Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)

A verification method and two-dimensional code technology, which is applied to record carriers used by machines, instruments, and businesses, can solve the problems of verifying the authenticity and integrity of anti-counterfeiting two-dimensional code information, achieve verification means and generalization, and reduce difficulty , the effect of ensuring authenticity

Inactive Publication Date: 2015-03-11
全联斯泰克科技有限公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem that the authenticity and integrity of the anti-counterfeiting two-dimensional code information cannot be easily verified in the related art, the present invention proposes a method and device for generating and verifying the two-dimensional code of CPK, which can effectively verify the two-dimensional code Authenticity, realizing the effect of simplifying the verification process of anti-counterfeiting information and reducing the difficulty of verifying anti-counterfeiting information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)
  • Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)
  • Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0052] According to an embodiment of the present invention, a method for generating a two-dimensional code based on a combined public key CPK is provided.

[0053] Such as figure 1 As shown, the method for generating a two-dimensional code according to an embodiment of the present invention includes:

[0054] Step S101, determining the key information of the carrier of the two-dimensional code;

[0055] Step S103, signing the key information according to the pre-configured private key to ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimension code generation method, a two-dimension code generation device, a two-dimension code verification method and a two-dimension code verification device based on a CPK (Combined Public Key). The generation method comprises the following steps that: key information of carriers of two-dimension codes is determined; the key information is signed according to a pre-configured private key, and digital signature information is generated; the digital signature information and the information of the carriers of the two-dimension codes are combined to generate anti-counterfeiting information; and the anti-counterfeiting information is coded according to a two-dimension code coding technology, and two-dimension codes are generated. The verification method comprises the following steps that: the two-dimension codes are decoded, and the digital signature information and the information of the carriers of the two-dimension codes stored in the three-dimension codes are read; the read digital signature information is analyzed to obtain a public key; and the digital signature information is verified according to the public key and the information of the carriers of the two-dimension codes. The authenticity and the completeness of the two-dimension codes are judged through a CPK signature verification protocol, so that the authenticity verification on the anti-counterfeiting information is realized; the verification process of the anti-counterfeiting information is simplified; and the difficulty for verifying the anti-counterfeiting information is reduced.

Description

technical field [0001] The present invention relates to the generation and verification technology of two-dimensional codes, in particular, to a method and device for generating and verifying two-dimensional codes based on CPK (Combined Public Key, combined public key). Background technique [0002] Although the existing anti-counterfeiting technologies are widely used in various fields of production and life, they all have the problems of high implementation cost, high technical difficulty, and easy cloning, especially for bills, securities, certificates, certificates, and diplomas that are closely related to daily life. As well as the anti-counterfeiting technology of some valuable commodities, in the existing anti-counterfeiting technology, although the constantly updated methods of laser anti-counterfeiting, watermarking, special paper ink, metal wire, fluorescent printing, particle accelerator coding, laser coding and other methods are used, due to Driven by huge intere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06Q30/00
Inventor 孙海龙赵阳郭守祥
Owner 全联斯泰克科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products