[go: up one dir, main page]

CN113420337A - Data protection method and system with anti-theft function - Google Patents

Data protection method and system with anti-theft function Download PDF

Info

Publication number
CN113420337A
CN113420337A CN202110826921.3A CN202110826921A CN113420337A CN 113420337 A CN113420337 A CN 113420337A CN 202110826921 A CN202110826921 A CN 202110826921A CN 113420337 A CN113420337 A CN 113420337A
Authority
CN
China
Prior art keywords
verification information
carrier
verification
information
combined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110826921.3A
Other languages
Chinese (zh)
Inventor
庄定善
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110826921.3A priority Critical patent/CN113420337A/en
Publication of CN113420337A publication Critical patent/CN113420337A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention provides a data protection method and a data protection system with an anti-theft function. The method comprises the following steps: one or more groups of combined check information are arranged on the check information carrier, when a user scans the check information, any one of the combined check information is scraped, and the other check information is exposed for scanning; after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system; the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged. The system comprises modules corresponding to the method steps.

Description

Data protection method and system with anti-theft function
Technical Field
The invention provides a data protection method and a data protection system with an anti-theft function, and belongs to the technical field of information authentication.
Background
In the current society, merchants want to make their commodities occupy the market, and most importantly, establish their brands. But counterfeit goods are not avoided in the market, and in order to protect the interests of the merchant, the merchant usually uses an anti-counterfeit label on the goods to help the consumer to identify the authenticity of the goods. However, the anti-counterfeit label is stolen and largely copied to be used on counterfeit goods in the circulation process, so that the brand image of a merchant is damaged, and the benefit of consumers is also seriously influenced.
With the continuous development of science and technology, verification information has become a wide information verification mode, however, when the current verification information is used for verifying the authenticity of a commodity, the verification information can be obtained through a photo and the like, so that the verification information is often stolen and copied, and the copied verification information is attached to a counterfeit product, so that a user can verify the counterfeit product through embezzling the copied true verification information in the product verification process.
Disclosure of Invention
The invention provides a data protection method and a system with an anti-theft function, which are used for solving the problem that a verification product corresponding to verification information is inconsistent with the verification information due to the fact that the verification information is imitated, and adopt the following technical scheme:
a data protection method with anti-theft functionality, the method comprising:
one or more groups of combined verification information are arranged on the verification information carrier, wherein each group of combined verification information comprises two different verification information; and, there are numbers corresponding to said check-up information on the said check-up information carrier, namely the carrier reveals the number;
when a user scans the verification information, any one of the verification information in all the combined verification information is scraped, and the other verification information is exposed for scanning;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Further, the verification information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Further, each group of the combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front side and the back side of the check information carrier, and the first check information and the second check information are mutually overlapped.
Further, the carrier display codes are arranged on the carrier in a non-overlapping mode.
Further, the method further comprises:
when a plurality of groups of combined check information are arranged on the check information carrier, when a user randomly scrapes any one check information in any group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user;
the user acquires another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the another piece of verification information;
after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system;
the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Further, the retrieving a number corresponding to the scanned verification information from a verification system includes:
when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
after a user selects and scans verification information, a verification system extracts a system display code corresponding to the verification information for display, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time;
locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier;
setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first time display verification information as a starting point;
in the system display code destruction time, when a user adds one scanning authentication of the combined verification information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
if the user does not scan and verify all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
A data protection system with anti-theft function, said system is used to implement any one of the above mentioned data protection method with anti-theft function, said system includes:
the checking information carrier is used for carrying one group or a plurality of groups of combined checking information and carrier display numbers corresponding to the checking information in the combined checking information;
the scanning module I is used for calling a serial number corresponding to the scanned verification information from a verification system after a user scans the verification information, namely the serial number is provided by the system;
and the verification system is used for storing a system supply number corresponding to each piece of verification information in each piece of combined verification information.
Further, the verification information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Further, each group of the combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front surface and the back surface of the check information carrier, and the first check information and the second check information are mutually overlapped; and the carrier display number comprises a digital number uniquely corresponding to the first check information and the second check information.
Further, the carrier display codes are arranged on the carrier in a non-overlapping mode.
Further, the system further comprises:
the verification information destruction device is used for destroying the verification information of all other combination verification information which is not scraped by the user immediately when the user randomly scrapes any one of the combination verification information in any one group of combination verification information when the plurality of groups of combination verification information are arranged on the verification information carrier; the verification information destruction device can adopt an ink box;
the scanning module II is used for acquiring another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information by the user and scanning the verification information;
and the extraction module is used for calling a serial number corresponding to the scanned verification information from the verification system after the user scans the verification information, namely the serial number is provided by the system.
Further, the first scanning module comprises:
the extraction recording module is used for extracting and displaying a system display code corresponding to the verification information by the verification system after the user selects and scans the verification information, and simultaneously recording the time of displaying the system display code corresponding to the verification information for the first time;
the locking module is used for locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located and acquiring system display codes corresponding to all the verification information carried on the verification information carrier;
the time setting module is used for setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
the automatic adjustment module is used for automatically adjusting the destroying time of the system display codes once when a user adds one scanning authentication of the combined verification information within the destroying time of the system display codes until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
and the destruction module is used for scanning and verifying all combined verification information on the verification information carrier if the user does not perform scanning and verification on all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, and the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
The invention has the beneficial effects that:
the invention provides a data protection method and a system with an anti-theft function, which effectively prevent verification information from being stolen through image acquisition modes such as photographing and the like by a mode of stacking two pieces of completely different verification information at the same position of the front side and the back side of a transparent or semitransparent verification information carrier. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. On the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, and the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a system block diagram of the system of the present invention;
fig. 3 is a schematic diagram of the operation of the system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
The embodiment provides a data protection method with an anti-theft function, as shown in fig. 1, the method includes:
s1, one or more groups of combined verification information are arranged on the verification information carrier, wherein each group of combined verification information comprises two different verification information; and, there are numbers corresponding to said check-up information on the said check-up information carrier, namely the carrier reveals the number; wherein the carrier display codes are arranged on the carrier in a non-overlapping way;
s2, when the user scans the verification information, scraping any one of the verification information in all the combined verification information, and exposing the other verification information for scanning;
s3, after the user scans the verification information, calling a number corresponding to the scanned verification information from the verification system, namely, the system provides a number; the checking system can adopt a block chain system, and can also adopt a database or a data storage system;
s4, the user compares the carrier display number with the system supply number, if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
Wherein, the checking information carrier is a transparent (or semitransparent, with certain perspective) carrier.
Each group of combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front side and the back side of the check information carrier, and the first check information and the second check information are mutually overlapped.
The verification information can be information symbols, graphs or codes with verification functions, such as two-dimensional codes, bar codes, verification codes, plaintext and the like.
The working principle of the technical scheme is as follows: taking 10 combined systems with eight pieces of verification information on the two sides as an example for illustration, four pieces of combined verification information are arranged on the central area of the verification information carrier, and each piece of combined verification information is a completely different combination of verification information with the front side and the back side superposed, so 8 pieces of verification information are arranged on the verification information carrier. A verification information area with the size of 2cm x 2cm or 1.8cm x 1.8cm is arranged, and due to the fact that two completely different verification information are printed on the front side and the back side in an overlapped mode, the verification information cannot be read under the condition that the other side is not scraped.
Numbers from 1 to 8 are respectively printed outside the central area (such as the upper left corner or the lower right corner) of the verification information carrier, four numbers are printed on the front side, four numbers are printed on the back side (namely, carrier display numbers), and the numbers on the front side and the back side are not overlapped at one position, so that the numbers can be visually identified without operation.
The corresponding 8 verification information and the numbers thereof are stored in a verification system from 00001-. A total of 80 different verification messages are used in 10 systems or products, each system or product corresponding to 8 numbers and verification messages.
After a user scans certain scraped verification information, the verification system can give a number corresponding to the verification information. If the numbers do not conform, the counterfeiting is indicated. If the number of a certain system is missing, only four numbers are missing, so that the counterfeiting is also indicated.
Meanwhile, the number (namely, the system display code) can be corresponding to different verification information through the verification system, and the number must be preset in advance and cannot be tampered in the future, so that effective evidence can be provided when piracy is attacked. Otherwise, the counterfeiter can claim that the anti-counterfeiting system is changed or has errors, and the counterfeiter needs to prove that the anti-counterfeiting system has not been changed or has no errors all the time.
The effect of the above technical scheme is as follows: through the mode of stacking two completely different check information at the same position of the front side and the back side of the transparent or semitransparent check information carrier, the check information is effectively prevented from being stolen through image acquisition modes such as photographing. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. From the perspective that the verification information cannot be imitated and stolen, the product is prevented from being imitated and verified; on the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided, and the product is thoroughly prevented from being imitated and verified from the verification information verification angle.
Example 2
In this embodiment, a scheme addition is performed on the basis of embodiment 1, and specifically, the method further includes:
step 1, when a plurality of groups of combined check information are arranged on a check information carrier, and when a user randomly scrapes any one check information in any one group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user;
step 2, the user obtains another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the verification information;
step 3, after the user scans the verification information, calling a number corresponding to the scanned verification information from the verification system, namely providing the number by the system;
step 4, the user compares the carrier display number with a system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged.
The working principle of the technical scheme is as follows: when a plurality of groups of combined check information are arranged on the check information carrier, when a user randomly scrapes any one check information in any group of combined check information, the check information carrier immediately carries out check information damage on all other combined check information which is not scraped by the user; the user acquires another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans the another piece of verification information; after the user scans the verification information, calling a serial number corresponding to the scanned verification information from a verification system, namely, providing the serial number by the system; the user compares the carrier display number with the system supply number, and if the carrier display number is consistent with the system supply number, the verification information is true; if the carrier display number is not consistent with the system provided number, the verification information is forged. The damage mode can be that an ink box or other objects polluting the verification information are arranged on the verification information carrier, when a user scrapes off a group of combined verification information, the ink box mechanism is touched to pollute all other combined verification information, and therefore other combined verification information cannot be used. Since the user randomly selects the verification information from the multiple groups of combined verification information, the verification information is uncertain and random, and a malicious third party cannot determine which verification information the user can utilize for scanning verification in advance, so that the true verification information cannot be stolen, and the anti-theft and anti-counterfeiting performances of the verification information are effectively improved.
The effect of the above technical scheme is as follows: through the uncertainty and unpredictability of the check information randomly selected and verified by the user, a malicious third party cannot determine which check information the user can utilize for scanning and verification in advance, so that the true check information cannot be stolen, and the anti-theft and anti-counterfeiting performances of the check information are effectively improved.
Example 3
The present embodiment is a further limitation on the data protection method with an anti-theft function provided in embodiment 1, and specifically, the retrieving, from the verification system, a number corresponding to the scanned verification information in S3 includes:
s301, when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
s302, after a user selects and scans verification information, a verification system extracts a system display code corresponding to the verification information for display, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time;
s303, locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier;
s304, setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
s305, in the system display code destruction time, when a user adds one scanning authentication of the combined check information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined check information on the check information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
s306, if the user does not scan and verify all combined verification information on the verification information carrier in the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to the verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
In this embodiment, the check system may be a blockchain system, and when the blockchain system is adopted, the data security can be further improved due to the non-falsification property of the blockchain system.
Firstly, when a plurality of groups of combined check information are arranged on the check information carrier, a system display code corresponding to each check information in each group of combined check information is stored in the check system; then, after the user selects and scans the verification information, the verification system extracts and displays the system display code corresponding to the verification information, and simultaneously records the time of displaying the system display code corresponding to the verification information for the first time; then, locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located, and acquiring system display codes corresponding to all verification information carried on the verification information carrier; setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first time display verification information as a starting point; in the system display code destruction time, when a user adds one scanning authentication of the combined verification information, the system display code destruction time is automatically adjusted once until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; and finally, if the user does not scan and verify all combined verification information on the verification information carrier in the system display code destruction time or the automatically adjusted system display code destruction time, the verification system automatically deletes all system display codes corresponding to the verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
Wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
the effect of the above technical scheme is as follows: in this embodiment, another way of improving the randomness of the user verification check information is shown, after the user performs one or more (i.e., part or all) check information scanning verification, the check system automatically destroys the stored system provided serial number, and by this way, it is effectively prevented that a malicious third party performs counterfeit verification by using the check information exposed after being scraped. Through the mode, the verification information corresponding to each product can be ensured to be verified for the product only once, and the product is thoroughly prevented from being imitated and verified from the verification information verification angle. Through the time setting mode, effective time can be provided for a user to complete verification of all verification information, meanwhile, the reserved time of system display codes in the verification system can be shortened, and the situation that the system display verification information is acquired or copied due to the fact that the system display time corresponding to the verification information in the verification system is too long after the verification information is started is avoided. Meanwhile, due to the limitation of the time length, the randomness of the verification completion result of the user can be improved through the limitation of the verification progress of the user with the low verification speed, the uncertainty of malicious third parties in obtaining information is improved, the difficulty of information imitation and embezzlement is improved, and the anti-counterfeiting performance of the verification information is further effectively improved.
Example 4
This embodiment proposes a data protection system with an anti-theft function, which is used to implement the data protection method with an anti-theft function described in embodiments 1 to 3, as shown in fig. 2, the system includes:
the checking information carrier is used for carrying one group or a plurality of groups of combined checking information and carrier display numbers corresponding to the checking information in the combined checking information; the carrier display codes are arranged on the carrier in a non-overlapping mode.
The scanning module I is used for calling a serial number corresponding to the scanned verification information from a verification system after a user scans the verification information, namely the serial number is provided by the system;
and the verification system is used for storing a system supply number corresponding to each piece of verification information in each piece of combined verification information. The checking system may adopt a block chain system or a database.
Wherein, the checking information carrier is a transparent (or semitransparent, with certain perspective) carrier. Each group of combined check information comprises first check information and second check information; the first check information and the second check information are respectively arranged at the same positions of the front surface and the back surface of the check information carrier, and the first check information and the second check information are mutually overlapped; and the carrier display number comprises a digital number uniquely corresponding to the first check information and the second check information.
The system further comprises:
the verification information destruction device is used for destroying the verification information of all other combination verification information which is not scraped by the user immediately when the user randomly scrapes any one of the combination verification information in any one group of combination verification information when the plurality of groups of combination verification information are arranged on the verification information carrier; the verification information destruction device can adopt an ink box;
the scanning module II is used for acquiring another piece of verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information by the user and scanning the verification information;
and the extraction module is used for calling a serial number corresponding to the scanned verification information from the verification system after the user scans the verification information, namely the serial number is provided by the system.
Wherein, the scanning module one includes:
when a plurality of groups of combined verification information are arranged on the verification information carrier, a system display code corresponding to each verification information in each group of combined verification information is stored in the verification system;
the extraction recording module is used for extracting and displaying a system display code corresponding to the verification information by the verification system after the user selects and scans the verification information, and simultaneously recording the time of displaying the system display code corresponding to the verification information for the first time;
the locking module is used for locking a verification information carrier where verification information corresponding to the verification information displayed for the first time is located and acquiring system display codes corresponding to all the verification information carried on the verification information carrier;
the time setting module is used for setting the destruction time of the system display codes by taking the time of the system display codes corresponding to the first display verification information as a starting point;
the automatic adjustment module is used for automatically adjusting the destroying time of the system display codes once when a user adds one scanning authentication of the combined verification information within the destroying time of the system display codes until the user finishes the scanning authentication of all the combined verification information on the verification information carrier; wherein the automatic adjustment rule is:
when a user adds a scanning authentication of combined verification information for the first time, the system display code destruction time automatically adjusts the taste, and prolongs the first time increment on the basis of the original system display code destruction time, wherein the time length of the first time increment is 15% of the system display code destruction time;
then, every time the user adds a scanning authentication of the combined verification information, the system displays that the code destroying time is added with a second time increment on the basis of the time after the last automatic adjustment, wherein the value range of the second time increment is 0.8-1.8 minutes, and preferably 1.2 minutes;
and the destruction module is used for scanning and verifying all combined verification information on the verification information carrier if the user does not perform scanning and verification on all combined verification information on the verification information carrier within the system display code destruction time or the automatically adjusted system display code destruction time, and the verification system automatically deletes all system display codes corresponding to all verification information on the verification information carrier when the system display code destruction time or the automatically adjusted system display code destruction time is reached.
The effect of the above technical scheme is as follows: through the mode of stacking two completely different check information at the same position of the front side and the back side of the transparent or semitransparent check information carrier, the check information is effectively prevented from being stolen through image acquisition modes such as photographing. By the method, even if a malicious third party acquires the verification information picture in an image acquisition mode, the verification information picture cannot be effectively separated to acquire a real verification information image. Meanwhile, the carrier display verification information corresponding to the exposed verification information on the verification information carrier is determined in a mode of scraping the verification information on one side of the verification information carrier (namely one of the combined verification information) to obtain the verification information on the other side of the carrier (namely the other of the combined verification information) in a mode of random selection by a user, so that the randomness of verification of the verification information can be effectively improved, the authenticity and the uncertainty of verification of the verification information are improved, and the possibility of imitation in the verification information verification process is reduced. On the other hand, the verification system stores the system display code corresponding to the verification information, so that the tamper resistance of the system display code can be improved, and the problem that a malicious third party changes the system display code from the inside of the verification system to steal the verification information is completely avoided.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1.一种具有防盗功能的数据保护方法,其特征在于,所述方法包括:1. A data protection method with anti-theft function, wherein the method comprises: 在所述校验信息载体上设置有一组或多组的组合校验信息,其中,每组所述组合校验信息包括两个不相同的校验信息;并且,在所述校验信息载体上设置有与所述校验信息对应的编号,即载体显示编号;One or more groups of combined verification information are provided on the verification information carrier, wherein each group of the combined verification information includes two different verification information; and, on the verification information carrier A number corresponding to the verification information is provided, that is, the carrier display number; 当用户进行扫描校验信息时,刮掉所有所述组合校验信息中的任意一个校验信息,露出另外一个校验信息进行扫描;When the user scans the verification information, any one of the combined verification information is scraped off, and the other verification information is exposed for scanning; 用户进行校验信息扫描后,从校验系统中调取与扫描的所述校验信息对应的编号,即系统提供编号;After the user scans the verification information, the number corresponding to the scanned verification information is retrieved from the verification system, that is, the number provided by the system; 用户将所述载体显示编号和系统提供编号进行比对,如果所述载体显示编号与所述系统提供编号一致,则表明所述校验信息是真的;如果所述载体显示编号与所述系统提供编号不一致,则表明所述校验信息是伪造。The user compares the display number of the carrier with the number provided by the system, if the display number of the carrier is consistent with the number provided by the system, it indicates that the verification information is true; if the display number of the carrier is consistent with the number provided by the system If the provided numbers are inconsistent, it indicates that the verification information is forged. 2.根据权利要求12所述方法,其特征在于,所述校验信息载体为透明载体。2. The method according to claim 12, wherein the verification information carrier is a transparent carrier. 3.根据权利要求1或2所述方法,其特征在于,每组所述组合校验信息包括第一校验信息和第二校验信息;所述第一校验信息和第二校验信息分别设置于所述校验信息载体的正反两面的相同位置,并且所述第一校验信息和第二校验信息相互重叠。3. The method according to claim 1 or 2, wherein each group of the combined verification information comprises first verification information and second verification information; the first verification information and the second verification information They are respectively arranged at the same position on the front and back sides of the verification information carrier, and the first verification information and the second verification information overlap each other. 4.根据权利要求1所述方法,其特征在于,所述载体显示编码以互不重叠的方式设置于所述载体上。4 . The method according to claim 1 , wherein the carrier display codes are arranged on the carrier in a non-overlapping manner. 5 . 5.根据权利要求1所述方法,其特征在于,所述方法还包括:5. The method according to claim 1, wherein the method further comprises: 当所述校验信息载体上设置有多组的组合校验信息时,在用户随机刮掉其中任意一组组合校验信息中的任意一个校验信息时,所述校验信息载体立即对未被用户刮掉的其他所有组合校验信息进行校验信息破坏;When there are multiple sets of combined verification information set on the verification information carrier, when the user randomly scrapes any one of the verification information from any set of combined verification information, the verification information carrier will immediately verify the verification information for the unidentified verification information. The verification information is destroyed by all other combined verification information scraped by the user; 用户根据随机已选中的刮掉的校验信息获取与被刮掉的校验信息对应的同一组合校验信息中的另外一个校验信息,并进行扫描;The user obtains another verification information in the same combination of verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans it; 用户进行校验信息扫描后,从校验系统中调取与扫描的所述校验信息对应的编号,即系统提供编号;After the user scans the verification information, the number corresponding to the scanned verification information is retrieved from the verification system, that is, the number provided by the system; 用户将所述载体显示编号和系统提供编号进行比对,如果所述载体显示编号与所述系统提供编号一致,则表明所述校验信息是真的;如果所述载体显示编号与所述系统提供编号不一致,则表明所述校验信息是伪造。The user compares the display number of the carrier with the number provided by the system, if the display number of the carrier is consistent with the number provided by the system, it indicates that the verification information is true; if the display number of the carrier is consistent with the number provided by the system If the provided numbers are inconsistent, it indicates that the verification information is forged. 6.一种具有防盗功能的数据保护系统,其特征在于,所述系统用于实现权利要求1至5任一所述一种具有防盗功能的数据保护方法,其中,所述系统包括:6. A data protection system with an anti-theft function, wherein the system is used to implement the data protection method with an anti-theft function according to any one of claims 1 to 5, wherein the system comprises: 校验信息载体,用于承载一组或多组的组合校验信息和与所述组合校验信息中各校验信息对应的载体显示编号;A verification information carrier, which is used to carry one or more groups of combined verification information and a carrier display number corresponding to each verification information in the combined verification information; 扫描模块一,用于用户进行校验信息扫描后,从校验系统中调取与扫描的所述校验信息对应的编号,即系统提供编号;Scanning module 1 is used to retrieve the number corresponding to the scanned verification information from the verification system after the user scans the verification information, that is, the system provides the number; 校验系统,用于存储每个组合校验信息中的每个校验信息对应的系统提供编号。The verification system is used to store the system-provided number corresponding to each verification information in each combination of verification information. 7.根据权利要求6所述系统,其特征在于,所述校验信息载体为透明载体。7. The system according to claim 6, wherein the verification information carrier is a transparent carrier. 8.根据权利要求6或7所述系统,其特征在于,每组所述组合校验信息包括第一校验信息和第二校验信息;所述第一校验信息和第二校验信息分别设置于所述校验信息载体的正反两面的相同位置,并且所述第一校验信息和第二校验信息相互重叠;并且,所述载体显示编号中包括与所述第一校验信息和第二校验信息唯一对应的数字编号。8. The system according to claim 6 or 7, wherein each group of the combined verification information comprises first verification information and second verification information; the first verification information and the second verification information They are respectively arranged at the same position on the front and back sides of the verification information carrier, and the first verification information and the second verification information overlap each other; and the carrier display number includes and the first verification information. The digital number uniquely corresponding to the information and the second verification information. 9.根据权利要求6所述系统,其特征在于,所述载体显示编码以互不重叠的方式设置于所述载体上。9 . The system according to claim 6 , wherein the carrier display codes are arranged on the carrier in a non-overlapping manner. 10 . 10.根据权利要求6所述系统,其特征在于,所述系统还包括:10. The system of claim 6, wherein the system further comprises: 校验信息破坏装置,用于当所述校验信息载体上设置有多组的组合校验信息时,在用户随机刮掉其中任意一组组合校验信息中的任意一个校验信息时,所述校验信息载体立即对未被用户刮掉的其他所有组合校验信息进行校验信息破坏;The verification information destruction device is used for when the verification information carrier is provided with a plurality of groups of combined verification information, when the user randomly scrapes any one of the verification information in any group of the combined verification information, all the verification information is removed. The verification information carrier immediately destroys the verification information of all other combined verification information that has not been scraped by the user; 扫描模块二,用于用户根据随机已选中的刮掉的校验信息获取与被刮掉的校验信息对应的同一组合校验信息中的另外一个校验信息,并进行扫描;Scanning module 2, for the user to obtain another verification information in the same combination of verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scan it; 提取模块,用于用户进行校验信息扫描后,从校验系统中调取与扫描的所述校验信息对应的编号,即系统提供编号。The extraction module is used to retrieve the number corresponding to the scanned verification information from the verification system after the user scans the verification information, that is, the number provided by the system.
CN202110826921.3A 2021-07-21 2021-07-21 Data protection method and system with anti-theft function Pending CN113420337A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110826921.3A CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110826921.3A CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Publications (1)

Publication Number Publication Date
CN113420337A true CN113420337A (en) 2021-09-21

Family

ID=77718023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110826921.3A Pending CN113420337A (en) 2021-07-21 2021-07-21 Data protection method and system with anti-theft function

Country Status (1)

Country Link
CN (1) CN113420337A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714379A (en) * 2014-01-03 2014-04-09 许泽人 Method for defining and verifying commodity label and commodity information
CN103729767A (en) * 2012-10-15 2014-04-16 李成 Anti-fake method, anti-fake system and anti-fake marker
CN105303962A (en) * 2015-11-23 2016-02-03 李峰 Double-side anti-fake structure and anti-fake method
CN106952570A (en) * 2017-05-19 2017-07-14 山东泰宝防伪技术产品有限公司 With false proof, prize function dicode laser anti-counterfeit label and preparation method thereof
CN207264421U (en) * 2017-08-29 2018-04-20 上海诺标防伪技术开发有限公司 A kind of Quick Response Code based in packaging
CN110223091A (en) * 2019-06-19 2019-09-10 四川五丰科技有限公司 A kind of traceability anti-fake system and its method
CN212606823U (en) * 2020-05-29 2021-02-26 厦门为纳物联科技有限公司 Packaging bag with one-product one-code anti-counterfeiting mark

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729767A (en) * 2012-10-15 2014-04-16 李成 Anti-fake method, anti-fake system and anti-fake marker
CN103714379A (en) * 2014-01-03 2014-04-09 许泽人 Method for defining and verifying commodity label and commodity information
CN105303962A (en) * 2015-11-23 2016-02-03 李峰 Double-side anti-fake structure and anti-fake method
CN106952570A (en) * 2017-05-19 2017-07-14 山东泰宝防伪技术产品有限公司 With false proof, prize function dicode laser anti-counterfeit label and preparation method thereof
CN207264421U (en) * 2017-08-29 2018-04-20 上海诺标防伪技术开发有限公司 A kind of Quick Response Code based in packaging
CN110223091A (en) * 2019-06-19 2019-09-10 四川五丰科技有限公司 A kind of traceability anti-fake system and its method
CN212606823U (en) * 2020-05-29 2021-02-26 厦门为纳物联科技有限公司 Packaging bag with one-product one-code anti-counterfeiting mark

Similar Documents

Publication Publication Date Title
EP0966839B1 (en) In-camera image marking and authentication
US9548863B2 (en) Method for unambiguous marking of an object
US10235618B2 (en) Authentication feature in a barcode
US6807634B1 (en) Watermarks for customer identification
CN1669046B (en) Visible authentication patterns for printed document
US7815117B2 (en) Method and apparatus for counterfeiting protection
US7324662B2 (en) Method, software, and device for hiding data in binary image, while preserving image quality
CN109472337B (en) Label anti-counterfeiting method and device based on random characteristics
US20040042641A1 (en) Personnel identity verification system
US20020178363A1 (en) System and method for authentication of items
US9575724B1 (en) Verification system and method for a collectible object
CN1326578A (en) Testing method
US20070152032A1 (en) Method and apparatus for counterfeiting protection
EA025707B1 (en) Method for improving security of an official document or a label, and said official document and label
CN113627577B (en) Three-dimensional code generation method and anti-counterfeiting tracing system based on three-dimensional code
JP2017017673A (en) How to protect the authenticity of objects, items, documents, packaging and / or labels from imitation, counterfeiting and theft
WO2006042913A1 (en) Method for making secure transactions and authentication of objects or documents
TW200805172A (en) Card capable of authentication
US8325969B2 (en) Methods for making an authenticating system
CN113420337A (en) Data protection method and system with anti-theft function
US20190156090A1 (en) Warranty tracking method for a consumer product
CN113743555A (en) Composite two-dimensional code system with calibration function
CN108875875A (en) A kind of label and method for anti-counterfeit
JP2001052143A (en) Authentication recording medium and authentication system
KR20090058473A (en) The method of authentication of the items put into circulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210921