CN1178949A - Digital anti-fake method - Google Patents

Digital anti-fake method Download PDF

Info

Publication number
CN1178949A
CN1178949A CN 97107763 CN97107763A CN1178949A CN 1178949 A CN1178949 A CN 1178949A CN 97107763 CN97107763 CN 97107763 CN 97107763 A CN97107763 A CN 97107763A CN 1178949 A CN1178949 A CN 1178949A
Authority
CN
China
Prior art keywords
key
code
mapping
password
plain code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 97107763
Other languages
Chinese (zh)
Inventor
杨振宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 97107763 priority Critical patent/CN1178949A/en
Publication of CN1178949A publication Critical patent/CN1178949A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

Digital anti-fake method is that number comprising M plain codes and N secret codes is marked in commodity, so that consumer and distributor can inspect the truth of purchased commodity via telephone or computer. During marking, the plain codes are marked in visible outer part of commodity and features that secret codes in unvisible part covered by "irreversible" matter.

Description

Digital anti-fake method
The present invention relates to a kind of to the apparatus and method of product with the digital code anti-false and the checking true and false.
When consumer or dealer when buying commodity, often be difficult to distinguish its true and false.Existing antifake method for products is common in and adopts bar code, laser hologram trade mark, disposable antitheft packing (as pilferproof closure), thermosensitive response thing or the like, but the counterfeiter still can be counterfeit.For consumer or dealer, then often comparatively difficult in operation if attempt to be differentiated by commodity inspection or technical supervising department, also can be described as unpractical.Therefore, be necessary to provide a kind of new apparatus and method that product false proof is convenient to verify its true and false again that promptly possess.
Purpose of the present invention realizes in the following manner: plain code in the outward appearance visible part mark number of product and the password in the invisible part mark of the outward appearance of product number, plain code in the number and password are concerned by the mapping each other and the inverse mapping of polynary key array and the control of mapping control code.In the present invention, mark the password in the number of the invisible part of product appearance, just can see after usually needing to destroy with detaching products or with the parts that can not restore on the product (sign that covers as disposable pilferproof closure, by special material etc.).If the above-mentioned parts that need dismounting maybe can not restore are commonly referred to as " irreversible " material, then this password is covered by the material of " irreversible ".The number that every product marked has nothing in common with each other, and is subjected to control with digital corresponding key.When key is when other people are secret, number is safe before being verified.Like this, the counterfeiter just can not counterfeitly be subjected to the product of digital protection.Production firm files the number that each product marked (as depositing computing machine in) when its product export, simultaneously number and the key that each product marked is offered Information Services Department (as the information station of telecommunication department).When consumer, group user or dealer buy this product, if need its true and false of checking then can be examined by the mode of inquiring about the number of this product with phone (or computer).
Based on the method for the commodity digital anti-counterfeit of compunication, information processing, database, network and contemporary cryptology, must effectively protect digital itself.The present invention has also designed polynary key array and mapping control code especially for this reason, make the Cipher Strength of cryptographic algorithm greatly improve, thereby order attempts by method of exhaustion exhaustive search or to utilize mathematical analysis method analysis number and mapping ensemblen or inverse mapping collection thereof be impossible.
In the present invention, number and production method thereof are as follows:
M (plain code of 1≤M<∞) and N (the individual password of N 〉=M), its mapping and inverse mapping relation by shine upon control code with polynary set of cipher key (Ki, Kj ..., Kp; Its i, j .., p is null not to the utmost number) control, thus derive N different number.
(1) be Ki when shining upon the described polynary key array of control code, Kj ..., Kp (i=1, j=1 ..., in the time of p=1), digital exports as:
Plain code M1 is mapped to password N1 with key K 1, and plain code M2 is mapped to password N2 with key K 2 ..., plain code Mk is mapped to password Nk with key K k ..., plain code Mn is mapped to password Nn with key K k;
Its inverse mapping is the inverse operation of its mapping: password Nn becomes plain code Mn with key K k inverse mapping ..., password N2 becomes plain code M2 with key K 2 inverse mappings, and password N1 becomes plain code M1 with key K 1 inverse mapping.
