CN111639734B - Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code - Google Patents
Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code Download PDFInfo
- Publication number
- CN111639734B CN111639734B CN202010455714.7A CN202010455714A CN111639734B CN 111639734 B CN111639734 B CN 111639734B CN 202010455714 A CN202010455714 A CN 202010455714A CN 111639734 B CN111639734 B CN 111639734B
- Authority
- CN
- China
- Prior art keywords
- information
- commodity
- verification
- code
- visual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06056—Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Electromagnetism (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a novel two-dimensional code coding and anti-counterfeiting application method for embedding a QR code, which comprises the following steps: generating an information verification database for storing commodities at a verification center of a server side, wherein verification information is expressed as a triple of a commodity information link address, verification information and reserved visual codes; respectively compiling according to the triplet information at a server end to generate a novel anti-counterfeiting two-dimensional code embedded with the QR code, and fusing visual information; scanning an anti-counterfeiting two-dimensional code on the commodity by using a third-party QR code scanner at a user side, jumping the code scanner to a recognition program of the visual anti-counterfeiting two-dimensional code, and recognizing a commodity information link address and encrypted verification information; decrypting at the server side to obtain verification information, verifying commodity information, extracting reserved visual codes after verification is successful, and displaying the reserved visual codes to consumers for visual verification. The invention solves the problem of theft risk caused by the opening of the QR code coding standard, and the realized anti-counterfeiting two-dimensional code is simple and easy to identify, low in price and high in safety.
Description
Technical Field
The invention relates to a novel two-dimensional code coding and anti-counterfeiting application method embedded with QR (Quickly Response) codes, and belongs to the technical field of two-dimensional code image processing and application.
Background
In recent years, as the quality of life of people increases, there is an increasing interest in brands of goods. In order to improve the brand effect of the commodity, the merchant must prevent damage to the brand of the commodity caused by the excessive production of the counterfeit commodity, and therefore various means are adopted in the anti-counterfeiting operation of the commodity. The anti-counterfeiting is the verification of the enterprise product through the consumer anti-counterfeiting code inquiry center, and is a technical means for identifying the authenticity and preventing counterfeiting, alteration and cloning actions.
At present, the market capacity of the anti-counterfeiting industry in China reaches 8000 hundred million yuan. The anti-counterfeiting technology is used for more than 90% of medicines, more than 15% of foods and more than 95% of tobacco and wine products in the Chinese. The market capacity of the Chinese anti-counterfeiting industry will be further increased due to the vigorous downstream market demand.
At present, the common anti-counterfeiting technology mainly comprises laser label anti-counterfeiting, inquiry type anti-counterfeiting, texture anti-counterfeiting label, security thread anti-counterfeiting paper technology and the like, and in recent years, along with the rapid popularization of digital technology, the digital anti-counterfeiting technology is also widely applied. In conventional digital anti-counterfeiting, a unique authentication code is set for each commodity, and the code is stored in a central database. The consumer purchases the commodity attached with the medium-choice digital anti-counterfeiting mark, and can know the authenticity of the product by only dialing a telephone and inputting a password on the commodity, thereby breaking through the limitation that the traditional anti-counterfeiting product is easy to be prevented in batches and is not easy to be identified by the consumer.
The two-dimensional code anti-counterfeiting method is popular among many manufacturers because of the convenience of the two-dimensional code anti-counterfeiting method. The current two-dimensional code anti-counterfeiting technology is mainly finished by recording and reminding a user to check code scanning records according to the first code scanning behavior of a consumer, and is simple in principle and convenient for the user to use.
However, since the commonly used QR code is a completely open standard coding manner, the security of the QR code is limited, and even if the anti-counterfeiting QR code is often printed on fragile paper or strong adhesive, the QR code cannot be completely removed from the product for reuse. However, an illegal merchant can easily directly acquire information contained in the QR code by using an open code scanner, so that a fake anti-counterfeit label is manufactured, and extra risks are brought to a real enterprise party.
Along with the gradual maturity of image coding and image recognition technologies, autonomous non-open coding modes are gradually used in large-scale application, such as WeChat applet codes, tremble two-dimensional codes and the like, and unique coding and recognition mechanisms are utilized to hide real information contained in the codes, so that the generation of the codes is ensured to come from an authoritative single source. However, autonomous non-open coding methods often require a proprietary code scanner or an APP program to scan and decode, and it is difficult for some small and medium enterprises and non-internet enterprises to popularize the proprietary code scanner on consumer terminals. In the false identification process of the anti-counterfeit label, a consumer can be caused to additionally download a new APP, the complexity of false identification is improved, and the false identification is indirectly abandoned in the middle of many consumers.
Disclosure of Invention
The invention considers the risk problem caused by the open standard of the QR code and the problem that a special code scanner is required to be adopted in an autonomous non-open coding mode, and provides a novel two-dimensional code coding and anti-counterfeiting application method for embedding the QR code. In addition, the invention also combines the artistic two-dimension code coding mode, increases the processes of visual verification and the like, and greatly improves the security of two-dimension code anti-counterfeiting.
The invention provides a novel two-dimensional code coding and anti-counterfeiting application method for embedding a QR code, which mainly comprises the steps of generating information to be coded, coding and generating the two-dimensional code, scanning and analyzing the two-dimensional code and checking the information, wherein the method comprises the following steps of:
(1) And generating information to be encoded. And establishing a verification center of the two-dimensional code at the server, automatically generating a commodity information item for each commodity to be coded according to commodity information, automatically generating commodity verification information of a triplet consisting of a commodity information link address, verification information and reserved visual codes, and establishing a commodity information verification database. The commodity information links the address and the verification information, and can be positioned and uniquely positioned to one commodity information item; the reserved visual codes are patterns or words which can be recognized by human eyes, and can be generated by a random method or randomly selected from an established high-capacity material library. Each commodity verification information in the commodity information verification database is provided with an attribute item, including verification application times, verification states and verification IP addresses;
(2) And (5) encoding and generating a two-dimensional code. The encoder at the server side applies for and obtains commodity verification information of a triplet from the verification center, encrypts the verification information by using a public key to obtain encrypted information, and generates a visual anti-counterfeiting two-dimensional code of the commodity. Dividing the two-dimensional code into a QR code area and an autonomous coding area; and directly encoding the commodity information link address according to the QR code encoding standard, and filling the QR code area. And filling the encrypted information obtained by encrypting the verification information into the autonomous coding region. And embedding and aligning the QR code area and the autonomous coding area to obtain the novel anti-counterfeiting two-dimensional code. Reserving a visual coding region in the QR code region, rendering the reserved visual coding to generate an image, arranging according to the position of the reserved visual coding region, and fusing the image with a preset image to form a visual background image. And fusing the anti-counterfeiting two-dimensional code with the visual background image by utilizing an artistic two-dimensional code generation technology to generate a novel visual anti-counterfeiting two-dimensional code of the commodity.
(3) And scanning and analyzing the two-dimensional code. And scanning the visual anti-counterfeiting two-dimensional code attached to the commodity by using a third-party QR code scanner at the user side, analyzing the QR code area, and obtaining the commodity information link address. And according to the commodity information link address obtained by decoding and the configuration in the third party platform, jumping to an identification program of the visual anti-counterfeiting two-dimensional code. The visual anti-counterfeiting two-dimensional code recognition program starts a self-defined code scanner, detects a locator mark of a QR code area, and calculates and obtains an autonomous coding area. And acquiring coding arrangement of the autonomous coding region by utilizing a sampling algorithm, and sending the coding arrangement to a server side. And the decoder at the server end restores the encryption information according to the coding ordering sequence of the agreed autonomous coding region and sends the commodity information link address and the encryption information to the verification center.
(4) Verification of information. And after receiving the commodity information link address and the encrypted information, the verification center of the server verifies and decrypts the encrypted information by using the private key to obtain verification information. The verification center combines the commodity information link address and the verification information to search the corresponding commodity information item. If the corresponding commodity information is not found, the user is directly reminded of the risk of counterfeit commodity, and the commodity is fed back to the user as the counterfeit commodity. If the corresponding commodity information can be found, recording the checking behavior of the user, and feeding back the history information of the checking to the user. After commodity information checking is passed, the verification center searches a database and feeds back the reserved visual codes to the user for visual verification with the reserved visual codes on the visual anti-counterfeiting two-dimensional codes on the commodity.
Compared with the prior art, the invention has the advantages and positive effects that:
(1) Compared with the traditional two-dimensional code anti-counterfeiting method which only adopts a unique commodity ID and records commodity verification times, the method fully utilizes encryption algorithm, two-dimensional code custom coding, decoding and other technologies, has higher safety, can prevent the problem that coded content is easy to leak caused by the opening of a QR code system, and ensures the uniqueness of an anti-counterfeiting two-dimensional code manufacturing source.
(2) The novel anti-counterfeiting two-dimensional code generated by the method can be easily compatible with a traditional management system based on QR code correlation, and can be directly compatible and replaced by the novel two-dimensional code without adopting any hardware or software upgrading aiming at the existing schemes related to two-dimensional code management such as logistics management, warehouse management and the like.
(3) The method generates the embedded QR code which integrates visual information, realizes a commodity anti-counterfeiting method which is simple and easy to identify, low in price and high in safety, is convenient for a user to operate in the counterfeit verification process, and can protect the brand safety of commodities; in the process of identifying the genuine products, the operation is simple, the cost is low, the identification is easy, the special code scanner is not needed to be additionally downloaded, and the information is not needed to be manually input for consumers.
(4) The visual anti-counterfeiting two-dimensional code realized by the method has lower manufacturing cost, can fully acquire the code scanning behavior and data information of the user besides ensuring the basic anti-counterfeiting function, and provides data support for analyzing commodity circulation conditions and the like.
Drawings
FIG. 1 is a general implementation block diagram of a novel two-dimensional code encoding and anti-counterfeiting application method of the invention for embedding QR codes;
FIG. 2 is a schematic diagram of coding region division of a two-dimensional code according to the present invention;
FIG. 3 is a schematic diagram of a novel visual two-dimensional code generation process for embedding a QR code;
FIG. 4 is a novel visual two-dimensional code sample of the embedded QR code of the present invention;
fig. 5 is a schematic diagram of a novel visual two-dimensional code decoding process and an anti-counterfeiting principle for embedding a QR code.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The invention provides a novel two-dimensional code coding and anti-counterfeiting application method for embedding a QR code, which mainly comprises the steps of generating information to be coded, coding and generating the two-dimensional code, scanning and analyzing the two-dimensional code and checking the information, wherein the whole flow is shown in a figure 1, and the specific implementation process is respectively described in detail below in the four parts.
Step 1, the verification center is located at a server side, and an information database for storing commodities to be encoded is generated at the verification center at the server side. According to commodity information, the three groups of commodity information link address, verification information and reserved visual code are automatically generated, a commodity information verification database is built, and the following 4 substeps are explained.
Step 1.1, establishing a commodity basic information database; and establishing a reasonable table structure of a database according to commodity information, wherein a commodity information item is established in the database table for each commodity, and the data items contained in the commodity information item comprise manufacturers, commodity names, commodity models, production dates, commodity batches, dealers and the like.
And 1.2, automatically generating a triplet consisting of a commodity information link address, verification information and reserved visual codes aiming at each commodity information item, and establishing a commodity information verification database. The commodity information link address consists of a link address prefix and a link address parameter, and the link address prefix of the same commodity is the same. In the whole information verification database, the commodity information link address can be duplicated, but the commodity information link address and the verification information are ensured to be capable of being positioned and uniquely positioned to a certain commodity information item in the commodity basic information database. The "link address parameter" and "authentication information" may be automatically generated using a random method.
For example, for a certain product, the prefix of the link address is designed to be 'http:// domain.com/v/', and a 'link address parameter', such as 'xxxx', is randomly generated, so that the 'commodity information link address' is formed as 'http:// domain.com/v/xxxx'. At the same time, a piece of "authentication information" such as "aiTeixeit-xltslo" is randomly generated. In the whole commodity information verification database, the combination of a commodity information link address and verification information is unique, and can help a user to quickly locate a certain commodity, which is equivalent to a unique number of the commodity in a certain sense.
In practical application, the coding lengths of the two parts can be properly adjusted according to different situations, even the 'link address parameter' is not set, and the uniqueness of the number is ensured only by one part of 'verification information'.
And step 1.3, generating a reserved visual code. The reserved visual code is words or patterns or a combination of the words and the patterns which can be recognized by human eyes. Reserved visual codes, e.g. "00023X7", are designed and automatically generated using random or fixed methods. The reserved visual codes can have a certain practical meaning, such as commodity batch number information and the like, so that commodity sales personnel can manage goods supply and the like conveniently. The reserved visual codes may also be entirely randomly generated, reserved only for visual verification by the consumer. In addition, regarding reserved visual codes, the method can be matched with subsequent visual image rendering links, randomly selected from the established high-capacity material library, and the rendering rules and reserved visual verification contents are designed to correspond to each other.
And step 1.4, associating each item of the established triplet information < commodity information link address, verification information and reserved visual code >, and maintaining information such as verification record application, verification state and the like. The triple information of each commodity is provided with attribute items in the commodity information verification database, including verification application times, verification states, verification IP addresses and the like.
And 2, performing two-dimensional code encoding and generation on each commodity at a server side. The step is to encode the triplet information obtained in the step 1 into different parts according to the coding mechanism, generating a novel anti-counterfeiting two-dimensional code embedded with the QR code, and fusing visual information. The following is described in 5 sub-steps.
And 2.1, firstly dividing the whole two-dimensional code into two parts from a coding region, wherein one part is a QR code region, and the other part is an autonomous coding region. Wherein, the QR code area is a square area and is positioned at the center of the two-dimensional code; the "autonomous coding area" is located around the "QR code area", and is determined according to the needs of the enterprise user and the size of the coding capacity required, and may be any shape, such as a commonly used circular arc shape, or a proprietary shape designed according to a commodity type mark or the like. In addition, as shown in fig. 2, the reserved 'visual coding region' is designated, and it should be noted that the region is directly overlapped on the QR code region, and the position and shape of the region can be relatively flexible. The reserved 'visual coding area' does not affect the identification of the QR code.
Step 2.2, the encoder applies for and obtains a piece of triplet information from the verification center. And directly encoding the commodity information link address according to the QR code encoding standard, and filling the QR code area. And the verification information is encrypted by using the public key, and the obtained encrypted information fills the autonomous coding region according to a preset coding method and filling sequence.
The QR code area is usually arranged at the center of the two-dimensional code, the code completely accords with the international QR code standard, and the code area is composed of a plurality of parts such as a code area, a locator and the like. The autonomous coding regions are distributed around the QR code and are arranged by a custom coding arrangement method, and mainly comprise two parts of data and error correction, but do not comprise locators and the like.
Care should be taken that: 1) In the process of applying for the triple information, the encoder automatically applies for the verification center in a user role, and applies for the triple information under the protection of user authentication according to account numbers and passwords with independent identifications set by different encoders. The triplets are only available to trusted encoders and are protected from theft by means of strict encrypted communication during network transmission. 2) The public key that encrypts the "authentication information" is generated by the authentication center and distributed to the respective encoders. The generation of the public key is directly set by enterprise users, and the public key of each commodity can be different, but the public key needs to be in corresponding relation with the private key maintained by the verification center. The public key is distributed to anti-counterfeiting two-dimension code manufacturers or a labeling pipeline of the two-dimension codes to be directly used, the private key is reserved in the verification center, and the public key and the private key are a pair of keys generated according to an asymmetric encryption algorithm. 3) The autonomous coding region may employ a custom code scheme, such as reed solomon coding, and binary coding to construct information, with black modules identifying 1 and white modules identifying 0, during the coding process. In the coding arrangement, the modules in the self-defined coding region are marked in a grid mode, and the arrangement is sequentially carried out from left to right from top to bottom.
And 2.3, embedding and aligning the encoded QR code area with the encoded autonomous code area to obtain the novel anti-counterfeiting two-dimensional code. The two areas are arranged according to the designated size and position and are not overlapped with each other. Note that the autonomous encoding region no longer contains contents such as two-dimensional code locators, and the locator mark of the QR code region is directly borrowed in the decoding process.
And 2.4, rendering reserved visual codes such as numbers, characters, symbols or special patterns and the like to generate images, arranging according to the designated reserved visual code area, and fusing with the designated images to form visual background images. The reserved visual codes can be subjected to proper morphological change and color change in the rendering process, for example, the rendering is performed by using artistic fonts, so that the difficulty that the coded patterns are automatically recognized by a machine or are read by the machine is increased, and the coded patterns can only be read by people, thereby improving the safety. The "designated image" in rendering is often a designated trademark LOGO, etc., but is not limited herein, and may be a solid background pattern. In addition, the reserved visual codes are not necessarily English characters or numbers, but can be other visual information, even textures, stripes and the like.
And 2.5, fusing the novel anti-counterfeiting two-dimensional code with the visual background image by using an artistic two-dimensional code generation technology to generate the novel visual anti-counterfeiting two-dimensional code. In the process, the two-dimensional code pattern is properly deformed on the premise of ensuring that the coding information contained in the two-dimensional code is unchanged and can be normally analyzed by the code scanner, so that the aesthetic degree is improved, and meanwhile, the visual information is increased.
As shown in fig. 3, in order to perform two-dimensional code encoding on certain commodity information, a schematic diagram of the information visual anti-counterfeiting two-dimensional code is generated, wherein the reserved visual code is rendered into a circular diagram of red-background white fonts and patterns, the generated anti-counterfeiting two-dimensional code is also a two-dimensional code with red basic tone, and fig. 3 is a gray scale diagram illustration. Fig. 4 is a schematic gray scale diagram of two novel visual two-dimensional codes embedded with QR codes generated by the method of the present invention.
As shown in fig. 5, the method is a process of scanning and analyzing the anti-counterfeiting two-dimensional code of the commodity and verifying the anti-counterfeiting information.
And 3, scanning and analyzing the two-dimensional code at the user side. The method comprises the steps of scanning a QR code area on a commodity by using a third party QR code scanner, such as a WeChat and a payment bank code scanning function, scanning codes, and directly jumping to a recognition program of a visual anti-counterfeiting two-dimensional code authenticated by an official authority of a verification center, such as a visual anti-counterfeiting two-dimensional code recognition applet developed on WeChat, and completing further code scanning analysis on an autonomous coding area by using the applet. The following is described in 4 sub-steps.
And 3.1, analyzing the QR code area by using a QR code scanner of a third party to obtain the commodity information link address. And according to the decoded commodity information link address, the configuration in the third party platform and the like, the user operation interface is directly jumped to the appointed applet. For example, a two-dimensional code is scanned through WeChat, a link address of ' http:// domain.com/v/xxxx ' can be obtained, and according to the configuration in a WeChat platform, all domain names of ' http:// domain.com/v/' prefix ' obtained through decoding are directly jumped to a visual anti-counterfeiting two-dimensional code recognition applet, and meanwhile a specified link address parameter of ' xxxxxx ' is attached in the past, so that subsequent processing is facilitated.
And 3.2, starting a self-defined code scanner by a visual anti-counterfeiting two-dimensional code recognition applet, detecting a two-dimensional code locator mark, calculating an autonomous coding region, acquiring coding arrangement of the autonomous coding region by using a sampling algorithm, and transmitting the coding arrangement to a server side. When the autonomous coding region is identified, the detection process of the locator is performed according to a ' back ' font locator detection algorithm, for example, binarization operation is performed on an image, and then, according to ' black: white: black: white: the black proportion is 1:1:3:1:1, and the detection is carried out according to the transverse direction and the longitudinal direction respectively, so that the position of the center point of the locator is determined; after determining the locator, the size and grid distribution of each module of the QR two-dimensional code image can be indirectly determined according to the version number of the QR code, so that an autonomous coding region is determined according to the grid region position designated during coding. Using the sampling method, 0 or 1 represented by each module of the autonomous coding region can be obtained.
And 3.3, the decoder at the server side can restore 0 and 1 byte streams according to the agreed coding arrangement mode. It should be noted that some errors may exist in the restored byte stream, and these errors may be caused by interference of external factors such as illumination and the like by the scanner. In order to repair the errors, the invention can restore the original encryption information according to the principle of a verification algorithm, such as a Reed Solomon error correction algorithm, and the like under the condition that the errors of the original two-dimensional code module are not serious.
And 3.4, the decoder at the server end sends the commodity information link address and the encrypted information obtained in the code scanning analysis process to the verification center.
It should be noted that, when the visual anti-counterfeiting two-dimensional code is identified, the access of the code scanner to the decoder and the verification center at the server end is also performed under the control of the security authority, and only the code scanner trusted by the verification center can access the verification center.
And step 4, verifying the verification information at the server side. And submitting the obtained commodity link address and the encrypted information to a verification center for verification according to a code scanning result, and extracting reserved visual codes after the verification is successful, and displaying the reserved visual codes to consumers for visual verification. The following is described in three sub-steps.
Step 4.1, the verification center uses the encrypted information obtained by private key processing to decrypt and obtain the verification information. The private key used here is generated for the verification center and matches with the public key used in the encoding process.
And 4.2, checking in a commodity information verification database by combining the commodity information link address and verification information. According to the convention of code generation, a commodity information link address and verification information can be uniquely determined to a commodity information item. If no corresponding commodity information is found, the user can be directly reminded that the commodity is counterfeit. If the corresponding commodity information can be found, recording user checking behaviors including checking time, place, account number and other information, updating the verification application times, and feeding back the checking history information to the user. If the consumer finds an unreasonable checking history, the fake product risk exists, and reporting can be performed. If a certain piece of information is inspected to have a large number of different inspection time and inspection places, the wind control system of the verification center can be triggered, the record is placed on an abnormal list, and manual verification is prompted.
And 4.3, after commodity information checking is passed, searching a corresponding reserved visual code in the commodity information verification database, feeding back to a user, and enabling the user to perform visual verification by comparing the reserved visual code information fed back with the reserved visual code on the two-dimensional code visual background image. If the vision verification is consistent, the requirements of the genuine products are met. Otherwise, the risk of counterfeit is considered to exist.
The reserved visual codes fed back to the user can be images or words generated in the step 1.3 or images rendered and generated in the step 2.4, and the user can visually read the images through human eyes. For the reserved visual code to be a letter or a number sequence, the reserved visual code can be directly fed back to the user. When the reserved visual code is visual content such as texture patterns, the current technology still has difficulty in accurately reading the image content, so that the invention can additionally add visual verification content to commodity verification information. The visual verification content is mainly an image rendered by reserved visual codes, and when a user performs visual verification, the visual verification content can be compared with the image on the two-dimensional code. For example, the visual code added to the background image is "XTX349", and the image saved to the XTX349 whose visual verification content is "the coded region is printed as a yellow font of T, 4, 9".
Claims (8)
1. A novel two-dimensional code coding and anti-counterfeiting application method for embedding a QR code is characterized by comprising the following steps:
step 1, at a verification center of a server side, automatically generating a commodity information item and commodity verification information for each commodity to be coded; the commodity verification information is expressed as a triplet < commodity information link address, verification information and reserved visual code >, and is stored in a commodity information verification database of the verification center; the commodity information link address and the verification information are uniquely positioned to a commodity information item, and a visual code is reserved to be patterns or characters which can be recognized by human eyes; each commodity verification information in the commodity information verification database is provided with an attribute item, including verification application times, verification states and verification IP addresses;
step 2, the encoder at the server end generates a two-dimensional code of the commodity according to the commodity verification information code; the two-dimensional code is divided into a QR code area and an autonomous coding area; coding the commodity information link address according to a QR code coding standard, and filling the commodity information link address into a QR code area; encrypting the verification information by using a public key, and filling the encrypted information into an autonomous coding area; inlay alignment is carried out on the QR code area and the autonomous coding area, and an anti-counterfeiting two-dimensional code is obtained; reserving a visual coding region in the QR code region, arranging the reserved visual coding rendering generation image according to the reserved visual coding region position, fusing the reserved visual coding rendering generation image with the appointed image to form a visual background image, and fusing the anti-counterfeiting two-dimensional code with the visual background image to generate a final visual anti-counterfeiting two-dimensional code of the commodity;
step 3, loading an identification program of the visual anti-counterfeiting two-dimensional code on the user side, and scanning and identifying the visual anti-counterfeiting two-dimensional code; when a user scans a visual anti-counterfeiting two-dimensional code attached to a commodity through a QR code scanner, acquiring a commodity information link address, jumping to a visual anti-counterfeiting two-dimensional code identification program, identifying and acquiring information of an autonomous coding area of the visual anti-counterfeiting two-dimensional code by the visual anti-counterfeiting two-dimensional code identification program, and sending the information to a server side; the decoder at the server end restores the encryption information according to the information of the autonomous coding area and sends the commodity information link address and the encryption information to the verification center;
step 4, after receiving the commodity information link address and the encrypted information, the verification center of the server decrypts the encrypted information by using a private key to obtain verification information; the verification center searches corresponding commodity information items according to the commodity information link address and the verification information, if the commodity information items are not found, the verification center feeds back the commodity to the user as a counterfeit product, and if the commodity information items are found, the verification record of the commodity information items is fed back to the user; and after the verification center passes the verification, the reserved visual codes are fed back to the user for comparison with the reserved visual codes on the visual anti-counterfeiting two-dimensional codes on the commodity.
2. The method according to claim 1, wherein in the step 1, the "commodity information link address" is formed by two parts of "link address prefix" and "link address parameter", and the "link address prefix" of the same commodity is the same; the 'link address parameter' and the 'verification information' are randomly and automatically generated; the "reserved visual codes" are randomly generated or randomly selected from a pre-established library of materials.
3. The method according to claim 1 or 2, wherein in the step 1, "authentication information" is used as a unique number of the commodity; alternatively, the "authentication information" is combined with the "link address parameter" in the "commodity information link address" as a unique number of the commodity.
4. The method according to claim 1, wherein in the step 2, the encoder automatically applies the commodity verification information to the verification center in the role of the user, and different encoders are provided with separate account numbers and passwords, so that the commodity verification information is obtained only after the user authentication is passed, and encrypted communication is performed in the network transmission process; the public key that encrypts the "authentication information" is generated by the authentication center and distributed to the respective encoders.
5. The method according to claim 1, wherein in the step 2, the rendering of the reserved visual code into an image includes performing a morphological change and a color change on the image or text; after the visual background image is obtained, the anti-counterfeiting two-dimensional code and the visual background image are fused by utilizing an artistic two-dimensional code generation technology.
6. The method according to claim 1, wherein in the step 2, the QR code area is located at a center position of the anti-counterfeiting two-dimensional code, the autonomous coding areas are distributed around the QR code area, and the QR code area and the autonomous coding areas are arranged according to a set size and a set position and are not overlapped with each other.
7. The method according to claim 1, wherein in the step 3, a self-defined code scanner in a visual anti-counterfeiting two-dimensional code recognition program is started when the program is triggered, a locator of the visual anti-counterfeiting two-dimensional code is detected, after the locator is determined, the size and grid distribution of modules of the QR two-dimensional code are determined according to the version number of the QR code, and then an autonomous coding area of the visual anti-counterfeiting two-dimensional code is determined, 0 or 1 represented by each module of the autonomous coding area is obtained by sampling the autonomous coding area, and byte streams of 0 and 1 are restored at a server side according to the coding arrangement mode of the autonomous coding area.
8. The method of claim 1 or 4, wherein the public key and the private key are a pair of keys generated according to an asymmetric encryption algorithm, the private key being maintained in the authentication center, and authentication information encrypted by the public key being decrypted only by the private key.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2020104371557 | 2020-05-21 | ||
CN202010437155 | 2020-05-21 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111639734A CN111639734A (en) | 2020-09-08 |
CN111639734B true CN111639734B (en) | 2023-05-16 |
Family
ID=72332743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010455714.7A Active CN111639734B (en) | 2020-05-21 | 2020-05-26 | Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111639734B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112134687B (en) * | 2020-09-15 | 2022-11-25 | 武汉工程大学 | Information encryption and decryption method based on two-dimensional code |
US11429804B2 (en) * | 2020-09-18 | 2022-08-30 | Google Llc | Platform for registering and processing visual encodings |
CN112418372A (en) * | 2020-09-29 | 2021-02-26 | 四川谦泰仁投资管理有限公司 | Composite two-dimensional code system with calibration function |
CN113298534B (en) * | 2021-04-09 | 2024-10-22 | 深圳智造谷工业互联网创新中心有限公司 | QR code scanning terminal and QR code scanning method |
CN113487001B (en) * | 2021-09-08 | 2021-12-24 | 飞狐信息技术(天津)有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
CN113988242A (en) * | 2021-10-19 | 2022-01-28 | 艾斯芸防伪科技(福建)有限公司 | Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium |
CN114298257A (en) * | 2021-11-23 | 2022-04-08 | 深圳市祯源科技有限公司 | Method and device for realizing authenticity query through one-step code scanning |
CN116306754B (en) * | 2023-05-18 | 2023-08-04 | 浙江美丽健乳业有限公司 | Two-dimensional code generation method and device |
CN118551780B (en) * | 2024-05-09 | 2024-12-24 | 北京缔姿伟业科技发展有限公司 | Multifunctional two-dimensional code scanning and identifying method and device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103325042A (en) * | 2013-05-17 | 2013-09-25 | 包晗 | Tracing anti-fake market interaction integration system and method |
JP3188981U (en) * | 2013-09-11 | 2014-02-20 | 洛甫 林 | Electronic verification anti-counterfeit label |
WO2015152697A1 (en) * | 2014-04-04 | 2015-10-08 | 대한민국(관리부서:행정안전부 국립과학수사연구원장) | Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification |
CN105321078A (en) * | 2014-07-02 | 2016-02-10 | 许丰 | Anti-fake direct purchase system |
CN105447546A (en) * | 2015-11-25 | 2016-03-30 | 林蔚 | Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor |
CN106778995A (en) * | 2016-11-25 | 2017-05-31 | 北京矩石科技有限公司 | A kind of art up two-dimensional code generation method and device with image co-registration |
WO2017116303A1 (en) * | 2015-12-29 | 2017-07-06 | Egide Pte Ltd | Secure dual-mode anti-counterfeit product authentication methodology and system |
CN107194449A (en) * | 2017-06-19 | 2017-09-22 | 南京林业大学 | The antiforge and information source tracing method combined based on digital watermarking and Quick Response Code |
CN108764420A (en) * | 2018-04-24 | 2018-11-06 | 中国人民银行印制科学技术研究所 | A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods |
CN109255634A (en) * | 2018-09-07 | 2019-01-22 | 昆明盛策同辉数字科技有限责任公司 | Merge method for anti-counterfeit, device, storage medium and the equipment of AR and two dimensional code |
CN109754037A (en) * | 2019-01-28 | 2019-05-14 | 成都宇飞信息工程有限责任公司 | A product anti-counterfeiting and traceability system based on digital watermark two-dimensional code |
-
2020
- 2020-05-26 CN CN202010455714.7A patent/CN111639734B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103325042A (en) * | 2013-05-17 | 2013-09-25 | 包晗 | Tracing anti-fake market interaction integration system and method |
JP3188981U (en) * | 2013-09-11 | 2014-02-20 | 洛甫 林 | Electronic verification anti-counterfeit label |
WO2015152697A1 (en) * | 2014-04-04 | 2015-10-08 | 대한민국(관리부서:행정안전부 국립과학수사연구원장) | Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification |
CN105321078A (en) * | 2014-07-02 | 2016-02-10 | 许丰 | Anti-fake direct purchase system |
CN105447546A (en) * | 2015-11-25 | 2016-03-30 | 林蔚 | Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor |
WO2017116303A1 (en) * | 2015-12-29 | 2017-07-06 | Egide Pte Ltd | Secure dual-mode anti-counterfeit product authentication methodology and system |
CN106778995A (en) * | 2016-11-25 | 2017-05-31 | 北京矩石科技有限公司 | A kind of art up two-dimensional code generation method and device with image co-registration |
CN107194449A (en) * | 2017-06-19 | 2017-09-22 | 南京林业大学 | The antiforge and information source tracing method combined based on digital watermarking and Quick Response Code |
CN108764420A (en) * | 2018-04-24 | 2018-11-06 | 中国人民银行印制科学技术研究所 | A kind of Quick Response Code and its coding, have anti-fraud functional product at recognition methods |
CN109255634A (en) * | 2018-09-07 | 2019-01-22 | 昆明盛策同辉数字科技有限责任公司 | Merge method for anti-counterfeit, device, storage medium and the equipment of AR and two dimensional code |
CN109754037A (en) * | 2019-01-28 | 2019-05-14 | 成都宇飞信息工程有限责任公司 | A product anti-counterfeiting and traceability system based on digital watermark two-dimensional code |
Non-Patent Citations (3)
Title |
---|
Web开发中二维码的生成与应用;杨艳丽;段寿建;;计算机时代(第06期);全文 * |
基于数字签名的QR码水印认证系统;闫涛;游福成;刘福平;;信息安全研究(第03期);全文 * |
基于移动ADC平台的二维码产品防伪认证系统;郑敏姜;;海峡科学(第03期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111639734A (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111639734B (en) | Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code | |
TWI776084B (en) | Two-dimensional code provision, verification method and device | |
US7992772B2 (en) | Method and system for deterring product counterfeiting, diversion and piracy on a single system | |
US9076024B2 (en) | Anti-counterfeiting system and method | |
US10640273B2 (en) | Authentication of packaged products | |
US7309011B2 (en) | Method of authenticating products using hardware compatibility flag | |
US7364074B2 (en) | Method of authenticating products using analog and digital identifiers | |
US20050234823A1 (en) | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. | |
AU2008362599B2 (en) | Method for authenticating a product in a container, and associated method for verifying the authenticity of the product and its container | |
CN108154208B (en) | Article identification method, article identification method and article identification system based on two-dimensional code | |
CN109190736B (en) | Anti-counterfeiting two-dimensional code and generation method and generation application system thereof | |
CN107038594A (en) | A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code | |
CN105550891A (en) | Product anti-fake source tracing method and system | |
CN105550730A (en) | Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier | |
CN112749982A (en) | Anti-counterfeiting system and method based on two-dimensional code | |
CN108334919A (en) | A kind of product false proof verification method and its system based on Quick Response Code | |
JP2022535764A (en) | certified text document | |
US9477853B2 (en) | Generating an incremental information object | |
CN106022797A (en) | Smart device APP image recognition method | |
CN112101962A (en) | Data security anti-counterfeiting control method | |
CN115511030A (en) | Anti-counterfeiting verification method and device and electronic equipment | |
US8857711B2 (en) | Tracking customer loyalty information using an incremental information object | |
CN1776721A (en) | General anticounterfeiting method and system | |
CN114841713A (en) | Product tracing anti-counterfeiting method and system | |
CN116451730A (en) | Anti-counterfeiting method based on intelligent terminal and double information codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |