, where m and k represent the number of two-dimensional code matrix points occupied by the encrypted information generation area and the encrypted information verification area in the vertical direction, respectively;
or the anti-counterfeiting coding region is longitudinally cut to generate an encrypted information generating region and an encrypted information verifying region, wherein m and k respectively represent the number of two-dimensional code matrix points occupied by the encrypted information generating region and the encrypted information verifying region in the horizontal direction.
Wherein k > m such that each encrypted binary data in the encryption information generation area corresponds to at least two check data.
In step S15, the binary data in the encryption information generation area is regenerated according to the random sequence by the XOR algorithm.
The invention further provides an anti-counterfeiting two-dimensional code which is generated by the optical modulation encryption method of the two-dimensional code.
The invention also provides a production application system of the two-dimensional code, which comprises a production system, a service system and an application system, wherein,
the production system is used for sequentially completing data generation, data acquisition and data management of the two-dimensional code, wherein the two-dimensional code is generated by any one of the optical modulation encryption methods of the two-dimensional code;
the service system is connected with the production system and the application system and used for receiving the two-dimensional code data generated by the production system and providing the two-dimensional code data to the application system as a basis for judging the authenticity of the product;
the application system is used for scanning the two-dimensional code of the product and combining the two-dimensional code data provided by the service system to judge the authenticity of the product.
Wherein the production system comprises a data generation module, a data acquisition module and a data management module which are connected in sequence, wherein,
the data acquisition module is used for acquiring the two-dimensional code data generated by the data generation module, and the data management module is used for storing the two-dimensional code data acquired by the data acquisition module into the production database and managing the two-dimensional code data;
the service system includes:
the data receiving module is connected with the data acquisition module of the production system and used for receiving the two-dimensional code data generated by the production system and storing the two-dimensional code data into the anti-counterfeiting database;
the data management module is connected with the anti-counterfeiting database and is used for managing the two-dimensional code data generated by the production system;
the data support module is connected with the anti-counterfeiting database and the application system and used for acquiring the two-dimensional code data in the anti-counterfeiting database and providing the two-dimensional code data for the application system to identify authenticity;
the application system comprises a true and false identification module, a data management module and a product data acquisition module which are connected in sequence, wherein,
the product data acquisition module is used for scanning and acquiring two-dimensional code data of the product, and comparing the two-dimensional code data with two-dimensional code data generated by the corresponding product in production, which is acquired from the data support module of the service system by the authenticity identification module after the two-dimensional code data is processed by the data management module so as to identify the authenticity of the product.
According to the two-dimensional code, the modulation and encryption method and the production identification system provided by the invention, the two-dimensional code graph is printed by the optical ink which is randomly covered, and the randomness of the optical gradient material position and the color angle effect in the optical ink fundamentally avoids the phenomenon that counterfeiters copy the two-dimensional codes of products in batches, so that the products do not need to be covered with the two-dimensional codes before being sold, and the products can be checked and checked at any time in the whole process of delivery, transportation and sale.
Drawings
FIG. 1: the situation of vertical cutting of the anti-counterfeiting coding region;
FIG. 2: the situation of transverse cutting of the anti-counterfeiting coding region;
FIG. 3: the corresponding situation of the encryption point and the check point in the anti-counterfeiting coding region;
FIG. 4: the invention provides a system architecture diagram of a two-dimensional code production application system.
Description of the reference numerals
10-encrypted information generation area, 20-encrypted information verification area, 30-encrypted point, 40-verification point, 50-production system, 51-data generation module, 52-data acquisition module, 53-data management module, 54-production database, 60-service system, 61-data receiving module, 62-data support module, 63-data management module, 64-anti-counterfeiting database, 70-application system, 71-authenticity identification module, 72-product data acquisition module and 73-data management module.
Detailed Description
In order to further understand the technical scheme and the advantages of the present invention, the following detailed description of the technical scheme and the advantages thereof is provided in conjunction with the accompanying drawings.
The invention firstly provides an optical modulation encryption method of a two-dimensional code, which is conceptualized in that a two-dimensional code pattern is printed by ink mixed with an optical gradient material, and the optical gradient material has the particularity that: when the two-dimensional code is viewed or viewed in a side view under white light, two different colors can be presented along with the change of the visual angle of human eyes, the colors are continuously gradually changed, the light variability characteristic is strong, the color difference change is large, the characteristics are obvious, and a certain change rule exists along with the change of the visual angle; the color angle effect cannot be reproduced with high definition scanners, color copiers and other equipment, and the printing characteristics cannot be imitated with any other inks and printing methods.
Therefore, the phenomenon that a counterfeiter imitates the two-dimensional code is fundamentally avoided by printing the two-dimensional code graph through the ink mixed with the optical gradient material.
Before the printing of the two-dimensional code graph, the invention also re-edits the binary data in the existing two-dimensional code graph which can be copied in batch through the randomly generated digital sequence so as to combine with the optical ink, thereby playing a role of 'double insurance' on the safety of the two-dimensional code.
For example, taking the existing two-dimension code encoding method as an example, the data information corresponding to the two-dimension code graph of a certain batch of products is as follows:
XXXPOPOPO……001;
XXXPOPOPO……002;
XXXPOPOPO……003;
……
XXXPOPOPO……100。
because the two-dimensional Code patterns of all products are coded by the existing QR Code method, the information is similar, and only the last sequence number is inconsistent, a counterfeiter only needs to decode the two-dimensional Code pattern of the first product to obtain the information XXXPOPPO … … 001 behind the first product, and then the information of the rest products can be obtained in batches, and the two-dimensional Code data corresponding to the information of the whole batch of products is counterfeited in batches.
If the binary data of the two-dimensional Code obtained by encoding according to the QR Code method is re-encoded by adopting the random sequence, even if a counterfeiter decodes the final two-dimensional Code graph of the first product by using the existing encoding method, the obtained information is not the real information of the product; once again, even if the counterfeiter obtains the real information behind the first product, because the two-dimensional code patterns of the whole batch of products are recoded through respective random sequences, the counterfeiter cannot imitate the binary data of the two-dimensional codes corresponding to the whole batch of products according to the information of the first product.
The invention relates to an optical modulation encryption method of a two-dimensional code, which comprises the following concrete implementation methods:
step S1: encoding basic two-dimensional Code data by adopting a QR Code encoding method to obtain a basic two-dimensional Code graph;
step S2: randomly generating a string of random sequences;
step S3: selecting an anti-counterfeiting coding region with the size of n multiplied by n from the basic two-dimensional code pattern according to the random sequence;
step S4: dividing the anti-counterfeiting coding region into an encrypted information generation region with the size of n multiplied by m and an encrypted information verification region with the size of n multiplied by k, wherein m + k = n;
step S5: regenerating binary data in the encryption information generation area according to the random sequence through an XOR algorithm to obtain a modulated and encrypted two-dimensional code graph;
step S6: printing the generated two-dimensional code graph by using optical ink mixed with an optical gradient material; in the concrete implementation, the optical gradual change material can be randomly sprayed on the common ink before the two-dimensional code graph is not completely dried after the common ink is used for printing.
Taking the generated random sequence as 85654873 and the size of the anti-counterfeiting coding region as 16 × 16 as an example, assuming that the method for selecting the anti-counterfeiting coding region according to the random sequence is to determine the position of the anti-counterfeiting coding region by the first two digits of the random sequence, the first digit of the random sequence corresponds to the horizontal position of the two-dimensional code matrix corresponding to the uppermost part of the anti-counterfeiting coding region, and the second digit of the random sequence corresponds to the vertical position of the two-dimensional code matrix corresponding to the leftmost part of the anti-counterfeiting coding region, then a region with the size of 16 × 16 is selected as the anti-counterfeiting coding region in the 8 th row and the 5 th row of the two-dimensional code matrix.
In practice, of course, the generation of the random sequence is not limited to the above mentioned case of being limited to eight numbers, and when the position of the anti-counterfeiting coding region is selected according to the random sequence, the adopted method may involve a more complex algorithm.
