CN105321082A - Two-segment code information anti-counterfeit verification technology - Google Patents
Two-segment code information anti-counterfeit verification technology Download PDFInfo
- Publication number
- CN105321082A CN105321082A CN201510323498.XA CN201510323498A CN105321082A CN 105321082 A CN105321082 A CN 105321082A CN 201510323498 A CN201510323498 A CN 201510323498A CN 105321082 A CN105321082 A CN 105321082A
- Authority
- CN
- China
- Prior art keywords
- code
- information
- enterprise
- coding
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The technical field of two-segment code information anti-counterfeit verification technologies: a phone scanning technology and an internet platform and database technology are used for performing verification on an information code of an enterprise product. Background technology: as one-dimensional codes, two-dimensional codes and various kinds of information codes have the characteristics of being easy to copy, easy to spread, etc., the technology that a user verifies product authenticity via the information code of the enterprise product cannot achieve a good effect. A same verification code can be verified for countless times. A counterfeiter even uses an enterprise information code to produce a large number of counterfeit products and sells the counterfeit products to make consumers mistakenly consider the counterfeit products as genuine products. The main purpose of the present invention is to allow users to participate in dynamic verification of an enterprise verification code to ensure that the enterprise verification code has uniqueness and copy ineffectiveness. Therefore, the counterfeiter cannot use the enterprise information code to produce counterfeit products.
Description
Technical scheme of the present invention is:
1, first checking is as (Fig. 1):
After user carries out scanning reading or manual typing by mobile phone or internet platform to product information code, user is required after prime information code, input multidigit " custom coding " (little Fig. 1), forms the second segment encode.Company information database is sent to again by network, database is compared to the information code that " custom coding " is front, and feed back to user's authorization information, simultaneously, " waiting to record code " region (little Fig. 2) automatic input " custom coding " after prime information code, forms two segment information codes.
2, multiple authentication is as (Fig. 2):
After user carries out scanning reading or manual typing by mobile phone or internet platform to product information code, user is required after prime information code, input multidigit " custom coding ", forms the second segment encode.Be sent to company information database by network again to compare.Now, outside enterprise database is not only verified first paragraph information code, and second segment information code is synchronously verified, and to field feedback.
Claims (5)
1. two sections of security code verification techniques of product information code, (1) is realized alternately by internet and database.(2) user by mobile phone to bar code, one-dimension code, Quick Response Code, various information code carries out scanning or being inputted by internet platform, after obtaining company information data, user is required on mobile phone interface or the network platform, to input multidigit " custom coding " according to prompting before checking, forms the second segment encode.(3) user is sent to enterprise database by network information, during first checking, only the original information data that " custom coding " is front compared and feed back, again by " waiting the to record code " region after " custom coding " automatic input original coding, form two sections of codings in a database.(4) during user's multiple authentication, be required that input multidigit " writes justice coding " certainly equally after scanning input or input raw information code, while comparing to information code in internet and enterprise database, two segment encodes are utilized to compare to " custom coding " and feed back.
2. (1) according to claim 1.This technical characteristic is that user utilizes mobile telephone scanning software or internet platform, realizes the reading to enterprise product information and enterprise database data message, checking, the process of typing and technology.
3. (2) according to claim 1.It is characterized in that the information code of user to enterprise product scans, the data read are required input multidigit custom coding (numeral, English, symbol) before checking, formation second segment is encoded, and is just authorized to read and comparison lane database information data.Otherwise system will not be passed through.
4. (3) according to claim 1.It is characterized in that being compared to the information data in enterprise database by internet and platform, except being given by information feed back with outdoor, system, by " waiting the to record code " region after " custom coding " automatic input primary data information (pdi), forms second segment coding.The coding making the original information code of lane database become two sections of independences to contact again.
5. (4) according to claim 1.It is characterized in that when multiple authentication is encoded, except checking raw information code, two segment encodes also will be utilized to compare to " custom coding ".Object is to prevent counterfeiter from utilizing raw information identifying code to carry out batch duplicating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510323498.XA CN105321082A (en) | 2015-06-12 | 2015-06-12 | Two-segment code information anti-counterfeit verification technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510323498.XA CN105321082A (en) | 2015-06-12 | 2015-06-12 | Two-segment code information anti-counterfeit verification technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105321082A true CN105321082A (en) | 2016-02-10 |
Family
ID=55248418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510323498.XA Pending CN105321082A (en) | 2015-06-12 | 2015-06-12 | Two-segment code information anti-counterfeit verification technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105321082A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1268716A (en) * | 2000-01-26 | 2000-10-04 | 周裕龙 | Anti-counterfeit method of financial bills |
CN102915427A (en) * | 2012-10-12 | 2013-02-06 | 深圳市华阳信通科技发展有限公司 | Two-dimensional code-based bidirectional dynamic authentication method |
CN103489121A (en) * | 2013-09-10 | 2014-01-01 | 济南山河环境科技有限公司 | Anti-counterfeiting off-site commodity transaction method and system |
CN103778544A (en) * | 2014-02-19 | 2014-05-07 | 聂鲲宇 | Goods interactive anti-fake identification method based on smart phones and two-dimensional codes |
CN104463291A (en) * | 2013-09-16 | 2015-03-25 | 深圳市同盛绿色科技有限公司 | Anti-counterfeiting method and mobile device |
-
2015
- 2015-06-12 CN CN201510323498.XA patent/CN105321082A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1268716A (en) * | 2000-01-26 | 2000-10-04 | 周裕龙 | Anti-counterfeit method of financial bills |
CN102915427A (en) * | 2012-10-12 | 2013-02-06 | 深圳市华阳信通科技发展有限公司 | Two-dimensional code-based bidirectional dynamic authentication method |
CN103489121A (en) * | 2013-09-10 | 2014-01-01 | 济南山河环境科技有限公司 | Anti-counterfeiting off-site commodity transaction method and system |
CN104463291A (en) * | 2013-09-16 | 2015-03-25 | 深圳市同盛绿色科技有限公司 | Anti-counterfeiting method and mobile device |
CN103778544A (en) * | 2014-02-19 | 2014-05-07 | 聂鲲宇 | Goods interactive anti-fake identification method based on smart phones and two-dimensional codes |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104835046B (en) | A kind of data false distinguishing method for two-dimension code safe verification | |
CA2925325C (en) | Document authentication based on expected wear | |
US20190370620A1 (en) | Method and apparatus for generating and reading composite two-dimensional code | |
CN104392260A (en) | Two-dimensional code anti-counterfeiting method based on additional information | |
CN103093365B (en) | The method and system of checking authenticity of products | |
CN103986578B (en) | Based on the identity identifying method of finger print information | |
CN101076165A (en) | Mobile antifogery method and system based on cell phone | |
CN104680202A (en) | Methods for generating and verifying two-dimension code of invoice | |
CN103810457A (en) | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code | |
CN105205674A (en) | Product anti-counterfeiting method based on two-dimensional code | |
CN105719144A (en) | Food safety tracing method and food safety tracing system based on two-dimensional code | |
CN104766113A (en) | Plain and secret code type anti-fake label and anti-fake method thereof | |
GB2504746A (en) | Matrix Pattern Authentication (MPA) using a divided authentication code | |
CN104951827A (en) | Compound two-dimensional code and identifying system thereof | |
CN105701692A (en) | Electronic transaction writing-off method, electronic transaction writing-off client, electronic transaction writing-off server and electronic transaction writing-off system | |
EP2883183B1 (en) | Authentication method and system | |
CN104915701A (en) | Self-encrypting self-checking two-dimensional code encoding and decoding method | |
CN108960387A (en) | A kind of anti-counterfeiting two dimensional code and its generation and recognition methods | |
CN105187422B (en) | Rely on the anti-phishing website identification method and system on latent image coding techniques | |
CN108898205A (en) | The creation of binary graphics coding, authentication method and system | |
EP2922010A2 (en) | Digital voucher authentication | |
CN105321082A (en) | Two-segment code information anti-counterfeit verification technology | |
Xie et al. | Low-cost anti-copying 2D barcode by exploiting channel noise characteristics | |
CN107798373B (en) | Two-dimensional code anti-copying method and system | |
Anitha et al. | Authentication of digital documents using secret key biometric watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160210 |
|
WD01 | Invention patent application deemed withdrawn after publication |