Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
The decryption and verification of encrypted information a simple and efficient method is always difficult and challenging in the field of information security. Herein, a series of water-sensitive fluorescent microgels are fabricated for highly secured anti-counterfeiting with authenticity identification. The initial negatively charged microgels (MG) are made up of -isopropylacrylamide (NIPAM), acrylic acid (AAc) and anthracen-9-yl acrylate (9-ANA, blue fluorescent monomer). The prepared MGs can bind cationic fluorescent dyes such as 5-aminofluorescein (FITC, green fluorescent dye) and rhodamine B (Rh B, red fluorescent dye) electrostatic interaction, emitting multi-fluorescent colors based on the fluorescence resonance energy transfer (FRET) process. Furthermore, the fluorescence colors of MG-derived systems can be rapidly changed by swelling in water, which can block the FRET process and change the aggregation state of dyes. With the assistance of inkjet printing, multi-color security patterns can be designed and encoded, which can be revealed by UV irradiation and further verified by water stimulation. This study has pioneered a novel strategy to verify the authenticity of decrypted information, which greatly improves the security level of information.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1039/d4mh00210e | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!