Because the two-dimensional code has the influence of various random factors such as scanning angle, scanning light, scanning terminal sensitivity and the like in the scanning process, the situation that information identification is slow or information identification is wrong due to inaccurate scanning data often occurs, the reason for the situation is that a plurality of binary points exist in a two-dimensional code graph, and during scanning, deviation exists in identification of a certain binary point, namely '1' is identified as '0', or '0' is identified as '1', so that the situation that the whole two-dimensional code cannot be identified is caused; therefore, aiming at the problems of the existing two-dimensional code, the anti-counterfeiting coding region is divided into the encrypted information generation region 10 and the encrypted information verification region 20, and the area of the encrypted information verification region 20 is larger than that of the encrypted information generation region 10, so that each newly generated binary point in the encrypted information generation region 10 corresponds to at least one verification point in the encrypted information verification region 20, and the verification accuracy is improved.
Still taking the anti-counterfeiting coding region with the size of 16 × 16 as an example, assuming that the sizes of the encryption information generation region 10 and the encryption information verification region 20 are 16 × 4 and 16 × 12, respectively, when the anti-counterfeiting coding region 20 is cut into the two regions, the anti-counterfeiting coding region can be cut horizontally (as shown in fig. 2) or vertically (as shown in fig. 1), and the selection of the horizontal cutting or the vertical cutting is still determined by a random sequence, for example, the 1 st digit and the 2 nd digit are required for selecting the anti-counterfeiting coding region 20, the cutting method of the anti-counterfeiting coding region 20 is determined by the parity of the 3 rd digit, for example, the vertical cutting is performed if the 3 rd digit is an odd number, and the horizontal cutting is performed if the 3 rd digit is an even number.
Similarly, when the cutting method of the anti-counterfeiting coding region is selected according to the random sequence, the selection process may involve a more complex algorithm, and the invention only lists a simpler example to help those skilled in the art understand that, in the specific implementation, all technical schemes of cutting the anti-counterfeiting coding region in the two-dimensional code pattern by using the random sequence belong to the protection scope of the invention.
Referring to fig. 3, in order to cut the graph of the anti-counterfeit coding region 20 of the encrypted information generation region 10 and the encrypted information verification region 20, each encrypted point 30 (binary point) in the encrypted information generation region 10 corresponds to three verification points 40 in the encrypted information verification region 20, in the specific implementation process, the selection method of the verification point 40 of each encrypted point 30 is still determined by a random sequence, and the determination method is not limited by the present invention. As shown in the figure, the encryption point 30 generated at the upper left corner in the encryption information generation area is "1", and there are three verification points 40 in the encryption information verification area: 1. 0 and 1, the verification method of the invention comprises the following steps:
when the mobile terminal scans the two-dimensional code, if the scanned encryption point 30 is 1 and the check point 40 is 1, 0, 1, the scanned four binary data are compared with the data stored in the server uniformly, and if other binary points are also consistent or are verified to be consistent, the product corresponding to the two-dimensional code is judged to be a genuine product.
If the scanned encryption point 30 is 0, the check point 40 is 1, 0, 1, and the binary data corresponding to the encryption point 30 is inconsistent with the data stored in the server, at this time, the three binary data of the scanned check point 40 are verified to be consistent with the data stored in the server, and if the other binary points are also consistent or verified to be consistent, the scanning of the encryption point 30 is considered to be wrong, and the product is still considered to be a genuine product.
Of course, if only two points of the verification point 40 coincide, the product can still be considered as genuine.
The verification method provided by the invention mainly considers that in the actual scanning process, scanning errors may occur at a certain point, but the scanning errors occur at a plurality of points rarely, so that the problem that the conventional two-dimensional code is slow to scan or inaccurate to scan can be solved by the technical scheme of verifying one encryption point by a plurality of verification points.