(2) be Ki when shining upon the described polynary set of cipher key of control code, Kj ..., Kp (1≤i≤N, j=0 ...., in the time of p=0), digital exports as:
Plain code Mm is mapped to password Mm (1≤m≤M) with key K 1 key K 2... key K i;
Its inverse mapping is the inverse operation of its mapping.
(3) be Ki when shining upon the described polynary set of cipher key of control code, Kj ..., Kp (1≤i≤N, j=1 ..., p=1), key L is the Kj of key unit ..., the set of Kp, then digital exports as:
Plain code M1 is mapped to password N1 with key K 1 key L, and plain code M2 is mapped to password N2 with key K 2 key L ..., plain code M3 is mapped to password N3 with key K 3 key L ..., plain code Mn is mapped to password Nn with key K k key L;
Its inverse mapping is the inverse operation of its mapping.
(4) be Ki when shining upon the described polynary set of cipher key of control code, Kj ..., Kp (1≤i≤N, 1≤j≤N, k=0 ..., in the time of p=0), digital exports as:
Plain code M1 is mapped to password N1 with key K i1 key K j1, plain code M1 is mapped to password N2 with key K i1 key K j2, ..., plain code M1 is mapped to password Nj with key K i1 key K jj, ..., plain code M1 is mapped to password N1+j with key K i2 key K j1 ..., plain code M1 is mapped to password Ni*j with key K ii key K jj; ...; Plain code Mm is mapped to password Nm with key K i1 key K j1;
Its inverse mapping is the inverse operation of its mapping.
(5) when mapping control code described polynary set of cipher key be Ki, Kj ..., Kp (1≤i≤N, 1≤j≤N ..., during 1≤p≤N), digital exports as:
The element that plain code Mm forms with polynary set of cipher key is key K i key K j ..., the matrix of key K p is mapped to password M;
Its inverse mapping is the inverse operation of its mapping.
In the present invention, plain code in the number and key can be the data of certain code length of being selected by manufacturer, and password then shines upon plain code with polynary key array by the mapping control code of being selected by manufacturer and gets.In addition, manufacturer can be illustrated plain code according to this product characteristics---for example<and description code 〉;<description code〉can comprise: product as " batch ", " quantitative range ", " date of manufacture " and " Expiration Date " or the like data.Manufacturer can be regularly or changes the polynary key array that is used to produce mapping and inverse mapping aperiodically, and with key " life cycle " director data point to plain code<description code data, " life cycle " director data is used for determining the digital scope that acts on of key: the code length of (1) plain code: hexadecimal sixteen bit data; (2) data structure of plain code:<vendor code 〉+<the commodity item code 〉+<extra-code 〉; (3) the description code data structure of plain code:<mapping control code 〉+<batch+<quantitative range 〉+<failure period 〉; (4) code length of key and data structure: hexadecimal sixteen bit data; (5) data structure life cycle of key: with the description code of plain code; (6) Shuo Ma cryptographic algorithm: DES or other similar cryptographic algorithm; (7) digital mapping is controlled: with the digital mapping of mapping control code control; (8) Shuo Ma decipherment algorithm: DES or other similar decipherment algorithm; (9) digital inverse mapping is controlled: according to the digital inverse mapping of mapping control code control; (10) Shuo Ma verification system: computing also produces the speech data that becomes mapping relations with number; (11)<and vendor code〉data structure: with the four figures certificate of ' bar code ' definition, be 16 but allow data
System; (12)<and the commodity item code〉data structure: with the five-digit number certificate of ' bar code ' definition, but allow data to be
Sexadecimal; (13)<and extra-code〉data structure: hexadecimal seven bit sequence sign indicating numbers (scope 1--2.68 hundred million); (14)<and batch sign indicating number〉data structure: hexadecimal two bit data (scope 1----255); (15)<and the quantitative range sign indicating number〉data structure: hexadecimal 14 bit codes, as follows
<extra-code 〉+<the quantity sign indicating number〉(can represent 1---255*2.68 hundred million, about 683.40 hundred million); (16)<and the Expiration Date〉data structure: hexadecimal eight bit data, as follows,
<year+<month+<day, for example " 1997 "+" 09 "+" 02 ";
In application process of the present invention, for corresponding with international " bar code ", suggestion manufacturer adopts and selects when selecting number and cryptographic algorithm thereof, decipherment algorithm and verification system: the encryption of DES algorithm logarithmic code, deciphering and checking.This is because DES is a data encryption algorithm openly, safely and efficiently, is suitable for the practical application of " digital anti-fake method ".
Method for anti-counterfeit of the present invention is compared with aforementioned existing similar method for anti-counterfeit, has the characteristics that the consumer checks authenticity of products of being convenient to.Simultaneously, method for anti-counterfeit security of the present invention is extremely strong, can resist the attack of forgery group effectively.
Content of the present invention is further described with the following Examples, but content of the present invention is not limited only to content related among the embodiment.
Fig. 1 is the logic diagram of universal digital encryption and decryption among the embodiment.
Fig. 2 is input or revises key and output mapping control code functional flow diagram.
Fig. 3 is the functional block diagram of digital-code encryption process.
Fig. 4 is the functional block diagram of digital decrypting process.
Fig. 5 is a Telephone computer automated verification system process flow diagram.
Fig. 6 is a digital anti-fake method application function process flow diagram.
The present invention fully takes into account " digital anti-fake method " in the practical application of protecting commodity, and the maintenance of the transmission of digital safety and number, digital integrality and number is for the importance of " digital anti-fake method ".Therefore, before entering specific embodiment, introduce DES (Data Encryption Standard) data encryption algorithm and the concrete application in " digital anti-fake method " thereof here especially.
Three of the suction parameters of DES algorithm: plain code, key, cipher mode;
One of outlet result: password.
When the user selects the DES algorithm that false proof ' number ' encrypted or deciphered, at first need design " plain code ", " description code ", " key " and " mapping control code " of ' number ', and utilize software provided by the present invention " digital generation system " to generate to be used for ' number ' of commodity counterfeit prevention and plain code that will ' number ' to be mapped to password with key through shining upon control code, as shown in Figure 1.
Summary has represented to use the logical process of a general digital-code encryption of the present invention and decipher function among Fig. 1.With cryptographic algorithm (mapping or inverse mapping) plain code is become password with secret key encryption.The encipherer is with the polynary set of cipher key of selectable mapping control code---key K i, key K j ..., the result that key K p control is encrypted.Deciphering person with have only the encipherer to know or license with encrypt the password to decipher of corresponding encryption method inverse operation and become plain code number.
An important application of the present invention is after above-mentioned false proof ' number ' made " digital code anti-false identification ", marks in the exterior of commodity packing in any feasible mode, for example adopts and print digital mode on trade mark:
1. " plain code " mark mode
(1) " sequence code " with " plain code " marks behind ' bar shaped ' sign indicating number of commodity;
(2) " plain code " marked trade mark in commodity;
(3) " plain code " marked outward appearance part in commodity;
2. " password " mark mode
(1) " password " marked by ' bar shaped ' sign indicating number of commodity, and cover with ' irreversible ' material;
(2) " password " marked in " plain code " side, and cover with ' irreversible ' material;
(3) " password " marked on the bottle cap of commodity, and cover with ' irreversible ' material;
Under the situation that does not influence digital mark and checking, also can adopt other mark mode, this can't influence or cause digital own security, integrality and anti-counterfeiting performance.
An importance of the present invention has provided the inner structure of ciphering process to generate digital mapping ensemblen.The user can be by selecting different polynary set of cipher key control mapping or inverse mapping.Not having key, calculate this number mapping ensemblen or inverse mapping centralized procurement with the method for exhaustion, is infeasible on calculating.
Another importance of the present invention is to control encryption or decrypting process by producing the mapping control code by user's selection or the polynary key array of revising, thus the feasible digital better security that obtains; Its functional sequence as shown in Figure 2.
In addition, by selecting polynary set of cipher key and mapping control code, plain code M is encrypted functional sequence that (mapping or inverse mapping) become password N as shown in Figure 3.
When Fig. 3 has been described in detail manufacturer's application ' digital anti-fake method ' to commodity counterfeit prevention, in generation, transmission, printing and the proof procedure of number, the encryption of logarithmic code; And when encrypting with mapping control code control for the method for choosing and adopt mapping or inverse mapping of key.When mapping or another mistake were shone upon again, what imported was to need the data of mapping or inverse mapping and shine upon the selected key of control code.
Another importance of the present invention has provided the inner structure of " decrypting process " to generate the deciphering inverse mapping collection of corresponding crypto map set.Deciphering is the inverse operation of mapping or the inverse operation of inverse mapping.Do not know key, it also is infeasible calculating this inverse mapping centralized procurement on calculating with the method for exhaustion.When mapping or another mistake were shone upon again, what imported was need shine upon or the another mistake mapped data again.
Control digital deciphering by the mapping control code of polynary set of cipher key and this encryption, and the functional sequence that password N deciphering (mapping or inverse mapping) is become plain code M as shown in Figure 4.
As shown in Figure 4, the functional flow diagram that comprises " decrypting process " of number of the present invention has been described in detail manufacturer's application ' digital anti-fake method ' to behind the commodity counterfeit prevention, the deciphering of logarithmic code in generation, transmission and the proof procedure of number is to reach mapping or inverse mapping: digital, digital transmission and the digital purpose of checking of maintaining secrecy.
Another importance of the present invention has provided the inner structure and the functional block diagram of verification system.Make the user to the consumer provide one easy, practical and efficiently, only just can verify the truth or falsity of the commodity of purchasing, as shown in Figure 5 by calling (or online computing).
Complete digital application process: comprise number generation and printing, the digital transmission and maintenance and many-sides such as digital checking and transmission, as shown in Figure 6.
Above number among the cited embodiment, refer to data structure represented in digital generative process on the one hand, refer to when being applied to commodity counterfeit prevention mark number on the other hand at the exterior of commodity visible part.
Embodiment 1:
Number is M plain code and N password, key K i (i=1, j=0 ..., p=0).
Condition hypothesis: following data are sexadecimal;
(1) famous brand cigar mill, vendor code is: 1028;
(2) commodity of being produced (bag) code is: 504;
The production batch of (3) 504 commodity is: 06;
The commodity of (4) 06 production batch production quantity altogether are: 0100000 (decimal number 16777216) bag;
(5) the cigarette failure period is: 2 years;
(6) commodity (bag) numeral identification: the number that produces is printed on Cigarette pack " bar code " and locates, wherein plain code
" sequence code " can connect be imprinted on " bar code " after; Digital password is imprinted on the bar code lower position of commodity,
And cover (adopting aluminium foil to cover in this example) with ' irreversible ' material.
Digital data structure:<plain code 〉+<password 〉;
Digital database structure:
(1)<plain code 〉;
(2)<plain code〉<description code 〉:<failure period sign indicating number 〉+<batch sign indicating number 〉+<the quantitative range sign indicating number 〉
(3)<and key 〉: Ki, i=1; (4)<key<life cycle order code: point to plain code<description code; The data structure of plain code: establish the plain code code length and be hexadecimal sixteen bit data, as follows.(1)<and plain code 〉:<vendor code 〉+<the commodity item code 〉+<extra-code〉(3)<vendor code 〉: sexadecimal four figures certificate, as 1028; (4)<and the commodity item code 〉: sexadecimal five-digit number certificate, as<batch sign indicating number 〉+<commercial product code〉(5)<batch sign indicating number 〉: sexadecimal two bit data, as 06; (6)<and commercial product code 〉: sexadecimal three bit data, as 504;<7)<and extra-code 〉: sexadecimal seven bit data, as 0000001; Plain code<description code data structure: (1)<description code 〉:<failure period sign indicating number+<batch sign indicating number ten<quantitative range sign indicating number; (2)<and the failure period sign indicating number 〉: eight date data of the decimal system, as become 19981008; (3)<and the quantitative range sign indicating number 〉: hexadecimal ten four figures certificates, as<0000001 〉+<100000; The data structure of key K: establishing the key code length is hexadecimal sixteen bit data, as
0285580475081648; Key K<life cycle order code data structure:
<batch sign indicating number 〉+<the failure period sign indicating number 〉+<the quantitative range sign indicating number 〉; Ciphering process: des encryption algorithm; Mapping control code: point to key K i; Password coverage mode: ' irreversible material ' cladding process; The digital code anti-false identification of the 0000001st commodity is: (1) plain code: 1028055040000001; (2) password---through mapping device plain code is mapped as password with key:
The digital code anti-false identification of 801A7274BEC45F5F the 0000002nd commodity is: (1) plain code: 1028065040000002; (2) password---through mapping device plain code is mapped as password with key:
6545E8D39E4114B1
By that analogy,
The digital code anti-false identification of the 0100000th commodity is:
(1) plain code: 1028065040100000;
(2) password---through mapping device plain code is mapped as password with key:
8D8D9D16C14BC7C8
Demo plant: import digital mode with phone or computer;
The checking of (one) the 0000001st commodity:
(1) input plain code: 1028065040000001;
(2) input password: 801A7274BEC45F5F;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
The checking of (two) the 0000002nd commodity:
(1) input plain code: 1028065040000002;
(2) input password: 6545E8D39E4114B1;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
By that analogy,
The checking of (three) the 0100000th commodity:
(1) input plain code: 1028065040100000;
(2) input password: 8D8D9D16C14BC7C8;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
Embodiment 2:
Number is M (M=1000, decimal number are 65536) individual plain code (bar) and the individual password of M*N (N=11) (bar+10 bag/bars), key K i, and Kj, Kp (i=11, j=1, p=1).
Condition hypothesis: with example 1, increase in addition and sell the used digital code anti-false identification of link etc., as
(1) large-scale wholesale dealer, large scale commercial product retailer, group user etc.;
(2) production quantity: 1000, ten bag/bars;
(3) plain code quantity: 1000 (bar, the decimal system are 65536); (4) password quantity: M*N (N=11); (5) towards the commercial product code (bar) of condition hypothesis (3): 504; Its password: password 1; (6) towards the commercial product code (bag) of condition hypothesis (4): 504; Its password: password 2, password 3 ..., password 11; (7) encrypt polynary set of cipher key: Ki (1≤i≤11), Kj (j=1), Kp (p=1); (8) commodity (bar) numeral identification: the external packing box " bar code " every cigarette locates to print additional " sequence code "
At " password " of the below of " bar code " printing sign indicating number, and with ' can not
Contrary ' the material covering.Digital data structure: (1)<plain code 〉:<vendor code 〉+<batch+<commercial product code 〉+<sequence code〉(2)<description code 〉:<date of manufacture 〉+<Expiration Date 〉+<quantity〉(3)<password 〉: M*N; Digital database structure: (1)<plain code 〉; (2)<plain code〉<description code 〉:<mapping control code 〉+<failure period 〉+
<batch+<quantitative range 〉; (3)<and key K i 〉: key K 1+ key K 2...+ key K 11 (4)<key K j 〉: J=1; (5)<and key K p 〉: P=1; The data structure of plain code: establish plain code and be hexadecimal sixteen bit data, as follows.(1)<and plain code 〉:<vendor code 〉+<the commodity item code 〉+<extra-code〉(3)<vendor code 〉: hexadecimal four figures certificate, as 1028; (4)<and the commodity item code 〉: hexadecimal five-digit number certificate, as<batch+<commercial product code〉(5)<batch: hexadecimal two bit data, as 06; (6)<and commercial product code 〉: hexadecimal three bit data, as 504; (7)<and extra-code 〉: hexadecimal seven bit data, as 0000001; Plain code<description code data structure: (1)<description code 〉:<mapping control code+<failure period+<batch+<quantitative range; (2)<and the mapping control code 〉: " 11 " " 1 " " 1 "; (3)<and the failure period 〉: eight date data of the decimal system, as 19981008; (4)<and quantitative range 〉: hexadecimal ten four figures certificates, as " 0000001 "+" 0001000 "; The data structure of key: establishing the key code length is hexadecimal sixteen bit data, as (1) key K 1:0285580475106504; (2) key K 2:0285580475206504; (3) key K 3:0285580475306504; (4) key K 4:0285580475406504; (5) key K 5:0285580475506504; (6) key K 6:0285580475606504; (7) key K 7:0285580475706504; (8) key K 8:0285580475806504; (9) key K 9:0285580475906504; (10) key K 10:0285580475A06504; (11) key K 11:0285580475B06504; (12) key K j:9081648028571007; (13) key Kp:6808202196064708; Key<life cycle data structure:<batch+<extra-code+<quantity; Cryptographic algorithm: des encryption algorithm; The control mapping: the mapping control code is pointed to K1K2 ..., K11; Password coverage mode: ' irreversible material ' cladding process; The digital code anti-false identification of the 0000001st commodity is: 1. towards dealer or group user, and commodity (bar) mark: (1) plain code: 1028065040000001; (2) password 1---and use key K 1 key K j key K p through mapping or mapping again
Plain code is encrypted as password 1:DAC75295A012EB532. satisfies the needs of consumers, commodity (bag) mark: (1) plain code: 1028065040000001; (2) password 2---and use key K 2 key K j key K p through mapping or mapping again
Plain code is encrypted as password 2:4BD67C2DB2CF5059 (3) password 3---use key K 3 key K j key K p through mapping or mapping again
Plain code is encrypted as password 3:4BD11DFD9E44493A (4) password 4---use key K 4 key K j key K p through mapping or mapping again
Plain code is encrypted as password 4:00F3670EC6351BAE (5) password 5---use key K 5 key K j key K p through mapping or mapping again
Plain code is encrypted as password 5:A87C7CB5EDD3F402 (6) password 6---use key K 6 key K j key K p through mapping or mapping again
Plain code is encrypted as password 6:23BF616A49E85674 (7) password 7---use key K 7 key K j key K p through mapping or mapping again
Plain code is encrypted as password 7:32ABCAD3FB879FA3 (8) password 8---use key K 8 key K j key K p through mapping or mapping again
Plain code is encrypted as password 8:501B5F673C8DB339 (9) password 9---use key K 9 key K j key K p through mapping or mapping again
Plain code is encrypted as password 9:A4BA1F91BDA7C534 (10) password 10-usefulness key K 10 key K j key K p through mapping or mapping again
Plain code is encrypted as password 10:AA59E082B7F5D36F (11) password 11-usefulness key K 11 key K j key K p through mapping or mapping again
The digital code anti-false identification that plain code is encrypted as password 11:C31BC3675476599C the 0000002nd commodity is: 1. towards dealer or group user, and commodity (bar) mark: (1) plain code: 1028065040000002; (2) password 1---and use key K 1 key K j key K p through mapping or mapping again
Plain code is encrypted as password 1:AB0975E2B3CB5F722. satisfies the needs of consumers, commodity (bag) mark: (1) plain code: 1028065040000002; (2) password 2---and use key K 2 key K j key K p through mapping or mapping again
Plain code is encrypted as password 2:C1A753B9C74355D2
(3) password 3---and use key K 3 key K j key K p through mapping or mapping again
Plain code is encrypted as password 3:BC2F605ACD385D21
(4) password 4---and use key K 4 key K j key K p through mapping or mapping again
Plain code is encrypted as password 4:7F0AEB50E90B9616
(5) password 5---and use key K 5 key K j key K p through mapping or mapping again
Plain code is encrypted as password 5:F17E397C47A79F32
(6) password 6---and use key K 6 key K j key K p through mapping or mapping again
Plain code is encrypted as password 6:C89D244E18877E56
(7) password 7---and use key K 7 key K j key K p through mapping or mapping again
Plain code is encrypted as password 7:BFD62757C39BC196
(8) password 8---and use key K 8 key K j key K p through mapping or mapping again
Plain code is encrypted as password 8:ECA98F25CCC31220
(9) password 9---and use key K 9 key K j key K p through mapping or mapping again
Plain code is encrypted as password 9:951DE600CC321F92
(10) password 10-usefulness key K 10 key K j key K p are through mapping or mapping again
Plain code is encrypted as password 10:0E8CBA4DA99023FF
(11) password 11-usefulness key K 11 key K j key K p are through mapping or mapping again
Plain code is encrypted as password 11:EAF6869C11A76E55 by that analogy, and the digital code anti-false identification of the 0001000th commodity is:
1. towards dealer or group user, commodity (bar) mark:
(1) plain code: 1028065040001000;
(2) password 1---and use key K 1 key K j key K p through mapping or mapping again
Plain code is encrypted as password 1:77B3EF97F4C75B48
2. satisfy the needs of consumers commodity (bag) mark:
(1) plain code: 1028065040001000;
(2) password 2---and use key K 2 key K j key K p through mapping or mapping again
Plain code is encrypted as password 2:E5C1392E5A5520EC
(3) password 3---and use key K 3 key K j key K p through mapping or mapping again
Plain code is encrypted as password 3:CBA2A1BDFE852FCF (4) password 4---use key K 4 key K j key K p through mapping or mapping again
Plain code is encrypted as password 4:4D19ECE58FBBFB1A (5) password 5---use key K 5 key K j key K p through mapping or mapping again
Plain code is encrypted as password 5:6D53056ED2EB02DC (6) password 6---use key K 6 key K j key K p through mapping or mapping again
Plain code is encrypted as password 6:1BABB226E5EC49DA (7) password 7---use key K 7 key K j key K p through mapping or mapping again
Plain code is encrypted as password 7:94EE304A42799E5C (8) password 8---use key K 8 key K j key K p through mapping or mapping again
Plain code is encrypted as password 8:1083DA52B83EC8A7 (9) password 9---use key K 9 key K j key K p through mapping or mapping again
Plain code is encrypted as password 9:1FA1AA7DC9524504 (10) password 10-usefulness key K 10 key K j key K p through mapping or mapping again
Plain code is encrypted as password 10:A145F753A59391B3 (11) password 11-usefulness key K 11 key K j key K p through mapping or mapping again
Plain code is encrypted as password 11:50491A83A8937B7E demo plant: import digital mode with phone or computer; The checking of (one) the 0000001st commodity:
1. towards condition hypothesis (1):
(1) input plain code: 1028065040000001;
(2) input password 1:DAC75295A012EB53;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
2. satisfy the needs of consumers: be somebody's turn to do arbitrary bag of (bar) commodity, as first bag,
(1) input plain code: 1028065040000001;
(2) input password 2:4BD67C2DB2CF5059;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified; The checking of (two) the 0000002nd commodity:
1. towards condition hypothesis (1):
(1) input plain code: 1028065040000002;
(2) input password 1:AB0975E2B3CB5F72;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
2. satisfy the needs of consumers: be somebody's turn to do arbitrary bag of (bar) commodity, as first bag,
(1) input plain code: 1028065040000002;
(2) input password 2:C1A753B9C74355D2;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
By that analogy,
The checking of (three) the 0001000th commodity:
1. towards condition hypothesis (1):
(1) input plain code: 1028065040001000;
(2) input password 1:77B3EF97F4C75B48;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
2. satisfy the needs of consumers: be somebody's turn to do arbitrary bag of (bar) commodity, as first bag,
(1) input plain code: 1029065040001000;
(2) input password 2:E5C1392E5A5520EC;
(3) checking result: a. verifies for the first time: true;
B. the second time or above checking: this number is verified;
What deserves to be explained is: detailed introduction and explanation have been done in front principle, design philosophy and the instantiation of logarithmic code anti-false method and digital code anti-counterfeit marker.The user can have modification in the scope that does not depart from the present invention.

Claims (7)

1. digital anti-fake method, the user will be marked in commodity with the digital N that ' M (individual plain code of 1≤M<∞) and N (the individual password of N 〉=M) ' forms, and allow consumer, group user or dealer to utilize phone or computer to come by verifying the digital Nn (1≤n of the commodity of purchasing, M≤n), reach commodity counterfeit prevention and the purpose of verifying commodity true and false, this method comprises: N can be by the number of user's description and definition, and the data structure of digital N is ' M plain code and N password '; During application the plain code among the digital N marked outward appearance visible part, and the password in the number is covered with ' irreversible ' material in commodity.
2. digital anti-fake method as claimed in claim 1, it is characterized in that the mapping of a described M plain code and N password and inverse mapping relation by the mapping control code with one dimension key array Ki (1<=i<=M) control, promptly plain code Mm with key K 1, key K 2 ... key K i is mapped to password Nn; Its inverse mapping is the inverse operation of this mapping.
3. digital anti-fake method as claimed in claim 1, it is characterized in that the mapping of a described M plain code and N password and inverse mapping relation by the mapping control code with two-dimentional key K ij (1<=i<=M, 1<=j<=M) control, promptly plain code M1 is mapped to password N1 with key K 11, plain code M2 is mapped to password N2 .. with key K 21, plain code Mi is mapped to password i with key K i1, ..., plain code Mi+1 is mapped to password i+1 with key K 12 ... plain code i+j is mapped to password i+j with key K 1j; Its inverse mapping is the inverse operation of this mapping.
4. digital anti-fake method as claimed in claim 1, it is characterized in that the mapping of a described M plain code and N password and inverse mapping relation by key K i (1≤i≤N), Kj (j=1) ..., Kp (p=1) and the control of mapping control code; Be plain code M1 key K 1Kj ..., Kp is mapped to password 1, plain code M2 key K 2Kj ..., Kp is mapped to password N2 ..., plain code Mm key K iKj ..., Kp is mapped to password Nn; Its inverse mapping is the inverse operation of this mapping.
5. digital anti-fake method as claimed in claim 1 is characterized in that also comprising:
One can be defined by the user polynary key array and mapping control code: control produces mapping or inverse mapping institute
With the order of key and the method for generation mapping;
A plain code produces software or device; The user is according to manufacturer, commodity item, production quantity, date of manufacture
Batch and data setting such as Expiration Date decide the plain code of code length, the data structure of definition plain code;
Plain code explanation software or device, the user according to these commodity batch, production quantity, date of manufacture and
Data such as Expiration Date define the matrix and the key reach of plain code in the digital database and are used for number
The sign indicating number transmission;
A key produces software or device, presses the input definition key of predetermined length;
Digital-code encryption software or device produce according to user-selected polynary key array and mapping control code
Mapping or inverse mapping among living mapping ensemblen or the inverse mapping collection are encrypted to password to plain code; When M is set
(individual plain code of 1≤M<∞) and N (N 〉=M) individual password and polynary set of cipher key Ki, Kj ...,
During Kp, plain code M by the mapping control code with polynary key array Ki, KJ ..., Kp reflects
Penetrate into password N;
Digital decryption software or device produce according to user-selected polynary key array and mapping control code
Give birth to and this digital-code encryption mapping ensemblen or corresponding inverse mapping or the mapping of inverse mapping collection, password to decipher is become
Plain code;
Digital verifying software or device, to belong to this number pairing many when the commodity counterfeit prevention number of need checking
The mapping of unit's key array and mapping control code is for very; And should number be true when being verified for the first time;
When once being verified, though should number itself be true then, the checking result be this number by
Checking.
6. digital anti-fake method as claimed in claim 5 is characterized in that more comprising:
Code conversion software or device are converted to plain code, password and key with character representation with data and represent; Or use character representation being converted to plain code, password and the key of numerical code expression; Or a plain code and a password with numerical code expression are converted to numeral and character representation.
7. digital anti-fake method as claimed in claim 5 is characterized in that more comprising:
An encryption software or a device again can be provided with the key logarithmic code and encrypt, are used for digital transmission; A decryption software or a device again carry out the inverse mapping computing according to encrypting set key again, and the number reduction to encrypting again is used for digital transmission.
CN 97107763 1997-11-06 1997-11-06 Digital anti-fake method Pending CN1178949A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 97107763 CN1178949A (en) 1997-11-06 1997-11-06 Digital anti-fake method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 97107763 CN1178949A (en) 1997-11-06 1997-11-06 Digital anti-fake method

Publications (1)

Publication Number Publication Date
CN1178949A true CN1178949A (en) 1998-04-15

Family

ID=5169852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 97107763 Pending CN1178949A (en) 1997-11-06 1997-11-06 Digital anti-fake method

Country Status (1)

Country Link
CN (1) CN1178949A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065547A (en) * 2013-01-11 2013-04-24 钱志勇 Commodity composite anti-fake code structure and generating and verifying method thereof
CN103093359A (en) * 2005-02-03 2013-05-08 尧德品牌保护公司 Method and system for deterring product counterfeiting, diversion and piracy
CN103679474A (en) * 2013-11-19 2014-03-26 汪风珍 Anti-counterfeiting method for commodities

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103093359A (en) * 2005-02-03 2013-05-08 尧德品牌保护公司 Method and system for deterring product counterfeiting, diversion and piracy
CN103093359B (en) * 2005-02-03 2017-04-12 天宝导航有限公司 Method and system for deterring product counterfeiting, diversion and piracy
CN103065547A (en) * 2013-01-11 2013-04-24 钱志勇 Commodity composite anti-fake code structure and generating and verifying method thereof
CN103679474A (en) * 2013-11-19 2014-03-26 汪风珍 Anti-counterfeiting method for commodities

Similar Documents

Publication Publication Date Title
CN1172244C (en) Copyright protection system, recording apparatus and decryption apparatus
CN1263331A (en) Product protecting system for processing digital product contents
CN1130627C (en) Information processing apparatus and method and recording medium
CN1684050A (en) Semiconductor device and electronic apparatus
CN1254726C (en) Information processing device and information processing method
CN1503503A (en) Method and device for data encipher/deciphering
CN1175614C (en) Digital AV data transmitting unit, receiving unit, transmitting/receiving unit and medium
CN1266875C (en) Content issuing/receiving method
CN1707999A (en) Distributed management of a certificate revocation list
CN1610917A (en) License management device, license management method, and computer program
CN1383644A (en) Information processing system and its method, information recording medium and ,program providing medium
CN1878057A (en) Composition of encrypted two dimensional bar codes and application method therefor
CN1758178A (en) Illegal analysis / falsification preventing system
CN1302406A (en) Method and system for secure transactions in computer system
CN1802813A (en) User terminal for receiving license
CN1539126A (en) Apparatus and method for encrypting/decrypting information on basic element-by-basic element basis and encryption/decryption system using the same
CN1692651A (en) MPEG-21 digital content protection system
CN1533646A (en) Apparatus and method for processing information apparatus and method for providing information, apparatus and method for managing usage right, recording medium and program
CN1275846A (en) Device and method for data encipher
CN1897517A (en) Encrypt and decrypt circuit
CN1921384A (en) Public key infrastructure system, local safety apparatus and operation method
CN1307417A (en) Transmission of content information, recording method, device and medium, and deciphering method and device
CN1808490A (en) Business operating method and system for digital seals
CN1956373A (en) Information processing apparatus and method, setting apparatus and method, and program
CN1280336A (en) Information processing equipment and method and issuing media

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication