Method for generating and verifying credible label based on asymmetrical encryption algorithm and system

An asymmetric encryption and verification method technology, applied in the direction of user identity/authority verification, etc., can solve problems such as poor security, poor versatility, and high cost

Active Publication Date: 2015-11-04
浙江码博士防伪科技有限公司
View PDF3 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0032] The purpose of the present invention is to provide a method and system for generating and verifying trusted labels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
  • Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
  • Method for generating and verifying credible label based on asymmetrical encryption algorithm and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0200] according to figure 1 , the specific embodiment of the present invention (one) is as follows:

[0201] Step 1: The certification center CA generates a digital certificate for the QR code service provider;

[0202] Step 2: The QR code service provider generates a digital signature through the digital signature module, and the timestamp server generates a timestamp for the QR code;

[0203] Step 3: The two-dimensional code generation module generates a two-dimensional code according to the original information of the two-dimensional code, digital certificate information, time stamp and digital signature, and appropriate generation parameters;

[0204] Step 4: When using or verifying the two-dimensional code, use the two-dimensional code reading module to correctly read the two-dimensional code, extract the information in it, and output it to the time stamp verification module, digital certificate verification module and digital signature verification module;

[0205] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for generating and verifying a credible label based on an asymmetrical encryption algorithm. The credible label is generated according to credible label original information, a label identifier, a commodity identifier, the public key information of the asymmetrical encryption algorithm, digital certificate information, digital signature information and credible time stamp or credible identity time stamp information. When the credible label needs to be used or verified, the credible label generation time and the validity and integrity of content are ensured by verification of the credible time stamp or credible identity time stamp information in the credible label; the identity of a credible label owner is authenticated by verification of the validity of a digital certificate in the credible label or the legality of a public key; the integrity of credible label content is determined by verification of the digital signature in the credible label; and an anti-counterfeiting function of a commodity is implemented by verification of the uniqueness of the label identifier and the uniqueness of the commodity identifier.

Description

technical field [0001] The invention relates to the fields of cryptography, computer network security and product anti-counterfeiting. Specifically, the invention provides a generation and verification method and system of a trusted label based on an asymmetric encryption algorithm. Background technique [0002] Asymmetric encryption algorithm is a secret key method. An asymmetric encryption algorithm requires two keys: a public key and a private key. The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used to decrypt it; if the data is encrypted with the private key, only the corresponding public key can be used to decrypt the data. decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm. [0003] Identity-Based Cryptograph (IBC for short) is an asymmetric public-key cryptosystem. The concept of identification password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 祝国龙许田
Owner 浙江码博士防伪科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products