When the modulated and encrypted two-dimensional code graph is printed by using the optical ink, the camera acquires the unique random color information generated at each matrix point on the two-dimensional code graph and codes the unique random color information, the encoding is carried out in the same way at the scanning stage of a rear-end terminal system and the scanning stage of a rear-end mobile terminal, the encoding is compared with the previous encoding information, and the authenticity is judged, wherein the encoding method comprises the following steps:
step 10: acquiring row change marks and column change marks of matrix points, namely, randomly acquiring the position of each optical gradual change point on the two-dimensional code graph;
step 20: acquiring a starting point of color change of a matrix point mark, namely an optical gradual change point appearing on the whole two-dimensional code graph for the first time;
step 30: acquiring the end point of the color change of the matrix point mark, namely the last optical gradual change point on the whole two-dimensional code graph;
step 40: acquiring a type mark of color change of the matrix point mark, namely, randomly acquiring an integral color type of each optical gradual change point;
step 50: calculating color difference dot matrix data of matrix points according to the data information obtained in the steps S10-S40, wherein the significance of the step S10-S40, especially the step S40, is different due to the difference of angles and environments in the scanning process, and the calculation result in a relative value rather than an absolute value; that is, although the overall color of the optically gradient dots will change with the change of the external environment, the chromatic aberration dot matrix data of each dot relative to the external environment is consistent no matter how the external environment and the scanning angle change, so that the final chromatic aberration dot matrix data can be calculated to eliminate the data error caused by the angle or environment problem, thereby facilitating the comparison and identification of information.
When the random color information is coded, a plurality of matrix points with the optical gradient materials are randomly obtained for coding, and not all the matrix points with the optical gradient materials are coded. .
The invention further provides an anti-counterfeiting two-dimensional code which is generated by the modulation encryption method of the two-dimensional code.
Fig. 4 is a system architecture diagram of a two-dimensional code production application system for the two-dimensional code and the modulation encryption method thereof according to the present invention, which shows the whole process flow of the two-dimensional code of the present invention from generation to data acquisition to final code scanning identification and the corresponding device support. As shown in fig. 4, the two-dimensional code production and application system provided by the present invention includes a production system 50, a service system 60, and an application system 70, wherein,
the production system 50 comprises a data generation module 51, a data acquisition module 52 and a data management module 53 which are connected in sequence, wherein the data acquisition module 52 is used for acquiring two-dimensional code data generated by the data generation module 51, and the data management module 53 is used for storing the two-dimensional code data acquired by the data acquisition module 52 in a production database 54 and managing the two-dimensional code data, such as issuing, modifying, deleting or marking the data according to actual production needs; the data generating module 51 generates the two-dimensional code data by any one of the optical modulation encryption methods described above, and the data collecting module 52 may be, for example, a camera or the like for collecting random color information unique to each matrix point position on the two-dimensional code after the optical ink printing is completed.
The service system 60 includes a data receiving module 61, a data support module 62, and a data management module 63: the data receiving module 61 receives the two-dimensional code data collected by the data collecting module 52 in the production system 50 and stores the two-dimensional code data in the anti-counterfeiting database 64; the data management module 63 manages the two-dimensional code data in the anti-counterfeiting database 64, for example, the unique random color information at each matrix point position is encoded into encoded data; the data support module 62 then obtains the processed/encoded data from the anti-counterfeit database 64 and supplies the data to the application system 70 as a basis for identifying the authenticity of the product.
The authenticity identifying module 71 in the application system 70 obtains the encoded two-dimensional code data from the data support module 62 of the service system 60, the product data obtaining module 72 scans and obtains the two-dimensional code data of the product, and the data management module 73 processes the data obtained by the authenticity identifying module 71 and the product data obtaining module 72, for example: the random color information acquired by the product data acquisition module 72 is encoded into encoded data, or the encoded data in the two-dimensional code data acquired by the authenticity identification module 71 is decoded into corresponding random color information, so that the data formats acquired by the authenticity identification module 71 and the product data acquisition module 72 are kept consistent, and the authenticity of the product is conveniently identified.
In the invention, the QR Code is a matrix symbol developed by Denso company in 9 months of 1994, and the QR Code encoding method is based on the matrix symbol and is a method adopted by the existing two-dimensional Code encoding method.
In the invention, the XOR algorithm is also called as an XOR algorithm, and in the verification process, if the data are consistent, the calculation result is 1, and if the data are inconsistent, the calculation result is 0.
In the present invention, the "two-dimensional code data" includes all the direct or indirect data formed in the two-dimensional code generation stage, such as: binary data of each matrix point on the two-dimensional code, optical gradient characteristic information (also called random color information) data, coded data obtained by coding the optical gradient characteristic information, and the like.
In the present invention, the term "optically graded material" refers to any material whose color can be regularly graded according to the viewing angle.
