Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism

An information association and graphic code technology, applied in the field of electronic information, can solve problems such as threats to the credit system and integrity and security, inconvenience in implementation and verification, and large dependence on the timeliness of multi-party collaborative work. The effect of choosing a device provider

Inactive Publication Date: 2005-01-26
中国科学院成都计算机应用研究所
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the means of registration number query or online database retrieval, the main problems are: the cost of establishing and maintaining a huge network database system is high, the verification efficiency is low, the dependence on infrastructure and regional environment is large, and the timeliness of multi-party collaborative work is large , It is inconvenient to implement verification in a mobile environment (such as on an airplane), and the security of database technology a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
  • Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
  • Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0117] In this anti-counterfeiting system, the technical equipment and method standards for certification and verification are disclosed (for engineering implementation and popularization and application), and the equipment used can also be publicly purchased from merchants (helping to reduce costs and improve cost performance). The owner authorizes the certificate maker to secretly use the encryption key set, so the encryption key is also called the certificate production key. At the same time, the owner authorizes the verifier to use the decryption key set, so the decryption key is also called the verification key. In principle, neither the certificate maker nor the verifier can master the two keys of certificate making and verification at the same time, so as to prevent the technical approach of "self-stealing". There are two implementations for granting a verifier a decryption key: Main scheme: The owner sends the decryption key K of the digital subchapter v1 , the decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention is a kind of soft certification false proof method that based on graphic code primary and secondary seal family information association mechanism. The primary and secondary seal family of the certification embeds the knowledge-type privacy character information of certification holder. There is some logic constrained relation between the primary and secondary seal information, and can stop the counterfeit and fraud. The non-simulation capability of this certification is decided by the logic result of key and knowledge character information of certification holder, and doesn't relate to the technique and equipment. So the technical regulation can be an open system. This invention also replaces the high-cost physical equipment process complexity method with the low-cost logic calculus complexity method. And replaces the human sense identifying and other technical method with the electronic information processing method.

Description

technical field [0001] The invention relates to certificate anti-counterfeiting technology, in particular to a method for protecting the content information of soft certificates with legal holders and the anti-counterfeiting method of the holder's characteristic information and its realization technology, which belongs to the field of electronic information technology (computer technology). Background technique [0002] 1. Significance and characteristics of soft document anti-counterfeiting: [0003] Documents (certificates) refer to all printed texts that carry information that are protected by law and have the effect of proof. Modern society is inseparable from certificate information, and certificates are divided into two types: soft and hard. The use of soft certificates is more widely at present, such as: passports, driver's licenses, property rights certificates, certificates of merit, honorary certificates, qualification certificates, practice certificates, access p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00H04L9/32
Inventor 王晓京万武南宋春雨刘旸吴玲玲孙宣东曹晟粟伟张景中杨路
Owner 中国科学院成都计算机应用研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products