Dopant material public key cryptography method for anti-counterfeit at randomTechnical field
The method for anti-counterfeit that the present invention relates to identify belongs to information security technology, is specifically related to a kind of public key cryptography of dopant material at random method for anti-counterfeit, belongs to the International Classification of Patents H04L9/14 technical field of " using special key or algorithm ".
Background technology
General in the world public-key cryptosystem respectively has the characteristics of oneself, and advantage is separately arranged in different application scenarios.In anti-counterfeiting mark, general anti-counterfeiting mark is that in fact result can copy to the processed of identification image or numeral, and antifalse effect is not good.
Summary of the invention
Purpose of the present invention is to overcome deficiency of the prior art, and provide a kind of will be at random dopant material and public key algorithm combines, be the dopant material public key cryptography method for anti-counterfeit of a kind of method for anti-counterfeit that in fact can't duplicate-at random.
Technical scheme of the present invention is as follows.
A kind of public key cryptography of dopant material at random method for anti-counterfeit is a kind of method for anti-counterfeit that is used to identify, and comprises marking materials and password in generation, making and the identification marking, and it is characterized in that: its concrete generation, manufacturing process comprise:
The 3 D antiforge of a, the inner embedding of making random distribution second phase is dopant material at random;
B, produce numeral by dopant material at random;
C, digital encryption is obtained password with public key encryption algorithm;
Its identifying is:
A, produce numeral once more by the preceding dopant material of having produced at random, with produce the preceding first time digital identical;
B, obtain numeral with public-key cryptography decipherment algorithm clear crytpographic key;
D, the numeral and the clear crytpographic key that relatively produce once more by dopant material at random obtain numeral, and two digitally represent that sign is real when identical;
The open decruption key that the public-key cryptography decipherment algorithm is used is represented with numeral or bar code form, and the mode of downloading, buy books and periodicals or computer software by computer network transmits.
The manufacturing process of its used dopant material at random of described anti-counterfeiting mark is to constitute the anti-counterfeiting mark material at the inner opaque material that embeds the second phase random distribution of the transparent body, and the mode of the opaque materials material that is embedded in by its body of illumination produces dot pattern.
Described public key encryption method, it is the encryption key of representing with digital form that utilizes the producer, with the corresponding numeral that obtains after the digitized processing that is produced dot pattern by the marking materials that mixes at random, the processing by public key encryption algorithm produces the password of representing with numeral or bar code form.
Described public-key cryptography decipherment algorithm and comparatively validate method, the verifier utilizes the disclosed decruption key of representing with numeral or bar code form, by the public-key cryptography decipherment algorithm, relatively verify unique mark by the figure that illumination produces through the numeral after the digitized processing once more to the numeral that obtains behind the password to decipher of representing with numeral or bar code form with by the marking materials that mixes at random.
Described false proof key load mode is the deciphering key of representing with numeral or bar code form that the mode of utilizing computer network to download, buy books and periodicals or computer software transmits dopant material public key cryptography anti-counterfeiting mark at random.
Above-mentioned " second phase " is the term of material specialty, and the meaning is to include a kind of materials with different properties in addition in a kind of material.
Above-mentioned " public-key cryptography (abbreviation PKI) adds (separating) close algorithm " is the term of password specialty, with it be: during encryption, set of number (is made as a) and encryption key (representing with digital form) mixing generation password (representing with digital form) to digital encryption and decryption process.During deciphering, use decruption key (representing) and password to mix the reduction numeral and (be made as a) with digital form.Be characterized in: encryption key and decruption key are inequality.
According to the manufacturing process of the random distribution second phase anti-counterfeiting mark material as can be known, the random distribution second phase anti-counterfeiting mark material is actually not reproducible.Therefore, the anti-counterfeiting mark material has uniqueness characteristic.According to the principle of public key algorithm as can be known the private cipher key numeral selected at random of producer be actual can't the decoding and forge.The combination of marking materials uniqueness and producer's private cipher key numeric security will produce the exclusive anti-counterfeiting mark of not reproducible producer.
Embodiment
The present invention is achieved in that
One, the producer gets in the second phase opaque materials material random dispersion to the 3 dimension transparent body, makes the inner 3 dimension anti-counterfeiting mark materials that embed random distribution second phase.
Two, the producer produces a kind of dot matrix pattern by 3 modes of tieing up random distribution opaque materials materials that embed in the illumination transparent body, and pattern is obtained by the means of IMAQ, utilizes the image digitazation treatment technology to produce the checking of one group of correspondence with digital.
Three, the producer will verify with numeral and be input in the computer.Import the private cipher key (representing long more difficult more being decrypted of numeral with digital form) that the producer selects at random again, produce password (representing) with numeral or bar code form by public key encryption algorithm.
Four, the producer is printed as password numeral or bar code at last and pastes side by side or be embedded into random distribution second anti-counterfeiting mark material mutually and form anti-counterfeiting mark on the article.
Five, the identifier, is input to the numeral of verifying usefulness in the computer by the illumination of dopant material at random, IMAQ and the digitized processing of having produced produced identical checking with numeral with the same method of producer.
Six, the identifier is input to password in the computer, imports the producer again to the disclosed decruption key of society (representing that with numeral or bar code form the long more fail safe of numeral is good more), produces in computer by the public-key cryptography decipherment algorithm and differentiates with numeral.
Seven, the automatic contrast verification of computer is with numeral and discriminating numeral, if both are identical, computer shows that anti-counterfeiting mark is true, if both difference demonstration anti-counterfeiting marks are false.
This method has been compared following advantage with existing method:
One, this method is a kind of method for anti-counterfeit that in fact can't duplicate that is used to identify.
Two, the manufacture method of the anti-counterfeiting mark material in this method is open; The encrypting and decrypting algorithm
Open; Anti-counterfeiting mark IMAQ and digitalized processing method are open; Password (representing with numeral or bar code form) after decruption key and the encryption is open, has only encryption key (representing with digital form) by producer's picked at random and secret.
Three, the encrypting and decrypting processing procedure in this method can be used cryptographic processing technology such as the generation automatically of existing key, encryption key distribution, key call automatically.