The invention has the following beneficial effects:
1. by mixing the optical gradient material in the printing ink, the randomness of the distribution positions of the optical gradient material on matrix points and the irreversibility and irreproducibility of color angle effects are utilized, and the phenomenon that a counterfeiter imitates the two-dimensional code is fundamentally avoided, so that the product does not need to cover the two-dimensional code before being sold, and the product can be checked and checked at any time in the whole links of delivery, transportation and sale.
2. The graph data of the two-dimensional code is recoded by utilizing the randomly generated random sequence, so that the phenomenon that a counterfeiter copies the two-dimensional code of the product in batches is fundamentally avoided, the two-dimensional code does not need to be covered before the product is sold, and the product can be checked and checked at any time in the whole links of delivery, transportation and sale.
3. The situation that the scanning of the existing two-dimensional code is slow or the scanning is wrong easily occurs in the scanning process is solved through the verification function of the encrypted information verification area on the encrypted information generation area.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that the scope of the present invention is not limited thereto, and those skilled in the art will appreciate that various changes and modifications can be made without departing from the spirit and scope of the present invention.
Claims (8)
1. An optical modulation encryption method of a two-dimensional code is characterized by comprising the following steps:
step S1: generating a two-dimensional code graph;
step S2: printing the generated two-dimensional code graph by using optical ink;
the optical gradient material is added in the optical ink, and accounts for less than 10% of the total volume of the optical ink, so that only part of matrix points in the printed two-dimensional code graph have optical gradient characteristics, and the positions of the matrix points with the optical gradient characteristics are random;
the coded data for each matrix point for which an optically gradient characteristic exists is obtained by:
step S3: acquiring row change and column change marks of matrix points;
step S4: acquiring a starting point of color change of a matrix point mark;
step S5: acquiring an end point of the color change of the matrix point mark;
step S6: acquiring a type mark with color change of a matrix point mark;
step S7: calculating color difference dot matrix data of matrix points according to the data information obtained in the step S3-the step S6;
in step S1, the two-dimensional code pattern is generated by:
step S11: encoding basic two-dimensional Code data by adopting a QR Code encoding method to obtain a basic two-dimensional Code graph;
step S12: randomly generating a string of random sequences;
step S13: selecting an anti-counterfeiting coding region with the size of n multiplied by n from the basic two-dimensional code pattern according to the random sequence;
step S14: dividing the anti-counterfeiting coding region into an encrypted information generation region with the size of n multiplied by m and an encrypted information verification region with the size of n multiplied by k, wherein m + k = n;
step S15: and regenerating binary data in the encryption information generation area according to the random sequence, thereby obtaining the two-dimensional code graph after modulation and encryption.
2. The optical modulation encryption method of a two-dimensional code according to claim 1, characterized in that: in step S14, the data in the encrypted information verification area is consistent with the basic two-dimensional code data generated in this area in step S11;
the verification method of the encrypted information verification area comprises the following steps: in the process of scanning the two-dimensional code, if certain two-dimensional code data in the scanned encrypted information generation area is inconsistent with the two-dimensional code data generated in the modulation encryption stage, comparing verification two-dimensional code data corresponding to the inconsistent two-dimensional code data in the encrypted information verification area, and under the condition that the verification two-dimensional code data corresponding to the encrypted information verification area are consistent, considering that the two-dimensional code data in the encrypted information generation area are correct.
3. The optical modulation encryption method of a two-dimensional code according to claim 1, characterized in that: in the step S14, the anti-counterfeit coding region is transversely cut to generate an encrypted information generation region and an encrypted information verification region, where m and k represent the number of two-dimensional code matrix points occupied by the encrypted information generation region and the encrypted information verification region in the vertical direction, respectively;
or the anti-counterfeiting coding region is longitudinally cut to generate an encrypted information generating region and an encrypted information verifying region, wherein m and k respectively represent the number of two-dimensional code matrix points occupied by the encrypted information generating region and the encrypted information verifying region in the horizontal direction.
4. The optical modulation encryption method of a two-dimensional code according to any one of claims 1 to 3, characterized in that: k > m so that each encrypted binary data in the encryption information generation area corresponds to at least two check data.
5. The optical modulation encryption method of a two-dimensional code according to any one of claims 1 to 3, characterized in that: in step S15, the binary data in the encryption information generation area is regenerated according to the random sequence by the XOR algorithm.
6. The utility model provides a modulation encryption device of anti-fake two-dimensional code which characterized in that: an anti-counterfeiting two-dimensional code is generated by the optical modulation encryption method of the two-dimensional code according to any one of claims 1 to 5.
7. The utility model provides a production application system of two-dimensional code which characterized in that: comprises a production system, a service system and an application system, wherein,
the production system is used for sequentially completing data generation, data acquisition and data management of the two-dimensional code, wherein the two-dimensional code is generated by the optical modulation encryption method of the two-dimensional code according to any one of claims 1-5;
the service system is connected with the production system and the application system and used for receiving the two-dimensional code data generated by the production system and providing the two-dimensional code data to the application system as a basis for judging the authenticity of the product;
the application system is used for scanning the two-dimensional code of the product and combining the two-dimensional code data provided by the service system to judge the authenticity of the product.
8. The two-dimensional code production application system according to claim 7, wherein:
the production system comprises a data generation module, a data acquisition module and a data management module which are connected in sequence, wherein,
the data acquisition module is used for acquiring the two-dimensional code data generated by the data generation module, and the data management module is used for storing the two-dimensional code data acquired by the data acquisition module into the production database and managing the two-dimensional code data;
the service system includes:
the data receiving module is connected with the data acquisition module of the production system and used for receiving the two-dimensional code data generated by the production system and storing the two-dimensional code data into the anti-counterfeiting database;
the data management module is connected with the anti-counterfeiting database and is used for managing the two-dimensional code data generated by the production system;
the data support module is connected with the anti-counterfeiting database and the application system and used for acquiring the two-dimensional code data in the anti-counterfeiting database and providing the two-dimensional code data for the application system to identify authenticity;
the application system comprises a true and false identification module, a data management module and a product data acquisition module which are connected in sequence, wherein,
the product data acquisition module is used for scanning and acquiring two-dimensional code data of the product, and comparing the two-dimensional code data with two-dimensional code data generated by the corresponding product in production, which is acquired from the data support module of the service system by the authenticity identification module after the two-dimensional code data is processed by the data management module so as to identify the authenticity of the product.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810869839.7A CN109272090B (en) | 2018-08-02 | 2018-08-02 | Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810869839.7A CN109272090B (en) | 2018-08-02 | 2018-08-02 | Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109272090A CN109272090A (en) | 2019-01-25 |
CN109272090B true CN109272090B (en) | 2021-07-23 |
Family
ID=65150359
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810869839.7A Active CN109272090B (en) | 2018-08-02 | 2018-08-02 | Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109272090B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770729A (en) * | 2008-12-31 | 2010-07-07 | 郑阿奇 | Two-dimension code anti-counterfeit Internet access product and method thereof |
CN101807363A (en) * | 2009-02-13 | 2010-08-18 | 郑阿奇 | Self-certification anti-counterfeiting method |
CN202795416U (en) * | 2012-08-23 | 2013-03-13 | 晏华艳 | False-proof identification system based on two-dimensional bar code |
CN103218632A (en) * | 2011-10-10 | 2013-07-24 | 佐泰格股份有限公司 | Method, system, and label for authenticating objects |
CN103310256A (en) * | 2013-06-03 | 2013-09-18 | 何南炎 | Methods for preparing and identifying continuous-real-object anti-counterfeit label based on image contrast |
CN103310252A (en) * | 2012-10-29 | 2013-09-18 | 成都菲普迪斯科技有限公司 | CCQR (Colorful Coded Quick Response) anti-counterfeiting mark |
