Commodity anti-counterfeiting code generation method based on Chinese character encryption

A technology of commodity anti-counterfeiting codes and Chinese characters, applied in the field of digital anti-counterfeiting, can solve the problems of high cost and low operability

Active Publication Date: 2020-12-29
NANTONG UNIVERSITY
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such as chip technology, biotechnology, etc., but due to its high cost and ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commodity anti-counterfeiting code generation method based on Chinese character encryption
  • Commodity anti-counterfeiting code generation method based on Chinese character encryption
  • Commodity anti-counterfeiting code generation method based on Chinese character encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] According to the above-mentioned method for generating an anti-counterfeit code based on Chinese character encryption, the steps are as follows:

[0085](1) First, the Chinese character product identification code A = "江苏省##集团××subsidiary@@commodity production date 2020-02-01 production line 12 serial number 123456", which represents the unique identity information of a product, is converted into Chinese characters one by one 为数值型数据,得到高位数值序列P1={189,203,202,163,163,188,205,161,161,215,185,203,161,163,163,201,198,161,201,178,200,198,163,163,163,163,163,163,163,163,163,163,161,201,178,207,163,163,208,193,186,163,163,163,163,163,163}和低位数值序列P2={173,213,161,163,163,175,197,193,193,211,171,190,161,192,192,204,183,161,250,250,213,218,178,176,178,176,173,176,178,173,176,177,161,250,250,223,177,178,242,208,197,177,178,179,180,181,182}。

[0086] Then, the element P in the high-digit value sequence P1 is sequentially i1 Convert one by one into 8bits binary sequence {PB1 i1 ,PB1 i2...

Embodiment 2

[0111] According to the above-mentioned product anti-counterfeiting code generation method based on Chinese character encryption, the product identification code character string A of a certain product and its product anti-counterfeiting code generation steps are similar to the specific embodiment 1, only a slight change occurs in a certain external key: α= 0.12345000000001; or β=3.749999999999999, the generation result of the commodity anti-counterfeiting code is shown in Table 1. It can be seen from the table below that once the external key changes slightly, the generated product anti-counterfeiting number and product anti-counterfeiting code will change greatly. It can be seen that a method for generating a product anti-counterfeiting code based on Chinese character encryption proposed in this patent has the advantages of encryption. key sensitivity.

[0112] Table 1 When the external key changes slightly, the product anti-counterfeiting code generation results

[0113] ...

Embodiment 3

[0116] According to the above-mentioned method for generating an anti-counterfeit code based on Chinese character encryption, the steps for generating the external key and its anti-counterfeit code are similar to those in Embodiment 1, only the string A of the product identification code of a certain product undergoes a slight change: "Jiangsu Province ##Group ××subsidiary@@commodity production date 2020-02-01 production line 12 serial number 123456"; or "Jiangsu Province##Group ××subsidiary@@commodity production date 2020-12-01 production line 12 serial number 123456 "; or "Jiangsu Province ##Group ×× Subsidiary @@ Commodity Production Date 2020-02-01 Production Line 12 Serial Number 123459", the product anti-counterfeiting code generation results are shown in Table 2. It can be seen from the following table: once the product identification code character string representing the unique identity information of a certain product changes slightly, the generated product anti-count...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a commodity anti-counterfeiting code generation method based on Chinese character encryption. The method comprises the following steps: carrying out the numerical type data and8bits binary conversion and binary extraction of a Chinese character commodity recognition code A representing the unique identity information of a certain commodity, and obtaining binary sequences PB1 and PB2; carrying out chaos iteration to obtain a chaos sequence Y, carrying out scrambling on the binary sequences PB1 and PB2 according to the position change rule before and after descending sorting of the front and rear sequences in the sequence Y to obtain scrambled binary sequences, grouping elements in the binary sequences with three elements in the forward direction and five elements inthe forward direction respectively, and grouping the scrambled binary sequences with five elements in the reverse direction; and sequentially recombining the grouping sequences to generate a commodity anti-counterfeiting number, and combining to generate a commodity anti-counterfeiting code. The commodity anti-counterfeiting code generation method based on Chinese character encryption provided bythe invention is simple and feasible, has strong security and is not easy to crack, and the generated commodity anti-counterfeiting code has uniqueness and unforgeability.

Description

technical field [0001] The invention relates to the technical field of digital anti-counterfeiting, in particular to a method for generating a commodity anti-counterfeiting code based on Chinese character encryption. Background technique [0002] Counterfeit and shoddy products are common, and we need to take practical actions to protect the rights and interests of manufacturers and consumers. Counterfeit products pose a serious threat to various industries, especially pharmaceuticals, agricultural products, auto parts, computer software, and luxury goods such as expensive perfumes, cosmetics, jewelry, watches, and designer clothing. The International Chamber of Commerce in Geneva estimates that global sales of counterfeit products amount to $650 billion a year. Counterfeit medicines and alcoholic products are particularly problematic. This is not just counterfeiting. The actions of counterfeiters seriously endanger the rights and interests of consumers: counterfeiting of m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/06G06Q30/00H04L9/00
CPCG06K19/06009G06K19/06046G06Q30/0185H04L9/001
Inventor 盛苏英张振娟陆国平吴新华张小美高岩波周磊任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products