Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)

A two-dimensional code, product technology, applied in the fields of cryptography, product anti-counterfeiting and food and drug safety, can solve the problem of impossible to determine the input value and so on

Inactive Publication Date: 2012-11-28
袁开国
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This conversion is a compressed mapping, that is, the space of the hash value is usually much smaller than the space of the input. Different inputs may generate the same output, but it is impossible to uniquely determine the input value from the hash value.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Through the technical solution of the invention, the user can easily confirm whether the product he purchased is produced by the manufacturer marked on the package, as well as other relevant information of the product, thereby confirming the authenticity of the product. The solution uses the mobile phone as a two-dimensional code verification tool for implementation, and the specific implementation plan is as follows:

[0019] (1) The manufacturer's CA system applies, and the CA system provides the private key and the corresponding digital certificate. The private key is stored in the USB KEY physical device and provided to the manufacturer.

[0020] (2) The manufacturer inputs the plain text of the manufacturer and its product information (referred to as product information) to the two-dimensional code generation module, and the generation module generates the following two sets of data according to the input information: the ciphertext encrypted by the private key of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure). A product manufacturer respectively prints one or more credible two-dimensional codes at the outer side of a product package (named as visible two-dimensional codes), and prints one or more credible two-dimensional codes or ordinary two-dimensional codes at the inner side of the product package simultaneously, or tightly covers the printed two-dimensional codes by using other non-transparent media (named as hidden two-dimensional codes). A user can verify the visible two-dimensional codes through a two-dimensional code verification module, so as to primarily determine whether the product to be true or false. The scheme provided by the invention provides a method for simply, conveniently and rapidly judging the truth of the product. Shown by a picture, the scheme at least consists of a product source tracing center module, a CA (Certificate Authority) module, a two-dimensional code generation module and the two-dimensional code verification module.

Description

technical field [0001] The present invention relates to the fields of cryptography, product anti-counterfeiting, and food and drug safety. Specifically, the present invention provides a PKI (Public Key Infrastructure: public key infrastructure)-based anti-counterfeiting scheme for dual-dimensional code products. Background technique [0002] PKI is a new security technology, which is composed of basic components such as public key cryptography, digital certificate (Certificate), CA. PKI public key infrastructure is a system or platform that provides public key encryption and digital signature services for the purpose of managing keys and certificates. An organization can establish a secure network environment by adopting the PKI framework to manage keys and certificates. PKI mainly includes four parts: certificate in X.509 format and certificate revocation list CRL; CA operation agreement; CA management agreement; CA policy formulation. A typical, complete and effective PK...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
Inventor 袁开国袁静国刘强
Owner 袁开国
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products