CN104239928A (en) * | 2014-08-27 | 2014-12-24 | 云南恩典科技产业发展有限公司 | Anti-counterfeiting printed matter and corresponding anti-counterfeiting method |
CN105069498A (en) * | 2015-09-09 | 2015-11-18 | 杭州甄别网络科技有限公司 | Two-dimensional code color encryption method and device |
CN105205520A (en) * | 2015-09-30 | 2015-12-30 | 立德高科(昆山)数码科技有限责任公司 | Two-dimensional code with color gradient effect, generating method and generating system |
CN108711358A (en) * | 2018-05-15 | 2018-10-26 | 中钞油墨有限公司 | A kind of individualized security element |
-
2018
- 2018-08-02 CN CN201810869839.7A patent/CN109272090B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770729A (en) * | 2008-12-31 | 2010-07-07 | 郑阿奇 | Two-dimension code anti-counterfeit Internet access product and method thereof |
CN101807363A (en) * | 2009-02-13 | 2010-08-18 | 郑阿奇 | Self-certification anti-counterfeiting method |
CN103218632A (en) * | 2011-10-10 | 2013-07-24 | 佐泰格股份有限公司 | Method, system, and label for authenticating objects |
CN202795416U (en) * | 2012-08-23 | 2013-03-13 | 晏华艳 | False-proof identification system based on two-dimensional bar code |
CN103310252A (en) * | 2012-10-29 | 2013-09-18 | 成都菲普迪斯科技有限公司 | CCQR (Colorful Coded Quick Response) anti-counterfeiting mark |
CN103310256A (en) * | 2013-06-03 | 2013-09-18 | 何南炎 | Methods for preparing and identifying continuous-real-object anti-counterfeit label based on image contrast |
CN104239928A (en) * | 2014-08-27 | 2014-12-24 | 云南恩典科技产业发展有限公司 | Anti-counterfeiting printed matter and corresponding anti-counterfeiting method |
CN105069498A (en) * | 2015-09-09 | 2015-11-18 | 杭州甄别网络科技有限公司 | Two-dimensional code color encryption method and device |
CN105205520A (en) * | 2015-09-30 | 2015-12-30 | 立德高科(昆山)数码科技有限责任公司 | Two-dimensional code with color gradient effect, generating method and generating system |
CN108711358A (en) * | 2018-05-15 | 2018-10-26 | 中钞油墨有限公司 | A kind of individualized security element |
Also Published As
Publication number | Publication date |
---|---|
CN109272090A (en) | 2019-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109190736B (en) | Anti-counterfeiting two-dimensional code and generation method and generation application system thereof | |
US10235618B2 (en) | Authentication feature in a barcode | |
CN108229596B (en) | Combined two-dimensional code, electronic certificate carrier, generating and reading device and method | |
US9594993B2 (en) | Two dimensional barcode and method of authentication of such barcode | |
CN103310252B (en) | CCQR (Colorful Coded Quick Response) anti-counterfeiting mark | |
EP1869624B1 (en) | A secure printing method to thwart counterfeiting | |
US20160321529A1 (en) | Producing, capturing and using visual identification tags for moving objects | |
CN111639734A (en) | Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method | |
US9934457B2 (en) | Method of securing a two-dimensional barcode | |
US9563830B2 (en) | Incremental information object with an embedded information region | |
KR101535534B1 (en) | A Creating and Verifying Method Of A Document Having Printed Means Of Preventing From Forging/Manipulating | |
CN103577986A (en) | Multi-level two-dimension code fake preventing method | |
CN109325568B (en) | Anti-counterfeiting two-dimensional code and modulation encryption method and identification system thereof | |
CN104794987A (en) | Two-dimension code anti-counterfeit label | |
CN113627577B (en) | Three-dimensional code generation method and anti-counterfeiting tracing system based on three-dimensional code | |
JP2017017673A (en) | How to protect the authenticity of objects, items, documents, packaging and / or labels from imitation, counterfeiting and theft | |
CN109831309A (en) | A kind of safety code principle and method with multiple-authentication | |
US9477853B2 (en) | Generating an incremental information object | |
US20150138608A1 (en) | System and Method for Printing a Hidden and Secure Barcode | |
CN109272090B (en) | Anti-counterfeiting two-dimensional code and optical modulation encryption method and production application system thereof | |
CN108847122A (en) | A kind of novel C CQR code anti-counterfeiting mark | |
CN113592518A (en) | Anti-counterfeiting traceability label generation and verification method based on coding rule and application | |
CN109299770B (en) | Anti-counterfeiting two-dimensional code and laser hologram encryption method and production application system thereof | |
CN103502996B (en) | Anti-double increment information object | |
US11200470B2 (en) | Method for checking a surface of an object, which surface is imprinted and/or structured in raster shape, and an object |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |