Unlock instant, AI-driven research and patent intelligence for your innovation.
A two-dimensional code anti-counterfeiting method for multiple information encryption
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of information encryption and two-dimensional code, which is applied in the field of QR two-dimensional code anti-counterfeiting, can solve the problems of harming the interests of consumers and genuine product manufacturers, being easy to be copied and imitated, and not easy for consumers or merchants.
Active Publication Date: 2016-07-06
OCEANIA PRINTING SHENZHEN CO LTD
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The purpose of the present invention is to address the deficiencies of the prior art and provide a two-dimensional code anti-counterfeiting method with multiple information encryption, aiming at solving the problem that the QR two-dimensional code is easy to be copied and copied when used as a label in the process of commodity circulation, and the It is not easy for consumers or merchants to identify its authenticity with eyes, which will damage the interests of consumers and manufacturers of authentic products.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0073] Step 1. Generation of QR code and encryption of original information:
[0074] 1.1 Use the two-dimensional code generation system to generate a QR code 111 for "HangzhouDianziUniversity" (the generated QR code is a square image, and the image mode is an RGB image), and the image size is 200×200dpi;
[0075] 1.2 Use "201309111403" as the serial number to be encrypted, use the encryption program made by the programming software according to the specific algorithm encryption rules to encrypt the serial number, and obtain the encrypted serial number "#wVOKMPE";
[0076] 1.3 Take a screenshot of the encrypted serial number generated in 1.2, obtain a picture 112 containing the wording of the encrypted serial number, and save the picture as an image to be encrypted;
[0077] Step 2. Preprocessing of images to be encrypted:
[0078] 2.1 The image 112 containing the encrypted serial number is subjected to image scaling transformation to obtain an image of the same size as the Q...
Embodiment 2
[0100] Step 1. Generation of QR code and encryption of original information:
[0101] 1.1 Use the two-dimensional code generation system to generate a QR two-dimensional code 211 for "School of Mechanical Engineering" with an image size of 128×128dpi;
[0102] 1.2 Use "00370904114522031" as the encrypted serial number, use the encryption program made by programming software according to specific algorithm encryption rules to encrypt the serial number, and obtain the encrypted serial number "*vAD719142O53U32";
[0103] 1.3 Take a screenshot of the encrypted serial number generated in 1.2, obtain a picture 212 containing the words of the encrypted serial number, and save the picture as an image to be encrypted;
[0104] Step 2. Preprocessing of images to be encrypted:
[0105] 2.1 The image 212 containing the encrypted serial number is subjected to image scaling transformation to obtain an image of the same size as the QR two-dimensional code 211;
[0106] 2.2 Perform image gr...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a two-dimensional code anti-counterfeiting method for multiple information encryption, which is to obtain an image containing the encrypted serial number by encrypting the digital serial number through an algorithm to generate an encrypted serial number, and then take a screenshot of the image containing the encrypted serial number. Size adjustment, image grayscale and image scrambling process to obtain the secret image, and then use the two-dimensional code as the carrier, use the bit operation method to embed the secret image into the carrier two-dimensional code image, and finally obtain the mixed two-dimensional code for printing ; When verifying information, extract the secret image in the two-dimensional code and perform anti-scrambling processing to obtain the encrypted serial number, and then use the decryption algorithm to obtain the decrypted serial number. By comparing with the original serial number, the authenticity of the information can be identified. fake. The method combines simple information algorithm encryption, image transformation and image hiding methods to realize two-dimensional code anti-counterfeiting, the method is easy to implement, does not affect the information capacity of the two-dimensional code, and has good anti-counterfeiting performance.
Description
technical field [0001] The invention relates to a two-dimensional code anti-counterfeiting method for multiple information encryption, in particular to a QR two-dimensional code anti-counterfeiting method. Background technique [0002] QR two-dimensional code has been widely used as a carrier of information dissemination in today's society. While QR two-dimensional code is for people to carry out information dissemination and product promotion, due to the limitations of its own anti-counterfeiting performance, especially with the development of computer and printing reproduction technology, information reproduction has become more and more simple and convenient. . For some information with high commercial value, counterfeiting or even flooding occurs. Especially in the process of product circulation, unscrupulous manufacturers forge the packaging of genuine products, shoddy the real ones, and shoddy them, which not only damages the interests of genuine manufacturers and hi...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.