Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method for generating commodity anti-counterfeit two-dimensional code

A technology of two-dimensional codes and commodities, which is applied in the field of digital anti-counterfeiting and can solve problems such as the use of criminals

Active Publication Date: 2019-01-29
NANTONG UNIVERSITY
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing digital anti-counterfeiting technology basically uses a pseudo-random sequence or an ordered serial number to generate a commodity anti-counterfeiting code through DES symmetric encryption, which has certain differences with the performance requirements of the commodity anti-counterfeiting code "unforgeability and uniqueness" in digital anti-counterfeiting technology. Due to the gap, some commodities using digital anti-counterfeiting technology will still be used by some criminals; at the same time, with the popularization of smart phones and the increasing application of QR codes, the anti-counterfeiting QR codes of commodities contain a large amount of information and are convenient for anti-counterfeiting inquiries. characteristics, gradually welcomed by the majority of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating commodity anti-counterfeit two-dimensional code
  • A method for generating commodity anti-counterfeit two-dimensional code
  • A method for generating commodity anti-counterfeit two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] According to the method for generating an anti-counterfeiting QR code for a product in the above specific implementation, the steps are as follows:

[0073] (1) When the identity code of a commodity is coded as S="AB789 / ef12 2018-08-01 1234ab123456", the length L=34;

[0074] (2) Convert the commodity identity code S into ASCII code numeric data, and obtain the numeric sequence P={65,66,55,56,57,47,101,102,49,50,32,50,48,49,56,45, 48,56,45,48,49,32,49,50,51,52,97,98,49,50,51,52,53,54}, calculate the numerical sequence PP=24, switch data

[0075] (3) Use the Gost algorithm encryption value G of the product ID code = "A2188326467B7D393179C54AD9541CEC7280EB3F515925EED5F3CD4C3569027D" and the switching data SK = 0, take the external key (α = -0.12345, β = 3), according to the product anti-counterfeiting 2 in the above specific implementation The formula in step (3) of the dimensional code generation method calculates the initial value x of the chaotic system 1 , The parameter ...

Embodiment 2

[0087] According to the method for generating an anti-counterfeiting QR code for a product in the above specific implementation, the steps are as follows:

[0088] (1) When the identity code of a commodity is coded as S="aB789 / ef12 2018-08-01 1234ab123456", the length L=34;

[0089] (2) Convert the commodity identity code S into ASCII code numerical data, and obtain the numerical sequence P={97,66,55,56,57,47,101,102,49,50,32,50,48,49,56,45, 48,56,45,48,49,32,49,50,51,52,97,98,49,50,51,52,53,54}, calculate the numerical sequence PP=56, switch data

[0090] (3) Use the Gost algorithm encryption value G of the product identity code = "65513A6CA6140912C783794DD6117BDBD1C65B13E7A21B6DA0B568CF20E2AFF6" and the switching data SK = 1, take the external key (α = -0.12345, β = 3), according to the above specific implementation of the product anti-counterfeiting two The formula in step (3) of the dimensional code generation method calculates the initial value x of the chaotic system 1 , Th...

Embodiment 3

[0099] According to the method for generating an anti-counterfeiting QR code for a product in the above specific implementation, the steps are as follows:

[0100] (1) When the identity code of a commodity is coded as S="AB789\ef12 2018-08-01 1234ab123456", the length L=34;

[0101] (2) Convert the commodity identity code S into ASCII code numerical data, and obtain the numerical sequence P={65,66,55,56,57,92,101,102,49,50,32,50,48,49,56,45, 48,56,45,48,49,32,49,50,51,52,97,98,49,50,51,52,53,54}, calculate the numerical sequence PP=107, switch data

[0102] (3) Use the Gost algorithm encryption value G of the product ID code = "2D72181E2FB6BA4BE150BC18F5D3BF87CDD12B5BFFB1C2A0641DD9C405812836" and the switching data SK = 2, take the external key (α = -0.12345, β = 3), according to the above specific implementation of the product anti-counterfeiting two The formula in step (3) of the dimensional code generation method calculates the initial value x of the chaotic system 1 , The par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a commodity anti-counterfeit two-dimensional code, which comprises the following steps: coding commodity identity information to generate a unique commodity identification code; converting the commodity identification code into numerical data and switching data; the initial value, parameters, initial iterative steps and iterative interval steps of the chaotic system are calculated by using commodity identity information and external key respectively, and the chaotic sequence is generated by iterating the Chebyshev chaotic tent map. According to the switching data, a certain operation is selected respectively, and the cipher characters in the corresponding relation table between the user-defined numerical data and the cipher characters are scrambled by using the scrambling rule of the position change before and after the chaotic signal sorting, thereby the commodity anti-counterfeit number is generated, and then the commodity anti-counterfeit two-dimensional code is combined to generate the commodity anti-counterfeit code. The method for generating that commodity anti-counterfeit two-dimensional code provided by the invention is simpleand feasible, has strong safety, is difficult to crack, and the generate commodity anti-counterfeit two-dimensional code has uniqueness and non-forgery.

Description

Technical field [0001] The invention relates to the field of digital anti-counterfeiting technology, in particular to a method for generating anti-counterfeiting two-dimensional codes for commodities. Background technique [0002] In today's society, the counterfeiting of commodities has gradually become a serious problem facing the global economy. The anti-counterfeiting situation in the 21st century is particularly severe. As counterfeiting technology is becoming more sophisticated and counterfeiters are becoming more experienced, the appearance of counterfeit products is also constantly improving. , So there are higher requirements for digital anti-counterfeiting technology. However, the existing digital anti-counterfeiting technology basically uses a pseudo-random sequence or an ordered serial number to generate a product anti-counterfeiting code through DES symmetric encryption, which has certain performance requirements for the "unforgeability and uniqueness" of the product...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06
CPCG06K19/06037
Inventor 盛苏英陆国平张小美张振娟华亮吴新华周磊任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products