CN103824197A - Anti-counterfeit code generating device - Google Patents

Anti-counterfeit code generating device Download PDF

Info

Publication number
CN103824197A
CN103824197A CN201410084428.9A CN201410084428A CN103824197A CN 103824197 A CN103824197 A CN 103824197A CN 201410084428 A CN201410084428 A CN 201410084428A CN 103824197 A CN103824197 A CN 103824197A
Authority
CN
China
Prior art keywords
code
product
secret key
aes
idea
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410084428.9A
Other languages
Chinese (zh)
Other versions
CN103824197B (en
Inventor
李军祥
刘桂祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201410084428.9A priority Critical patent/CN103824197B/en
Publication of CN103824197A publication Critical patent/CN103824197A/en
Application granted granted Critical
Publication of CN103824197B publication Critical patent/CN103824197B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an anti-counterfeit code generating device. The anti-counterfeit code generating device is characterized by comprising a picture storage part, an input display part, a code acquiring part, a secret key generating part, an AES (advanced encryption standard) acquiring and encrypting part, an AES cutting part, a DES (data encryption standard) acquiring and encrypting part, a DES cutting part, an IDEA (international data encryption algorithm) acquiring and encrypting part and an IDEA intercepting part, wherein the code acquiring part is used for acquiring input product information, and encoding according to a certain predetermined rule so as to generate corresponding product serial numbers. The anti-counterfeit code generating device provided by the invention firstly encrypts a product serial number by an AES algorithm, and then divides the encrypted result obtained by the AES algorithm into two parts, wherein one part is encrypted by a DES algorithm so as to obtain a logistic anti-counterfeit complete code, and a logistic anti-counterfeit application code is intercepted from the logistic anti-counterfeit complete code; the other part is encrypted by an IDEA algorithm so as to obtain a product anti-counterfeit complete code, and a product anti-counterfeit application code is intercepted from the product anti-counterfeit complete code, so that compared with the prior art, the anti-counterfeit code generating device has the characteristics of high encryption intensity and difficulty in code cracking.

Description

Security code generating apparatus
Technical field
The present invention relates to a kind of security code generating apparatus, be specifically related to a kind of security code generating apparatus that can generate according to the product information of inclusion stream information the logistics Application in Anti-counterfeiting code of predetermined length and the product false proof application code of predetermined length.
Background technology
Society fake and inferior commodities are spread unchecked; it is the outstanding problem in China's economic life; hit the production and circulation of fake and inferior commodities, concerning purge flow order, protect consumers' interests, protect legal intellecture property, also with to improve Chinese commodity directly related in the prestige of international market.Fake products has not only been encroached on consumers in general's interests, has upset normal market order, and has brought huge economic loss to manufacturer.Each manufacturing enterprise is not encroached on by fake products in order to guard one's interest, mostly meeting antiforge code on product.Consumer, in the time that checking product is true and false, only need to scrape the overlayer of security code off, by form input security codes such as website, phone, SMS, can learn the true and false result of this product through inquiry.
At present, although the cryptographic algorithm of generating anti-counterfeiting code has a lot, the Cipher Strength of most of cryptographic algorithm is not very desirable, and enciphering rate is also slower.In prior art, lack the security code generating apparatus for generating anti-counterfeiting code that a kind of Cipher Strength is high, be difficult for cracking.
Summary of the invention
The present invention carries out in order to solve above-mentioned problem, and object is to provide the security code generating apparatus that can generate according to the product information of inclusion stream information the logistics Application in Anti-counterfeiting code of predetermined length and the product false proof application code of predetermined length that a kind of Cipher Strength is high, be difficult for cracking.
Security code generating apparatus provided by the invention, there is such feature, comprise: picture storage part, at least store the picture of generating anti-counterfeiting code, input display part, at least show the picture of generating anti-counterfeiting code, the picture of this generating anti-counterfeiting code has the product information input frame for input product information, and generation button, obtain coding portion, obtain the product product information being transfused to, and encode and generate corresponding product ID according to certain pre-defined rule, secret key generating unit, once generating button is pressed, the random generation of secret key generating unit is respectively used to aes algorithm, DES algorithm, and the secret key of the AES of IDEA algorithm, the secret key of DES, and the secret key of IDEA, AES obtains and adds compact part, after obtaining the secret key of product ID and AES, carry out the computing of AES cryptographic algorithm, obtain enciphered data, AES cutting part, enciphered data is divided into front enciphered data and rear enciphered data, DES obtains and adds compact part, after obtaining the secret key of front enciphered data and DES, carry out the computing of des encryption algorithm, obtain the false proof complete code of logistics, DES intercepting portion, intercept out the logistics Application in Anti-counterfeiting code of predetermined length from the false proof complete code of logistics, IDEA obtains and adds compact part, after obtaining the secret key of rear enciphered data and IDEA, carry out the computing of IDEA cryptographic algorithm, obtain product false proof complete code, and IDEA intercepting portion, intercept out the product false proof application code of predetermined length from product false proof complete code, wherein, input display part shows product false proof application code and logistics Application in Anti-counterfeiting code.
In security code generating apparatus of the present invention, can also there is such feature: wherein, product information comprises product specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.
The effect of invention
According to security code generating apparatus involved in the present invention, owing to first adopting aes algorithm to be encrypted to product ID, the result of then aes algorithm being encrypted is divided into two parts, a part adopts DES algorithm to be encrypted and obtains the false proof complete code of logistics, from the false proof complete code of logistics, intercept out logistics Application in Anti-counterfeiting code, another part adopts IDEA algorithm to be encrypted and obtains product false proof complete code, from product false proof complete code, intercept out product Application in Anti-counterfeiting code, and AES, DES, the secret key of encryption of tri-kinds of cryptographic algorithm of IDEA is all random generation, therefore compared with prior art security code generating apparatus of the present invention to have Cipher Strength high, the feature that is difficult for cracking.In addition, because security code generating apparatus of the present invention is to generate the logistics Application in Anti-counterfeiting code of predetermined length and the product false proof application code of predetermined length according to the product information of inclusion stream information, the logistics Application in Anti-counterfeiting code generating and the length of product false proof application code can change as required, and therefore the present invention has the advantages that dirigibility is strong, changeability is high.
Accompanying drawing explanation
Fig. 1 is security code generating apparatus block diagram in embodiments of the invention;
Fig. 2 is the picture view of generating anti-counterfeiting code in embodiments of the invention;
Fig. 3 is product information coding rule schematic diagram in embodiments of the invention;
Fig. 4 is the product process figure of security code in embodiments of the invention;
Fig. 5 is AES cryptographic algorithm process flow diagram in embodiments of the invention;
Fig. 6 is des encryption algorithm flow chart in embodiments of the invention; And
Fig. 7 is IDEA cryptographic algorithm process flow diagram in embodiments of the invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach object and effect is easy to understand, following examples are specifically addressed security code generating apparatus of the present invention by reference to the accompanying drawings.
Fig. 1 is security code generating apparatus block diagram in embodiments of the invention.
As shown in Figure 1, security code generating apparatus 100 comprises: picture storage part 1, and input display part 2, obtains coding portion 3, secret key generating unit 4, AES obtains and adds compact part 5, AES cutting part 6, DES obtains and adds compact part 7, DES intercepting portion 8, IDEA obtains and adds compact part 9, and IDEA intercepting portion 10.In addition, security code generating apparatus 100 also comprises control part, respectively with picture storage part 1, input display part 2, obtain coding portion 3, secret key generating unit 4, AES and obtain and add compact part 5, AES cutting part 6, DES and obtain and add compact part 7, DES intercepting portion 8, IDEA and obtain and add compact part 9 and IDEA intercepting portion 10 is connected, realize the entirety control to security code generating apparatus 100.
Fig. 2 is the picture view of generating anti-counterfeiting code in embodiments of the invention.
Picture storage part 1 is at least stored the picture 11 of generating anti-counterfeiting code as shown in Figure 2.The display box 114 of the information 111 that this security code generation picture 11 comprises prompting input product information, product input frame 112, generation button 113 and demonstration logistics Application in Anti-counterfeiting code and the product false proof application code for input product information.Input display part 2 at least shows the picture 11 of this generating anti-counterfeiting code.
Fig. 3 is product information coding rule schematic diagram in embodiments of the invention.
Obtain coding portion 3 and obtain the product product information being transfused in product information input frame 112, and encode and generate corresponding product ID D according to the pre-defined rule shown in Fig. 3.In the time that generation button 113 is pressed, the random secret key of AES, the secret key of DES and the secret key of IDEA that are respectively used to aes algorithm, DES algorithm and IDEA algorithm of generating of secret key generating unit 4.AES obtains and adds compact part 5 and obtain after product ID D and the secret key of AES, carries out the computing of AES cryptographic algorithm and obtains enciphered data M.Enciphered data M is divided into front enciphered data M1 and rear enciphered data M2 by AES cutting part 6.DES obtains and adds compact part 7 and obtain after front enciphered data M1 and the secret key of DES, carries out the computing of des encryption algorithm and obtains the false proof complete code of logistics.DES intercepting portion 8 intercepts out the logistics Application in Anti-counterfeiting code of predetermined length from the false proof complete code of logistics.IDEA obtains and adds compact part 9 and obtain after rear enciphered data M2 and the secret key of IDEA, carries out the computing of IDEA cryptographic algorithm and obtains product false proof complete code.IDEA intercepting portion 10 intercepts out the product false proof application code of predetermined length from product false proof complete code.
Here, product information comprises product specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.Logistics Application in Anti-counterfeiting code is one group of 16 character string being directly printed in commodity external packing, character string is by A-F, 0-9 character composition, by authorized user by website to commodity circulation information as wholesale dealer, the information such as dealer are inquired about and are upgraded, thereby reach the object that the process of circulation of commodity is managed and monitored, in the time that consumer inquires about commodity true and false information, according to demand, also can give the circulation information of consumer's display of commodity simultaneously.Product false proof application code is printed in commodity packaging, but scraping one deck coverlay off just can see, one group of 20 character string that it is made up of character 0-9, be divided into 4 sections, every section of 5 characters, carry out commodity true and false inquiry by consumer by the mode such as website, phone, Query Result shows authenticity of products information, can show the information such as production and circulation simultaneously.
The security code generating apparatus 100 that elaborates the present embodiment below in conjunction with process flow diagram generates the process of the logistics Application in Anti-counterfeiting code of 16 and 20 s' product false proof application code according to the product information of inclusion stream information.
Fig. 4 is the product process figure of security code in embodiments of the invention.
Step S-1:
Input display part 2 shows the picture 11 that security code generates, and allows user in product information input frame 112, input corresponding product information, i.e. product specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.Press and generate button 113, then enter step S-2.
Step S-2:
The random generation of secret key generating unit 4 is respectively used to carry out the secret key of AES of 128 of aes algorithm, DES algorithm and IDEA algorithm, the secret key of DES of 64 and the secret key of IDEA of 64, then enters step S-3.
Step S-3:
Coding generating unit 3 is obtained the product information of selecting input in product information input frame 112, encodes and generates the product ID D of 128 according to coding rule as shown in Figure 3, then enters step S-4.
Fig. 5 is AES cryptographic algorithm process flow diagram in embodiments of the invention.
Step S-4:
AES obtains and adds compact part 5 and obtain after product ID D and the secret key of AES, carries out AES cryptographic algorithm computing as shown in Figure 5.The detailed process of AES cryptographic algorithm is:
Determine iterations Nr according to the length of the length of product ID D and the secret key of AES, the product ID D of 128 and 128 s' the secret key of AES determines that iterations is 10 times.
Step S-4a: the secret key of AES is carried out to 10 expansions and obtain 10 groups of secret key E of expansion that take turns secret key composition.
Step S-4b: product ID D and the secret key step-by-step of AES are carried out to XOR and obtain the 1st operation values C1.
Step S-4c: the 1st operation values C1 is carried out to 9 AES encryption iteration and obtain the 5th operation values C5.
Step S-4d: the 5th operation values C5 is carried out to S box replacement operator and obtain the 6th operation values C6.
Step S-4e: the every row of the 6th operation values C6 is circulated and moves byte manipulation and obtain the 7th operation values C7, i.e. 1 of the second row ring shift left, 2 of the third line ring shift lefts, 3 of the third line ring shift lefts.
Step S-4f: the 7th operation values and the 10th group are taken turns to secret key E[10] step-by-step carries out XOR, obtains described enciphered data M.
Wherein, the single AES encryption iteration in 10 AES encryption iteration comprises the following steps:
Step S-4c1: the 1st operation values C1 is carried out to S box replacement operator and obtain the 2nd operation values C2.
Step S-4c2: the every row of the 2nd operation values C2 is circulated and moves byte manipulation and obtain the 3rd operation values C3, i.e. 1 of the second row ring shift left, 2 of the third line ring shift lefts, 3 of the third line ring shift lefts.
Step S-4c3: the 3rd operation values C3 is mixed to rank transformation operation and obtain the 4th operation values C4.
Determine the secret key E[i of wheel of this encryption iteration according to the secret key E of expansion].
Step S-4c4: to the 4th operation values C4 and the secret key E[i of wheel] step-by-step carries out XOR and obtains the 5th operation values C5.
AES cryptographic algorithm finishes to obtain enciphered data M, then enters step S-5.
Step S-5:
The enciphered data M encrypting through aes algorithm is divided into two parts by AES cutting part 6, and front enciphered data M1 and rear enciphered data M2, then enter step S-6.
Fig. 6 is des encryption algorithm flow chart in embodiments of the invention.
Step S-6:
DES obtains and adds compact part 7 and obtain after front enciphered data M1 and the secret key of DES, carries out des encryption algorithm computing as shown in Figure 6, and the detailed process of des encryption algorithm is:
Step S-6a: front enciphered data M1 is carried out to IP in-place computation and obtain the 8th operation values C8, and the 8th operation values C8 is divided into left data L and right data R.
Step S-6b: the secret key of DES is carried out to secret key conversion and obtain the secret key group of the DES DS that 16 secret keys of DES form.
Step S-6c: left data L and right data R are carried out to 16 des encryption iteration and obtain new left data NL and new right data NR.
Step S-6d: the new data N being made up of new left data NL and new right data NR is carried out to last permutation function computing and obtain the false proof complete code of logistics.
Wherein, the single des encryption iteration in 16 des encryption iteration comprises the following steps:
Step S-6c1: right data L is expanded to replacement operator and obtain the 9th operation values C9.
Determine the secret key DS[i of DES of this encryption iteration according to the secret key group of DES DS].
Step S-6c2: by the 9th operation values C9 and the secret key DS[i of DES] carry out XOR and obtain the 10th computing knot value C10, and the 10th operation values C10 is divided into eight data blocks.
Step S-6c3: eight data blocks are carried out respectively to S box replacement operator and obtain corresponding eight output data.
Step S-6c4: the 11st operation values C11 being become by eight output data groups is carried out to P box replacement operator and obtain the 12nd operation values C12.
Step S-6c5: the 12nd operation values C12 and left data L are carried out to XOR and obtain the 13rd operation values C13.
Step S-6c6: using the 13rd operation values C13 as new left data NL, using left data L as new right data NR, enter next round iteration.
Des encryption algorithm finishes to obtain the false proof complete code of logistics, then enters step S-7.
Step S-7:
DES intercepting portion 8 intercepts out the logistics Application in Anti-counterfeiting code of 16 from the false proof complete code of logistics obtaining through des encryption algorithm for encryption, then enters step S-8.
Fig. 7 is IDEA cryptographic algorithm process flow diagram in embodiments of the invention.
Step S-8:
IDEA obtains and adds compact part 9 and obtain after rear enciphered data M2 and the secret key of IDEA, carries out IDEA cryptographic algorithm computing as shown in Figure 7, and the detailed process of IDEA cryptographic algorithm is:
Step S-8a: the secret key of IDEA is carried out to computing and obtain the secret key group IS of IDEA that 52 secret keys of IDEA form.
Step S-8b: rear enciphered data M2 is divided into the 1st data X1, the 2nd data X2, the 3rd data X3 and the 4th data X4.
Step S-8c: the 1st data X1, the 2nd data X2, the 3rd data X3 and the 4th data X4 are carried out to 8 IDEA encryption iteration and obtain new the 1st data NX1, new the 2nd data NX2, new the 3rd data NX3 and Xin 4 data NX4.
Step S-8d: to the secret key S[49 of new the 1st data NX1 and 49IDEA] do mould 2161 multiplications and obtain the 1st subdata Z1; To the secret key S[50 of new the 3rd data NX3 and 50IDEA] do mould 216 and add computing and obtain the 2nd subdata Z2; To the secret key S[51 of new the 2nd data NX2 and 51IDEA] do mould 216 and add computing and obtain the 3rd subdata Z3; To the secret key S[52 of new the 4th data NX4 and 52IDEA] do mould 2161 multiplications and obtain the 4th subdata Z4.
Step S-8e: integrate in order and obtain product false proof complete code by the 1st subdata Z1, the 2nd subdata Z2, the 3rd subdata Z3 and the 4th subdata Z4.
Wherein, the single IDEA encryption iteration in 8 IDEA encryption iteration comprises the following steps:
Determine the secret key IS[1 of 1IDEA of this iteration according to the secret key group IS of IDEA], the secret key IS[2 of 2IDEA], the secret key IS[3 of 3IDEA], the secret key IS[4 of 4IDEA], the secret key IS[5 of 5IDEA] and the sub secret key IS[6 of 6IDEA];
Step S-8c1: to the secret key IS[1 of the 1st data X1 and 1IDEA] do mould 2161 multiplications and obtain the 14th operation values C14; To the secret key IS[2 of the 2nd data X2 and 2IDEA] do mould 216 and add computing and obtain the 15th operation values C15; To the secret key IS[3 of the 3rd data X3 and 3IDEA] do mould 216 and add computing and obtain the 16th operation values C16; To the secret key IS[4 of the 4th data X4 and 4IDEA] do mould 2161 multiplications and obtain the 17th operation values C17.
Step S-8c2: the 14th operation values C14 and the 16th operation values C16 are carried out to XOR and obtain the 18th operation values C18; The 15th operation values C15 and the 17th operation values C17 are carried out to XOR and obtain the 19th operation values C19.
Step S-8c3: to the secret key S[5 of the 18th operation values C18 and 5IDEA] do mould 2161 multiplications and obtain the 20th operation values C20; The 19th operation values C19 and the 20th operation values C20 are done to mould 216 to be added computing and obtains the 21st operation values C21; To the secret key S[6 of the 21st operation values C21 and 6IDEA] do mould 2161 multiplications and obtain the 22nd operation values C22; The 20th operation values C20 and the 22nd operation values C22 are done to mould 216 to be added computing and obtains the 23rd operation values C23.
Step S-8c4: the 14th operation values C14 and the 22nd operation values C22 are carried out to XOR and obtain the 24th operation values C24; The 16th operation values C16 and the 22nd operation values C22 are carried out to XOR and obtain the 25th operation values C25; The 15th operation values C15 and the 23rd operation values C23 are carried out to XOR and obtain the 26th operation values C26; The 17th operation values C17 and the 23rd operation values C23 are carried out to XOR and obtain the 27th operation values C27.
Step S-8c5: successively as new the 1st data NX1, new the 2nd data NX2, new the 3rd data NX3 and Xin 4 data NX4, enter next round iteration by the 24th operation values C24, the 26th operation values C26, the 25th operation values C25 and the 27th operation values C27.
IDEA cryptographic algorithm finishes to obtain product false proof complete code, then enters step S-9.
Step S-9:
IDEA intercepting portion 10, from encrypting the product false proof complete code obtaining and intercept out the product false proof application code of 20 through IDEA cryptographic algorithm, then enters step S-10.
Step S-10:
Input display part 2 demonstrates the logistics Application in Anti-counterfeiting code and the product false proof application code that generate through AES cryptographic algorithm, des encryption algorithm, IDEA cryptographic algorithm.
So far complete the process that generates the logistics Application in Anti-counterfeiting code of 16 and 20 s' product false proof application code according to the product information of inclusion stream information.
The effect of embodiment and effect
The security code generating apparatus that the present embodiment provides, owing to first adopting aes algorithm to be encrypted to product ID, the result of then aes algorithm being encrypted is divided into two parts, a part adopts DES algorithm to be encrypted and obtains the false proof complete code of logistics, from the false proof complete code of logistics, intercept out logistics Application in Anti-counterfeiting code, another part adopts IDEA algorithm to be encrypted and obtains product false proof complete code, from product false proof complete code, intercept out product Application in Anti-counterfeiting code, and AES, DES, the secret key of encryption of tri-kinds of cryptographic algorithm of IDEA is all random generation, therefore compared with prior art security code generating apparatus of the present invention to have Cipher Strength high, the feature that is difficult for cracking.
Security code generating apparatus in the present embodiment, to generate the logistics Application in Anti-counterfeiting code of predetermined length and the product false proof application code of predetermined length according to the product information of inclusion stream information, the logistics Application in Anti-counterfeiting code generating and the length of product false proof application code can change as required, and therefore the present invention has the advantages that dirigibility is strong, changeability is high.
Above-mentioned embodiment is preferred case of the present invention, is not used for limiting the scope of the invention.

Claims (2)

1. the product information based on inclusion stream information generates respectively a security code generating apparatus for the product false proof application code of predetermined length and the logistics Application in Anti-counterfeiting code of predetermined length, it is characterized in that, comprising:
Picture storage part, at least stores the picture of generating anti-counterfeiting code;
Input display part, at least show the picture of described generating anti-counterfeiting code, the picture of this generating anti-counterfeiting code has the product information input frame for input product information, and generates button;
Obtain coding portion, obtain the described product product information being transfused to, and encode and generate corresponding product ID according to certain pre-defined rule;
Secret key generating unit, once described generation button is pressed, the random generation of described secret key generating unit is respectively used to the secret key of AES, the secret key of DES and the secret key of IDEA of aes algorithm, DES algorithm and IDEA algorithm;
AES obtains and adds compact part, carries out the computing of AES cryptographic algorithm after obtaining described product ID and the secret key of described AES, obtains enciphered data;
AES cutting part, is divided into front enciphered data and rear enciphered data by described enciphered data;
DES obtains and adds compact part, carries out the computing of des encryption algorithm after obtaining described front enciphered data and the secret key of described DES, obtains the false proof complete code of logistics;
DES intercepting portion, intercepts out the logistics Application in Anti-counterfeiting code of predetermined length from the false proof complete code of described logistics,
IDEA obtains and adds compact part, carries out the computing of IDEA cryptographic algorithm after obtaining described rear enciphered data and the secret key of described IDEA, obtains product false proof complete code; And
IDEA intercepting portion, intercepts out the product false proof application code of predetermined length from described product false proof complete code,
Wherein, described input display part shows described product false proof application code and described logistics Application in Anti-counterfeiting code.
2. security code generating apparatus according to claim 1, is characterized in that:
Wherein, described product information comprises specification code, board code, flag code, order of classes or grades at school code, date of manufacture and time, production code member and described logistics information.
CN201410084428.9A 2014-03-10 2014-03-10 Security code generating means Expired - Fee Related CN103824197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410084428.9A CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410084428.9A CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Publications (2)

Publication Number Publication Date
CN103824197A true CN103824197A (en) 2014-05-28
CN103824197B CN103824197B (en) 2017-07-11

Family

ID=50759246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410084428.9A Expired - Fee Related CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Country Status (1)

Country Link
CN (1) CN103824197B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751217A (en) * 2015-04-17 2015-07-01 广州市宝绅纸塑有限公司 Anti-counterfeiting code, anti-counterfeiting code generating system and anti-counterfeiting code application system
CN106445847A (en) * 2016-09-12 2017-02-22 天脉聚源(北京)传媒科技有限公司 U disk SN code obtaining method and device
WO2017133154A1 (en) * 2016-02-02 2017-08-10 程烨 Anti-counterfeit image generation method and device
US9972061B2 (en) 2016-02-02 2018-05-15 Ye Cheng Method and apparatus for generating anti-forgery image
CN108830366A (en) * 2018-06-20 2018-11-16 广州市宝绅纸塑有限公司 A kind of generation method and system of anti-fake spiral coloured silk code

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020091935A1 (en) * 2000-08-11 2002-07-11 Sony Corporation, A Corporation Of Japan Storage and retrieval of encrypted content on storage media
CA2157971C (en) * 1994-09-15 2003-07-08 Todd W. Arnold Apparatus and method for secure distribution of data
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN101388086A (en) * 2007-09-14 2009-03-18 段娟 Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN102968726A (en) * 2012-10-23 2013-03-13 杭州杰德科技有限公司 Two-dimensional code network anti-fake method with secondary encryption characteristics
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2157971C (en) * 1994-09-15 2003-07-08 Todd W. Arnold Apparatus and method for secure distribution of data
US20020091935A1 (en) * 2000-08-11 2002-07-11 Sony Corporation, A Corporation Of Japan Storage and retrieval of encrypted content on storage media
CN101388086A (en) * 2007-09-14 2009-03-18 段娟 Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN102968726A (en) * 2012-10-23 2013-03-13 杭州杰德科技有限公司 Two-dimensional code network anti-fake method with secondary encryption characteristics
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751217A (en) * 2015-04-17 2015-07-01 广州市宝绅纸塑有限公司 Anti-counterfeiting code, anti-counterfeiting code generating system and anti-counterfeiting code application system
CN104751217B (en) * 2015-04-17 2017-08-29 广州市宝绅纸塑有限公司 The generation system and application system of security code, security code
WO2017133154A1 (en) * 2016-02-02 2017-08-10 程烨 Anti-counterfeit image generation method and device
US9972061B2 (en) 2016-02-02 2018-05-15 Ye Cheng Method and apparatus for generating anti-forgery image
CN106445847A (en) * 2016-09-12 2017-02-22 天脉聚源(北京)传媒科技有限公司 U disk SN code obtaining method and device
CN108830366A (en) * 2018-06-20 2018-11-16 广州市宝绅纸塑有限公司 A kind of generation method and system of anti-fake spiral coloured silk code

Also Published As

Publication number Publication date
CN103824197B (en) 2017-07-11

Similar Documents

Publication Publication Date Title
CN102546181B (en) Cloud storage encrypting and deciphering method based on secret key pool
CN101536398B (en) Cryptographic method for a white-box implementation
CN104486073B (en) A kind of encryption and decryption method of character type data
CN103824197A (en) Anti-counterfeit code generating device
CN105959098A (en) Format-reserved encryption algorithm based on multi-segmented Feistel network
CN101996298A (en) Encrypting method and decrypting method corresponding to same
JP2013213930A (en) Encryption device, decryption device and program
JP2007316614A (en) Hash value generating device, program, and hash value generating method
CN102546156A (en) Method, system and device for grouping encryption
CN105637801A (en) Polymorphic encryption key matrices
CN112163230B (en) Commodity anti-counterfeiting code generation method based on Chinese character encryption
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN104836817A (en) Architecture and method for ensuring network information safety
Churi et al. Jumbling-Salting: An improvised approach for password encryption
JP5689826B2 (en) Secret calculation system, encryption apparatus, secret calculation apparatus and method, program
Ahmad et al. A secure network communication protocol based on text to barcode encryption algorithm
Goel et al. A way to secure a QR code: SQR
KR101445339B1 (en) Integrated cryptographic apparatus for providing confidentiality and integrity
CN105281893A (en) Method for introducing dependence of white-box implementation on a set of strings
CN107707352B (en) A kind of embedded encryption method
Ahmad et al. Protection of the texts using Base64 and MD5
KR101584220B1 (en) Encoding Method for Maintaining Sorting Order of Encrypted Data
CN106549927A (en) Key preservation, acquisition methods and device
CN103886464A (en) Anti-fake code generating method
KR101148560B1 (en) Apparatus and method for encryption using mixture of bit data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

Termination date: 20200310

CF01 Termination of patent right due to non-payment of annual fee