Generation method of commodity anti-counterfeiting code

A product anti-counterfeiting code and product technology, which is applied in commerce, equipment, data processing applications, etc., can solve problems such as complex calculations, low security, and limited codes of product identity information, and achieve strong security, difficult to crack, and generation methods Simple and Actionable Effects

Inactive Publication Date: 2015-05-27
NANTONG UNIVERSITY
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing digital anti-counterfeiting technology basically uses a pseudo-random sequence or an ordered serial number to generate a commodity anti-counterfeiting code after DES symmetric encryption, which has certain differences with the performance requirements of the commodity anti-counterfeiting code "unforgeability and uniqueness" in digital anti-counterfeiting technology. gap; chaotic signals have the characteristics of initial value sensitivity, pseudo-randomness and non-periodicity. There are also problems such as limited commodity identity information coding, complex calculations, relatively low security and difficulty in resisting attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of commodity anti-counterfeiting code
  • Generation method of commodity anti-counterfeiting code
  • Generation method of commodity anti-counterfeiting code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] According to the method for generating the product anti-counterfeiting code above, the steps are as follows:

[0048] (1) When the identification code of a product is "A123E1212342014-12-26d1987654", the length L=30;

[0049] (2) According to the correspondence between the custom product identification code characters and the numerical data in Table 1, the numerical sequence P1 is obtained as {10, 1, 2, 3, 14, 1, 2, 1, 2, 3, 4, 2, 0, 1, 4, 63, 1, 2, 63, 2, 6, 62, 39, 1, 9, 8, 7, 6, 5, 4};

[0050] (3) Take the external key (Z 10 = 0.12345, Z 20 = 0.56789, Z 30 =-0.98765), using the commodity identity information (that is, the commodity identification code generated by encoding or the numerical sequence P1) and the external key, the initial value X of the chaotic system is calculated according to the formula in step (3) of the above-mentioned commodity anti-counterfeiting code generation method 0 , parameter P, initial iteration steps n 1 ,n 2 And the number of ite...

Embodiment 2

[0067] According to the method for generating an anti-counterfeit code for a commodity above, the steps for generating an identification code for a certain commodity and its anti-counterfeit code are similar to those in Embodiment 1, except for a slight change in an external key: Z 10 = 0.123450000000001; or Z 20 = 0.567890000000001; or Z 30 =-0.987650000000001, the generation result of the commodity anti-counterfeiting code is shown in Table 4. It can be seen from the table below that once the external key changes even slightly, that is, "missing a tiny bit", the generated product anti-counterfeiting number will be "a thousand miles away". It can be seen that a method for generating a product anti-counterfeiting code proposed in this patent has the key sensitivity.

[0068] Table 4 When the external key changes slightly, the product anti-counterfeiting code generation results

[0069]

Embodiment 3

[0071] According to the method for generating the anti-counterfeit code of the above-mentioned commodity, the steps of generating the external key and the anti-counterfeit code thereof are similar to those in Embodiment 1, and the slightly changed commodity identification codes (such as "A123E1212342014-12-26d1987653", "a123E1212342014-12-26d1987654" and "A123E1212342004" -12-26d1987654") generated anti-counterfeit code results are shown in Table 5. It can be seen from the following table: slight changes in the commodity identification code will cause a great change in the ciphertext string (i.e. the anti-counterfeit number of the commodity), thus it can be seen that a method for generating the anti-counterfeit code of the commodity proposed in this patent has no effect on the identity information of the commodity (that is, the anti-counterfeit code of the commodity). ID) is sensitive.

[0072] Table 5 When the commodity identification code changes slightly, the generation res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generation method of a commodity anti-counterfeiting code. The generation method comprises the following steps: coding commodity identity information according to a certain preset rule to generate a unique commodity identification code; converting the commodity identification code into numeric data according to corresponding relation between a user-defined commodity identification code character and numeric data; respectively calculating by virtue of the commodity identity information and an external secret key to obtain an initial value, a parameter, a primary iteration step number and an iteration interval step number of a chaotic system, and carrying out iteration on an inclined chaos tent map to generate two groups of chaos sequences; respectively scrambling ciphertext characters in the corresponding relation among numeric data, user-defined numeric data and the ciphertext characters by virtue of a location changing scrambling rule before or after the sequencing of two groups of the chaos sequences to generate commodity anti-counterfeiting numbers, and combining to generate the commodity anti-counterfeiting code. The generation method of the commodity anti-counterfeiting code is simple and feasible, has very high security and does not easily hacked, and the generated commodity anti-counterfeiting code has uniqueness and unforgeability.

Description

technical field [0001] The invention relates to the technical field of digital anti-counterfeiting, in particular to a method for generating a commodity anti-counterfeiting code. Background technique [0002] In today's society, counterfeit goods are prevalent, counterfeiting has become a flooding trend, and food and drug safety accidents occur frequently. How to realize anti-counterfeiting of commodities, eliminate counterfeiting, recover the economic losses of the country and enterprises, and protect the rights and interests of consumers is a global issue that urgently needs to be studied and solved. The problem. The existing digital anti-counterfeiting technology basically uses a pseudo-random sequence or an ordered serial number to generate a commodity anti-counterfeiting code after DES symmetric encryption, which has certain differences with the performance requirements of the commodity anti-counterfeiting code "unforgeability and uniqueness" in digital anti-counterfeit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
Inventor 盛苏英堵俊吴新华陆国平张振娟华亮吴晓刘明周俊
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products