CN103824197B - Security code generating means - Google Patents

Security code generating means Download PDF

Info

Publication number
CN103824197B
CN103824197B CN201410084428.9A CN201410084428A CN103824197B CN 103824197 B CN103824197 B CN 103824197B CN 201410084428 A CN201410084428 A CN 201410084428A CN 103824197 B CN103824197 B CN 103824197B
Authority
CN
China
Prior art keywords
code
product
obtains
aes
idea
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410084428.9A
Other languages
Chinese (zh)
Other versions
CN103824197A (en
Inventor
李军祥
刘桂祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201410084428.9A priority Critical patent/CN103824197B/en
Publication of CN103824197A publication Critical patent/CN103824197A/en
Application granted granted Critical
Publication of CN103824197B publication Critical patent/CN103824197B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The security code generating means that the present invention is provided, have the feature that, including:Picture storage part, input display part, obtains coding unit, the product product information that acquisition is transfused to, and carry out the corresponding product ID of coding generation according to certain pre-defined rule, key generating unit, AES obtains encryption unit, AES cutting parts, DES obtains encryption unit, DES interceptions portion, IDEA obtains encryption unit, and IDEA interceptions portion.Security code generating means of the present invention, product ID is encrypted using aes algorithm first, then the result that aes algorithm is encrypted is divided into two parts, a part is encrypted using DES algorithms and obtains the false proof complete code of logistics, effluent stream Application in Anti-counterfeiting code is intercepted from the false proof complete code of logistics, another part is encrypted using IDEA algorithms and obtains product false proof complete code, product Application in Anti-counterfeiting code is intercepted out from product false proof complete code, therefore, it is of the invention with Cipher Strength is high, be difficult the characteristics of cracking compared with prior art.

Description

Security code generating means
Technical field
The present invention relates to a kind of security code generating means, and in particular to a kind of to be believed according to the product comprising logistics information The security code generating means of the logistics Application in Anti-counterfeiting code of breath generation predetermined length and the product false proof application code of predetermined length.
Background technology
Today's society fake and inferior commodities are spread unchecked, and are the outstanding problems in China's economic life, hit fake and inferior commodities Production and circulation, concerning purge flow order, protect consumers' interests, protect legal intellectual property, also with improve China business Prestige of the product in international market is directly related.Fake products has not only encroached on the interests of consumers in general, has upset normal city Field order, and bring huge economic loss to manufacturer.Each manufacturing enterprise is not produced to guard one's interest by personation Product are encroached on, mostly meeting antiforge code on product.Consumer is when verifying that product is true and false, it is only necessary to scrape the covering of security code off Layer, security code is input into by forms such as website, phone, SMSs, and the true and false result of the product can be learnt by inquiry.
At present, although the AES of generation security code has a lot, but the Cipher Strength of most of AES is not very Ideal, enciphering rate is also slower.Lack that a kind of Cipher Strength is high in the prior art, be difficult to crack for generating the anti-of security code Pseudo code generation device.
The content of the invention
The present invention is carried out to solve above-mentioned problem, it is therefore intended that provided that a kind of Cipher Strength is high, be difficult to crack Can according to comprising logistics information product information generation predetermined length logistics Application in Anti-counterfeiting code and predetermined length product The security code generating means of Application in Anti-counterfeiting code.
The security code generating means that the present invention is provided, have the feature that, including:Picture storage part, at least storage life Into the picture of security code, display part is input into, at least shows the picture of generation security code, the picture of the generation security code has to be used for The product information input frame of input product information, and generation button, obtain coding unit, the product product letter that acquisition is transfused to Breath, and the corresponding product ID of coding generation, key generating unit are carried out according to certain pre-defined rule, once generate button It is pressed, it is secret that the random generation of key generating unit is respectively used to the AES keys of aes algorithm, DES algorithms and IDEA algorithms, DES Key and IDEA keys, AES obtain encryption unit, and AES encryption algorithm computing is carried out after obtaining product ID and AES keys, obtain To encryption data, encryption data is divided into preceding encryption data and rear encryption data by AES cutting parts, and DES obtains encryption unit, obtains Des encryption algorithm computing is carried out after taking preceding encryption data and DES keys, the false proof complete code of logistics, DES interceptions portion, from thing is obtained Flow false proof complete code intercept out predetermined length logistics Application in Anti-counterfeiting code, IDEA obtain encryption unit, after acquisition encryption data and IDEA encryption algorithm computing is carried out after IDEA keys, product false proof complete code, and IDEA interceptions portion is obtained, it is complete from product false proof All-key intercepts out the product false proof application code of predetermined length, wherein, input display part display product false proof application code and logistics are anti- Pseudo- application code.
In security code generating means of the invention, can also have the feature that:Wherein, product information includes product Specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.
The effect of invention and effect
According to security code generating means involved in the present invention, due to being carried out using aes algorithm to product ID first Encryption, is then divided into two parts by the result that aes algorithm is encrypted, and a part is encrypted that to obtain logistics false proof using DES algorithms Complete code, intercepts effluent stream Application in Anti-counterfeiting code from the false proof complete code of logistics, and another part is encrypted using IDEA algorithms To product false proof complete code, product Application in Anti-counterfeiting code, and tri- kinds of AES, DES, IDEA are intercepted out from product false proof complete code What the encryption key of AES was all randomly generated, therefore security code generating means of the invention have compared with prior art Cipher Strength is high, be difficult the characteristics of cracking.Further, since security code generating means of the present invention are according to the product comprising logistics information The logistics Application in Anti-counterfeiting code of product information generation predetermined length and the product false proof application code of predetermined length, the logistics for being generated are false proof The length of application code and product false proof application code can change as needed, therefore the present invention has, and flexibility is strong, changeability is high Feature.
Brief description of the drawings
Fig. 1 is security code generating means block diagram in embodiments of the invention;
Fig. 2 is the picture view of generation security code in embodiments of the invention;
Fig. 3 is product information coding rule schematic diagram in embodiments of the invention;
Fig. 4 is the product process figure of security code in embodiments of the invention;
Fig. 5 is AES encryption algorithm flow chart in embodiments of the invention;
Fig. 6 is des encryption algorithm flow chart in embodiments of the invention;And
Fig. 7 is IDEA encryption algorithm flow chart in embodiments of the invention.
Specific embodiment
In order that technological means, creation characteristic, reached purpose and effect that the present invention is realized are easy to understand, it is real below Example combination accompanying drawing is applied to be specifically addressed security code generating means of the present invention.
Fig. 1 is security code generating means block diagram in embodiments of the invention.
As shown in figure 1, security code generating means 100 include:Picture storage part 1, is input into display part 2, obtains coding unit 3, Key generating unit 4, AES obtains encryption unit 5, AES cutting parts 6, and DES obtains encryption unit 7, and DES interceptions portion 8, IDEA obtains encryption Portion 9, and IDEA interceptions portion 10.In addition, security code generating means 100 also include control unit, respectively with picture storage part 1, defeated Enter display part 2, obtain coding unit 3, key generating unit 4, AES obtain encryption unit 5, AES cutting parts 6, DES obtain encryption unit 7, DES interceptions portion 8, IDEA obtains encryption unit 9 and IDEA interceptions portion 10 is connected, and realizes to the whole of security code generating means 100 Body is controlled.
Fig. 2 is the picture view of generation security code in embodiments of the invention.
Picture storage part 1 at least stores the picture 11 of generation security code as shown in Figure 2.Security code generation picture 11 is wrapped The prompt message 111 of input product information containing prompting, the product input frame 112 for input product information, generation button 113, And the display box 114 of display logistics Application in Anti-counterfeiting code and product false proof application code.Input display part 2 at least shows that the generation is prevented The picture 11 of pseudo-code.
Fig. 3 is product information coding rule schematic diagram in embodiments of the invention.
Obtain coding unit 3 and obtain the product product information being transfused in product information input frame 112, and according to shown in Fig. 3 Pre-defined rule carry out the corresponding product ID D of coding generation.When generate button 113 be pressed when, key generating unit 4 with Machine generation is respectively used to AES keys, DES keys and the IDEA keys of aes algorithm, DES algorithms and IDEA algorithms.AES After obtaining acquisition product ID D and the AES key of encryption unit 5, carry out the computing of AES encryption algorithm and obtain encryption data M.AES Encryption data M is divided into preceding encryption data M1 and rear encryption data M2 by cutting part 6.DES obtains encryption number before encryption unit 7 is obtained After according to M1 and DES keys, carry out the computing of des encryption algorithm and obtain the false proof complete code of logistics.DES interceptions portion 8 is false proof from logistics Complete code intercepts out the logistics Application in Anti-counterfeiting code of predetermined length.It is secret that IDEA obtains encryption data M2 and IDEA after encryption unit 9 is obtained After key, carry out the computing of IDEA encryption algorithm and obtain product false proof complete code.IDEA interceptions portion 10 cuts from product false proof complete code Take out the product false proof application code of predetermined length.
Here, product information includes product specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.Thing Stream Application in Anti-counterfeiting code is one group of 16 character string being directly printed in commodity external packing, and character string is made up of A-F, 0-9 characters, By authorized user by website to commodity circulation information such as whole seller, the information such as dealer is inquired about and updated, so that The purpose that the process of circulation of commodity is managed and is monitored is reached, when consumer query commodity true and false information, according to demand, The circulation information of consumer's display of commodity can also be given simultaneously.Product false proof application code is printed in commodity packaging, but to be scraped Opening one layer of cover layer can just see, one group of 20 character string that it is made up of character 0-9, be divided into 4 sections, every section of 5 characters, by Consumer carries out commodity true and false inquiry, Query Result display authenticity of products information, while can show by modes such as website, phones Show the information such as production and circulation.
The security code generating means 100 of the present embodiment are elaborated with reference to flow chart according to comprising logistics information Product information generates the logistics Application in Anti-counterfeiting code of 16 and the process of the product false proof application code of 20.
Fig. 4 is the product process figure of security code in embodiments of the invention.
Step S-1:
The picture 11 of the input display security code generation of display part 2, allows user to be input into product information input frame 112 relatively The product information answered, i.e. product specification, machine number, order of classes or grades at school number, date of manufacture, mark and logistics information.Press generation button 113, subsequently into step S-2.
Step S-2:
The random generation of key generating unit 4 is respectively used to carry out 128 s' of aes algorithm, DES algorithms and IDEA algorithms AES keys, the DES keys of 64 and the IDEA keys of 64, subsequently into step S-3.
Step S-3:
The product information of input is selected in the acquisition product information of coding generating unit 3 input frame 112, according to as shown in Figure 3 Coding rule carries out the product ID D of coding generation 128, subsequently into step S-4.
Fig. 5 is AES encryption algorithm flow chart in embodiments of the invention.
Step S-4:
After AES obtains acquisition product ID D and the AES key of encryption unit 5, AES encryption algorithm fortune as shown in Figure 5 is carried out Calculate.The detailed process of AES encryption algorithm is:
The length of length and AES keys according to product ID D determines the product serial of iterations Nr, i.e., 128 The AES keys of number D and 128 determine that iterations is 10 times.
Step S-4a:10 extensions are carried out to AES keys and obtains 10 groups of extension key E of wheel key composition.
Step S-4b:XOR is carried out to product ID D and the step-by-step of AES keys and obtains the 1st operation values C1.
Step S-4c:9 AES encryption iteration are carried out to the 1st operation values C1 and obtains the 5th operation values C5.
Step S-4d:S box replacement operators are carried out to the 5th operation values C5 and obtains the 6th operation values C6.
Step S-4e:The shifting byte manipulation that is circulated often capable to the 6th operation values C6 obtains the 7th operation values C7, i.e. the second row Ring shift left 1, the third line ring shift left 2, the third line ring shift left 3.
Step S-4f:XOR is carried out to the 7th operation values and the step-by-step of the 10th group of wheel key E [10], the encryption is obtained Data M.
Wherein, the single AES encryption iteration in 10 AES encryption iteration is comprised the following steps:
Step S-4c1:S box replacement operators are carried out to the 1st operation values C1 and obtains the 2nd operation values C2.
Step S-4c2:The shifting byte manipulation that is circulated often capable to the 2nd operation values C2 obtains the 3rd operation values C3, i.e. the second row Ring shift left 1, the third line ring shift left 2, the third line ring shift left 3.
Step S-4c3:Mixed rank transformation operation is carried out to the 3rd operation values C3 and obtains the 4th operation values C4.
Wheel key E [i] of this encryption iteration is determined according to extension key E.
Step S-4c4:XOR is carried out with wheel key E [i] step-by-step to the 4th operation values C4 and obtains the 5th operation values C5.
AES encryption algorithm terminates to obtain encryption data M, subsequently into step S-5.
Step S-5:
AES cutting parts 6 will be divided into two parts through the encrypted encryption data M of aes algorithm, i.e., preceding encryption data M1 is with after Encryption data M2, subsequently into step S-6.
Fig. 6 is des encryption algorithm flow chart in embodiments of the invention.
Step S-6:
After DES acquisitions encryption unit 7 obtains preceding encryption data M1 and DES keys, des encryption algorithm as shown in Figure 6 is carried out Computing, the detailed process of des encryption algorithm is:
Step S-6a:IP in-place computations are carried out to preceding encryption data M1 and obtains the 8th operation values C8, and by the 8th operation values C8 It is divided into left data L and right data R.
Step S-6b:Key conversion is carried out to DES keys and obtains 16 DES key groups DS of DES keys composition.
Step S-6c:16 des encryption iteration are carried out to left data L and right data R and obtains new left data NL and new right number According to NR.
Step S-6d:The new data N being made up of new left data NL and new right data NR is carried out into last permutation function computing to obtain To the false proof complete code of logistics.
Wherein, the single des encryption iteration in 16 des encryption iteration is comprised the following steps:
Step S-6c1:Replacement operator is extended to right data L and obtains the 9th operation values C9.
DES keys DS [i] of this encryption iteration are determined according to DES key groups DS.
Step S-6c2:9th operation values C9 and DES keys DS [i] are carried out into XOR and obtains the 10th computing knot value C10, and the 10th operation values C10 is divided into eight data blocks.
Step S-6c3:Eight data blocks are carried out with S box replacement operators respectively and obtains corresponding eight output datas.
Step S-6c4:The 11st operation values C11 to being made up of eight output datas carries out P box replacement operators and obtains the 12nd Operation values C12.
Step S-6c5:XOR is carried out with left data L to the 12nd operation values C12 and obtains the 13rd operation values C13.
Step S-6c6:Using the 13rd operation values C13 as new left data NL, left data L as new right data NR enters Next round iteration.
Des encryption algorithm terminates to obtain the false proof complete code of logistics, subsequently into step S-7.
Step S-7:
The logistics that DES interceptions portion 8 intercepts out 16 from the false proof complete code of the logistics obtained through des encryption algorithm for encryption is prevented Pseudo- application code, subsequently into step S-8.
Fig. 7 is IDEA encryption algorithm flow chart in embodiments of the invention.
Step S-8:
After the IDEA acquisition acquisitions of encryption unit 9 after encryption data M2 and IDEA key, carry out IDEA encryption as shown in Figure 7 and calculate Method computing, the detailed process of IDEA encryption algorithm is:
Step S-8a:Computing is carried out to IDEA keys and obtains 52 sub- key group IS of IDEA of the sub- key compositions of IDEA.
Step S-8b:Rear encryption data M2 is divided into the 1st data X1, the 2nd data X2, the 3rd data X3 and the 4th data X4。
Step S-8c:1st data X1, the 2nd data X2, the 3rd data X3 and the 4th data X4 are carried out by 8 IDEA encryptions and changed In generation, obtains new 1st data NX1, new 2nd data NX2, the new data NX4 of 3rd data NX3 and Xin 4.
Step S-8d:The multiplication of mould 2161 is done to the sub- key S [49] of new 1st data NX1 and 49IDEA and obtains the 1st subnumber According to Z1;Mould 216 is done to the sub- key S [50] of new 3rd data NX3 and 50IDEA plus computing obtains the 2nd subdata Z2;To the new 2nd The sub- key S [51] of data NX2 and 51IDEA do mould 216 plus computing obtains the 3rd subdata Z3;To new 4th data NX4 and The sub- key S [52] of 52IDEA are done the multiplication of mould 2161 and obtain the 4th subdata Z4.
Step S-8e:Carried out in order by the 1st subdata Z1, the 2nd subdata Z2, the 3rd subdata Z3 and the 4th subdata Z4 Integration obtains product false proof complete code.
Wherein, the single IDEA encryption iteration in 8 IDEA encryption iteration is comprised the following steps:
The sub- key IS [1] of the 1IDEA of current iteration, the sub- key IS of 2IDEA are determined according to the sub- key group IS of IDEA [2], the sub- key IS [3] of 3IDEA, the sub- key IS [4] of 4IDEA, the sub- key IS [5] of 5IDEA and the sub- key IS of 6IDEA [6];
Step S-8c1:The multiplication of mould 2161 is done to the 1st sub- key IS [1] of data X1 and 1IDEA and obtains the 14th operation values C14;Mould 216 is done to the 2nd sub- key IS [2] of data X2 and 2IDEA plus computing obtains the 15th operation values C15;To the 3rd data X3 Key IS [3] sub- with 3IDEA does mould 216 plus computing obtains the 16th operation values C16;To the 4th data sub- key of X4 and 4IDEA IS [4] does the multiplication of mould 2161 and obtains the 17th operation values C17.
Step S-8c2:XOR is carried out to the 14th operation values C14 and the 16th operation values C16 and obtains the 18th operation values C18;XOR is carried out to the 15th operation values C15 and the 17th operation values C17 and obtains the 19th operation values C19.
Step S-8c3:The multiplication of mould 2161 is done to the 18th sub- key S [5] of operation values C18 and 5IDEA and obtains the 20th fortune Calculation value C20;Mould 216 is done to the 19th operation values C19 and the 20th operation values C20 plus computing obtains the 21st operation values C21;Transported to the 21st The sub- key S [6] of calculation value C21 and 6IDEA are done the multiplication of mould 2161 and obtain the 22nd operation values C22;To the 20th operation values C20 and 22 operation values C22 do mould 216 plus computing obtains the 23rd operation values C23.
Step S-8c4:XOR is carried out to the 14th operation values C14 and the 22nd operation values C22 and obtains the 24th operation values C24;XOR is carried out to the 16th operation values C16 and the 22nd operation values C22 and obtains the 25th operation values C25;To the 15th operation values C15 and the 23rd operation values C23 carry out XOR and obtain the 26th operation values C26;To the 17th operation values C17 and the 23rd operation values C23 carries out XOR and obtains the 27th operation values C27.
Step S-8c5:By the 24th operation values C24, the 26th operation values C26, the 25th operation values C25 and the 27th operation values C27 Successively as new 1st data NX1, new 2nd data NX2, the new data NX4 of 3rd data NX3 and Xin 4, into next round iteration.
IDEA encryption algorithm terminates to obtain product false proof complete code, subsequently into step S-9.
Step S-9:
IDEA interceptions portion 10 intercepts out the product of 20 from the product false proof complete code obtained through IDEA encryption algorithm for encryption Product Application in Anti-counterfeiting code, subsequently into step S-10.
Step S-10:
Input display part 2 shows false proof through the logistics of AES encryption algorithm, des encryption algorithm, the generation of IDEA encryption algorithm Application code and product false proof application code.
So far the logistics Application in Anti-counterfeiting code and the product of 20 according to the product information generation 16 comprising logistics information are completed The process of product Application in Anti-counterfeiting code.
The effect of embodiment and effect
The security code generating means that the present embodiment is provided, due to being encrypted using aes algorithm to product ID first, Then the result that aes algorithm is encrypted is divided into two parts, a part is encrypted that to obtain logistics false proof completely using DES algorithms Code, intercepts effluent stream Application in Anti-counterfeiting code from the false proof complete code of logistics, and another part is encrypted using IDEA algorithms and is produced The false proof complete code of product, intercepts out product Application in Anti-counterfeiting code, and tri- kinds of encryptions of AES, DES, IDEA from product false proof complete code What the encryption key of algorithm was all randomly generated, therefore security code generating means of the invention have encryption compared with prior art Intensity is high, be difficult the characteristics of cracking.
Security code generating means in the present embodiment, are according to the product information generation predetermined length comprising logistics information The product false proof application code of logistics Application in Anti-counterfeiting code and predetermined length, the logistics Application in Anti-counterfeiting code for being generated and product false proof application The length of code can change as needed, therefore the present invention has the characteristics of flexibility is strong, changeability is high.
Above-mentioned implementation method is preferred case of the invention, is not intended to limit protection scope of the present invention.

Claims (2)

1. a kind of product false proof application code and pre- fixed length for generating predetermined length respectively based on the product information comprising logistics information The security code generating means of the logistics Application in Anti-counterfeiting code of degree, it is characterised in that including:
Picture storage part, at least picture of storage generation security code;
Input display part, at least shows the picture of the generation security code, and the picture of the generation security code is produced with input is used for The product information input frame of product information, and generation button;
Coding unit, the product information that acquisition is transfused to are obtained, and it is relative to carry out coding generation according to certain pre-defined rule The product ID answered;
Key generating unit, once it is described generation button be pressed, the key generating unit at random generation be respectively used to aes algorithm, The AES keys of DES algorithms and IDEA algorithms, DES keys and IDEA keys;
AES obtains encryption unit, and AES encryption algorithm computing is carried out after obtaining the product ID and the AES keys, is added Ciphertext data;
AES cutting parts, preceding encryption data and rear encryption data are divided into by the encryption data;
DES obtains encryption unit, and des encryption algorithm computing is carried out after obtaining the preceding encryption data and the DES keys, obtains thing Flow false proof complete code;
DES interceptions portion, the logistics Application in Anti-counterfeiting code of predetermined length is intercepted out from the false proof complete code of the logistics,
IDEA obtains encryption unit, and IDEA encryption algorithm computing is carried out after obtaining the rear encryption data and the IDEA keys, obtains To product false proof complete code;And
IDEA interceptions portion, the product false proof application code of predetermined length is intercepted out from the product false proof complete code,
Wherein, the input display part shows the product false proof application code and logistics Application in Anti-counterfeiting code,
The input of the key generating unit with it is described input display part be connected, the output end of the key generating unit with it is described AES obtains the input connection of encryption unit,
The output end that the input of the AES cutting parts obtains encryption unit with the AES is connected, the output of the AES cutting parts End obtains the input of encryption unit, the input of IDEA acquisition encryption units with the DES and is connected respectively,
The DES obtains the output end of encryption unit and the input in the DES interceptions portion,
The input that the IDEA obtains encryption unit is connected with the input in the IDEA interceptions portion.
2. security code generating means according to claim 1, it is characterised in that:
Wherein, the product information comprising specification code, board code, flag code, order of classes or grades at school code, date of manufacture and time, Production code member and the logistics information.
CN201410084428.9A 2014-03-10 2014-03-10 Security code generating means Expired - Fee Related CN103824197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410084428.9A CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410084428.9A CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Publications (2)

Publication Number Publication Date
CN103824197A CN103824197A (en) 2014-05-28
CN103824197B true CN103824197B (en) 2017-07-11

Family

ID=50759246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410084428.9A Expired - Fee Related CN103824197B (en) 2014-03-10 2014-03-10 Security code generating means

Country Status (1)

Country Link
CN (1) CN103824197B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751217B (en) * 2015-04-17 2017-08-29 广州市宝绅纸塑有限公司 The generation system and application system of security code, security code
CN105760915B (en) * 2016-02-02 2018-08-24 程烨 A kind of generation method and device of anti-counterfeiting image
US9972061B2 (en) 2016-02-02 2018-05-15 Ye Cheng Method and apparatus for generating anti-forgery image
CN106445847A (en) * 2016-09-12 2017-02-22 天脉聚源(北京)传媒科技有限公司 U disk SN code obtaining method and device
CN108830366A (en) * 2018-06-20 2018-11-16 广州市宝绅纸塑有限公司 A kind of generation method and system of anti-fake spiral coloured silk code

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2157971C (en) * 1994-09-15 2003-07-08 Todd W. Arnold Apparatus and method for secure distribution of data
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN101388086A (en) * 2007-09-14 2009-03-18 段娟 Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN102968726A (en) * 2012-10-23 2013-03-13 杭州杰德科技有限公司 Two-dimensional code network anti-fake method with secondary encryption characteristics
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020091935A1 (en) * 2000-08-11 2002-07-11 Sony Corporation, A Corporation Of Japan Storage and retrieval of encrypted content on storage media

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2157971C (en) * 1994-09-15 2003-07-08 Todd W. Arnold Apparatus and method for secure distribution of data
CN101388086A (en) * 2007-09-14 2009-03-18 段娟 Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN102968726A (en) * 2012-10-23 2013-03-13 杭州杰德科技有限公司 Two-dimensional code network anti-fake method with secondary encryption characteristics
CN103199995A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 File encryption method and device

Also Published As

Publication number Publication date
CN103824197A (en) 2014-05-28

Similar Documents

Publication Publication Date Title
CN103824197B (en) Security code generating means
CN102546181B (en) Cloud storage encrypting and deciphering method based on secret key pool
JP5485694B2 (en) Encryption method for white box implementation
EP2829010B1 (en) Updating key information
US9998279B2 (en) Electronic block cipher device suitable for obfuscation
JP2001324925A5 (en)
JP2014002365A5 (en)
US20150349951A1 (en) Protecting Cryptographic Operations Using Conjugacy Class Functions
CN105184115A (en) Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation
CN110704854A (en) Stream type encryption method aiming at text data reserved format
CN103414552B (en) One utilizes binary tree traversal mode to be encrypted, decryption method and device
CN108270545A (en) A kind of improved DES data encryption algorithm based on mobile Internet
JunLi et al. Email encryption system based on hybrid AES and ECC
KR101445339B1 (en) Integrated cryptographic apparatus for providing confidentiality and integrity
CN107852324A (en) For encrypting the method and encryption node of message
Dobraunig et al. Differential cryptanalysis of SipHash
Kapalova et al. Security analysis of an encryption scheme based on nonpositional polynomial notations
CN107465508A (en) A kind of method, system and the equipment of software and hardware combining construction true random number
CN107707352B (en) A kind of embedded encryption method
CN105763322A (en) Obfuscatable encryption key-insulated digital signature making method and system
Ahmad et al. Protection of the texts using Base64 and MD5
Agustini et al. Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher
CN103824198B (en) Security code generates checking system
CN103886464A (en) Anti-fake code generating method
CN112866288A (en) Data symmetric encryption method for double-plaintext transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

Termination date: 20200310