Magic square digital antifor method and its antiforge system

A magic square and digital technology, applied in the field of magic square digital anti-counterfeiting methods and anti-counterfeiting systems, can solve the problems of difficult to realize two-way verification of digital anti-counterfeiting query, low encryption and decryption efficiency, and attacks.

Inactive Publication Date: 2005-03-23
谢道裕
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 4) The encryption algorithm is vulnerable to "collision" or "birthday" attacks;
[0007] 5) The query rate is low
[0009] 1) Symmetric encryption algorithms such as DES, AES, IDEA, FEAL, etc., are not suitable for digital anti-counterfeiting technology due to the symmetry of the encryption and decryption process and the concentration of security risks; If the anti-counterfeiting code is too long, it is not suitable for digital anti-counterfeiting, and if the packet length is too short, such as DES (56 bits in binary or 17 bits in decimal), it is vulnerable to enumeration attacks;
[0010] 2) The public key cryptosystem generally adopts the modulus exponent operation of large integers, so it has several major disadvantages: the key pair generation efficiency is low, the encryption and decryption efficiency is low, the modulus is too long, and the length of the encryption result is uncertain
The query frequency of the digital anti-counterfeiting center is very high, and the low-efficiency public key cryptosystem will become the bottleneck in the digital anti-counterfeiting system; the use of a shorter modulus is not safe and easy to be broken; the low efficiency of key generation is not suitable for the commodity Pipeline operation, if a unified key pair is used to encrypt all anti-counterfeiting codes, because the security risk is concentrated on one key pair, it is vulnerable to attacks by cryptanalysts;
[0011] 3) One-way hash functions such as SHA, MD4, MD5, N-HASH, etc. are vulnerable to "collision" attacks,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Magic square digital antifor method and its antiforge system
  • Magic square digital antifor method and its antiforge system
  • Magic square digital antifor method and its antiforge system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0056] Referring to Fig. 2, it is another embodiment of the magic square digital anti-counterfeiting method, and its steps are as follows:

[0057] 1. Generate a commodity number N: 2541258024 according to the commodity elements (production period, batch, inspection level, raw materials, manufacturer code, commodity code, etc.), that is, give the commodity a unique name, and this number can also be serially numbered in sequence , and its length can be selected according to actual needs.

[0058] 2. Randomly construct a seventh-order magic square M for this numbered product, as shown in Figure 3. Then randomly generate a corresponding seven-order shuffled square matrix S for the magic square M, as shown in Figure 4. Shuffle the square matrix S to decompose the magic square M into defect magic square M 1 Complementary Defect Magic Square M 2 , see Figure 5 and Figure 6. Then convert the shuffling matrix S into a shuffling vector A: (1, 0, 1, 0, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a magic square number fake prevention method and system. Its steps are as follows: generate an exclusive number for each commodity; generate a magic square over seven ranks for each commodity at random, the magic square is divided into two complement lacuna magic squaresú¿M1,M2ú® by passing random riffle matrix whose element is 0 or 1 and true or false check vector V2 is orderly composed by numbers in lacuna magic squares M1 and M2 and memorized into fake prevent data center; Riffle matrix is converted into tens digits as fake prevent code of the commodity; label containing commodity number and fake prevent code is made for commodity and covers the fake prevent code; through query code inputting equipment, user inputs commodity and fake prevent code into true or false check equipment to recover magic square, if it can be recovered and it is the first query, the commodity is true, or it is false. Characters of the invention are that its coding arithmetic can be disclosed, security is high and it is easy to implement.

Description

technical field [0001] The invention relates to a digital anti-counterfeiting method, in particular to a magic square digital anti-counterfeiting method and an anti-counterfeiting system thereof. Background technique [0002] There are many kinds of anti-counterfeiting methods for existing commodities, such as common laser anti-counterfeiting, DNA reagent anti-counterfeiting, magnetic ink anti-counterfeiting, temperature-changing anti-counterfeiting, bar codes, and recently more popular digital anti-counterfeiting technologies. With the rapid development of science and technology, physical anti-counterfeiting technologies such as laser anti-counterfeiting and barcodes are very easy to be copied, and ordinary consumers generally cannot recognize the authenticity of laser anti-counterfeiting and other signs. Therefore, traditional anti-counterfeiting technologies have serious defects and it is difficult to achieve anti-counterfeiting. Purpose. Digital anti-counterfeiting tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00
Inventor 谢道裕
Owner 谢道裕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products