Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Magic square digital antifor method and its antiforge system

A magic square and digital technology, applied in the field of magic square digital anti-counterfeiting methods and anti-counterfeiting systems, can solve the problems of difficult to realize two-way verification of digital anti-counterfeiting query, low encryption and decryption efficiency, and attacks.

Inactive Publication Date: 2005-03-23
谢道裕
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 4) The encryption algorithm is vulnerable to "collision" or "birthday" attacks;
[0007] 5) The query rate is low
[0009] 1) Symmetric encryption algorithms such as DES, AES, IDEA, FEAL, etc., are not suitable for digital anti-counterfeiting technology due to the symmetry of the encryption and decryption process and the concentration of security risks; If the anti-counterfeiting code is too long, it is not suitable for digital anti-counterfeiting, and if the packet length is too short, such as DES (56 bits in binary or 17 bits in decimal), it is vulnerable to enumeration attacks;
[0010] 2) The public key cryptosystem generally adopts the modulus exponent operation of large integers, so it has several major disadvantages: the key pair generation efficiency is low, the encryption and decryption efficiency is low, the modulus is too long, and the length of the encryption result is uncertain
The query frequency of the digital anti-counterfeiting center is very high, and the low-efficiency public key cryptosystem will become the bottleneck in the digital anti-counterfeiting system; the use of a shorter modulus is not safe and easy to be broken; the low efficiency of key generation is not suitable for the commodity Pipeline operation, if a unified key pair is used to encrypt all anti-counterfeiting codes, because the security risk is concentrated on one key pair, it is vulnerable to attacks by cryptanalysts;
[0011] 3) One-way hash functions such as SHA, MD4, MD5, N-HASH, etc. are vulnerable to "collision" attacks, and the length of the anti-counterfeiting code is much lower than the length of the hash value. Can the one-way hash function be truly "one-way" an important questionable question;
[0012] 4) The digital anti-counterfeiting system is a super-asymmetric computing system, and it is not easy to realize the two-way verification in the digital anti-counterfeiting query, which is a common shortcoming of conventional cryptographic technology
Unless a different key is set up for the encryption of each product's anti-counterfeiting code, and the relevant key of each product's anti-counterfeiting code is stored in the anti-counterfeiting database, that is, the authenticity of the product is queried through identity authentication, otherwise, the security of digital anti-counterfeiting not sure
[0016] In addition, it is not easy to realize the two-way verification in the digital anti-counterfeiting query, which is a common shortcoming of the conventional cryptographic technology.
Cryptography is based on the computer's precise calculation of large integers to ensure security, but the digital anti-counterfeiting system is an asymmetrical computing system. The anti-counterfeiting center can perform precise and complex calculations, but people can only perform simple four arithmetic operations. Calculation and verification equipment cannot achieve high precision due to cost issues. Therefore, it is not easy to realize the two-way verification function in digital anti-counterfeiting by using conventional encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Magic square digital antifor method and its antiforge system
  • Magic square digital antifor method and its antiforge system
  • Magic square digital antifor method and its antiforge system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0056] Referring to Fig. 2, it is another embodiment of the magic square digital anti-counterfeiting method, and its steps are as follows:

[0057] 1. Generate a commodity number N: 2541258024 according to the commodity elements (production period, batch, inspection level, raw materials, manufacturer code, commodity code, etc.), that is, give the commodity a unique name, and this number can also be serially numbered in sequence , and its length can be selected according to actual needs.

[0058] 2. Randomly construct a seventh-order magic square M for this numbered product, as shown in Figure 3. Then randomly generate a corresponding seven-order shuffled square matrix S for the magic square M, as shown in Figure 4. Shuffle the square matrix S to decompose the magic square M into defect magic square M 1 Complementary Defect Magic Square M 2 , see Figure 5 and Figure 6. Then convert the shuffling matrix S into a shuffling vector A: (1, 0, 1, 0, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a magic square number fake prevention method and system. Its steps are as follows: generate an exclusive number for each commodity; generate a magic square over seven ranks for each commodity at random, the magic square is divided into two complement lacuna magic squaresú¿M1,M2ú® by passing random riffle matrix whose element is 0 or 1 and true or false check vector V2 is orderly composed by numbers in lacuna magic squares M1 and M2 and memorized into fake prevent data center; Riffle matrix is converted into tens digits as fake prevent code of the commodity; label containing commodity number and fake prevent code is made for commodity and covers the fake prevent code; through query code inputting equipment, user inputs commodity and fake prevent code into true or false check equipment to recover magic square, if it can be recovered and it is the first query, the commodity is true, or it is false. Characters of the invention are that its coding arithmetic can be disclosed, security is high and it is easy to implement.

Description

technical field [0001] The invention relates to a digital anti-counterfeiting method, in particular to a magic square digital anti-counterfeiting method and an anti-counterfeiting system thereof. Background technique [0002] There are many kinds of anti-counterfeiting methods for existing commodities, such as common laser anti-counterfeiting, DNA reagent anti-counterfeiting, magnetic ink anti-counterfeiting, temperature-changing anti-counterfeiting, bar codes, and recently more popular digital anti-counterfeiting technologies. With the rapid development of science and technology, physical anti-counterfeiting technologies such as laser anti-counterfeiting and barcodes are very easy to be copied, and ordinary consumers generally cannot recognize the authenticity of laser anti-counterfeiting and other signs. Therefore, traditional anti-counterfeiting technologies have serious defects and it is difficult to achieve anti-counterfeiting. Purpose. Digital anti-counterfeiting tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00
Inventor 谢道裕
Owner 谢道裕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products