CN108334919A - A kind of product false proof verification method and its system based on Quick Response Code - Google Patents
A kind of product false proof verification method and its system based on Quick Response Code Download PDFInfo
- Publication number
- CN108334919A CN108334919A CN201810339468.1A CN201810339468A CN108334919A CN 108334919 A CN108334919 A CN 108334919A CN 201810339468 A CN201810339468 A CN 201810339468A CN 108334919 A CN108334919 A CN 108334919A
- Authority
- CN
- China
- Prior art keywords
- module
- password
- product
- raw information
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of, and system is verified in the product false proof based on Quick Response Code, it is related to anti-counterfeit field, it solves illegal manufacturer and manufactures counterfeit and shoddy goods by the way of forging anti-false sign or recycling certified products packaging under the temptation of high profit, not the problem of consumer is not but easy to identify and inquires, its key points of the technical solution are that:Including:Main control terminal, identity information acquisition module, raw information acquisition module, coding module, user terminal, decoder module, checking module, when raw information is consistent with raw information, when unique identities password is consistent with unique identities password, user terminal voice broadcast Crypted password to raw information and product data, and in carrying out display raw information and product data on user terminal, system is verified in a kind of product false proof based on Quick Response Code of the present invention, improve distinguishing ability of the people to the true and false of product, the information of understanding is more abundant, illegal manufacturer is set to be not easy to crack imitation, improve safety.
Description
Technical field
The present invention relates to anti-counterfeit field, more particularly to a kind of product false proof verification method and its system based on Quick Response Code.
Background technology
Currently, with the fast development of social economy, people's living standard increases substantially, and type of merchandize is more and more
Sample, produces the fake and inferior commodities for copying, forging best brand of product therewith, certified products, genuine piece anti-counterfeiting technology be also thus born.
Anti-counterfeiting technology refers to the measure taken to reach anti-fake purpose, and anti-counterfeiting technology is in a certain range can be accurate
It discerns the false from the genuine, and is not easy the technology for being imitated and replicating.It is exactly briefly to prevent imitation, counterfeit technology, in order to protect enterprise
Industry brand, protection market, a kind of precaution technical measures protected consumers in general's legitimate rights and interests and taken.Anti-counterfeiting technology product
Be for the purpose of anti-fake, using made of anti-counterfeiting technology, have anti-fraud functional product.
There are many type of anti-counterfeiting technology, mainly have printing anti-counterfeiting technology, chemical material anti-counterfeiting technology, physical security technology,
Digital information false proof technology, structure and package anti-counterfeiting technology, human body and biological characteristic anti-counterfeiting technology etc..
Although anti-counterfeiting technology type is various, and manufacture craft is cumbersome, and cost is high, still there is illegal manufacturer in high profit
Temptation under using forge anti-false sign or recycling certified products packaging by the way of manufacture counterfeit and shoddy goods, consumer is but not easy to know
It not and inquires, there is room for improvement.
Invention content
The first object of the present invention is to provide a kind of product false proof verification method based on Quick Response Code, improves people to production
The information of the distinguishing ability of the true and false of product, understanding is more abundant, makes illegal manufacturer be not easy to crack imitation, improves safety.
The present invention above-mentioned technical purpose technical scheme is that:
A kind of product false proof verification method based on Quick Response Code includes the Quick Response Code generation mould for encrypting and being identified for user
Block, for correct Quick Response Code read module to be read out and judged whether to Quick Response Code;
The two-dimensional code generation module includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library,
And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm
Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one
Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random
Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
The Quick Response Code read module includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string
According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close
Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
Using the above scheme, by the analysis to product coding and product data, coordinate unique identities password and by adding
Close mode is encrypted, to improve the secrecy ability of data, and meanwhile the unique identities after raw information and decryption are close
Code is further encrypted by MD5, improves safety, and encryption data is converted to two-dimension code pattern by encoding,
And Smartphone device can be scanned two-dimension code pattern, and be decoded, it is decrypted by MD5, to obtain original
Beginning information and unique identities password report the true and false of product finally by comparison, and Quick Response Code is made to be not easy to be copied.
The second object of the present invention is to provide a kind of product false proof verification system based on Quick Response Code, improves people to production
The information of the distinguishing ability of the true and false of product, understanding is more abundant, makes illegal manufacturer be not easy to crack imitation, improves safety.
The present invention above-mentioned technical purpose technical scheme is that:
A kind of product false proof verification system based on Quick Response Code, characterized in that including:
Main control terminal is stored and is handled for data;
Identity information acquisition module connect with main control terminal and is used to acquire product data and product coding and generates unique identities
Password;
Raw information acquisition module connect with main control terminal and is used to acquire the raw information of product;
Coding module is connect with main control terminal and for being integrated raw information and unique identities password and simulating Quick Response Code figure
Shape;
User terminal is connect with main control terminal for being scanned to two-dimension code pattern;
Decoder module connect with user terminal and is used to be decoded two-dimension code pattern close to obtain raw information and unique identities
Code;
Checking module connect with user terminal and is compared with raw information and unique identities password to judge the true and false;
When the raw information that decoder module obtains is consistent with the raw information in raw information acquisition module, while decoder module obtains
When the unique identities password arrived is consistent with identity information acquisition mould unique identities password in the block, the user terminal voice broadcast adds
Password to raw information and product data, and in carrying out display raw information and product data on user terminal;
When the raw information that decoder module obtains and the raw information in raw information acquisition module are inconsistent or decoder module obtains
When the unique identities password arrived is inconsistent with identity information acquisition mould unique identities password in the block, the user terminal voice is accused
It is alert, and in progress display alarm content on user terminal.
Using the above scheme, by the setting of main control terminal, data are preserved and is handled with signal, and identity information
The setting of acquisition module is collected the acquisition product data and product coding of product and exports unique identities password, and leads to
Cross the collected raw information of raw information acquisition module, matching coding module to be converted to two-dimension code pattern for user terminal into
Row identification, display raw information and product data are carried out when being identified as genuine piece, on user terminal, are consulted for user.
Preferably, further including for receiving user terminal to the scanning times of two-dimension code pattern and being uploaded to main control terminal
Counting module;
When user terminal scans, and when the raw information that decoder module obtains and the raw information one in raw information acquisition module
It causes, while when the obtained unique identities password of decoder module is consistent with identity information acquisition mould unique identities password in the block, institute
It states and shows scanning times on user terminal;Conversely, not showing.
Using the above scheme, the setting of counting module counts the scanned number of two-dimension code pattern, is produced when finding
When two-dimension code pattern on product is certified products, will two-dimensional code display figure scanned number, improve safety.
Preferably, further including the date prompt on the date for connecting with main control terminal and be used to show first time contrast scans
Module;
When user terminal scans, and when the raw information that decoder module obtains and the raw information one in raw information acquisition module
It causes, while when the obtained unique identities password of decoder module is consistent with identity information acquisition mould unique identities password in the block, institute
State the content that shows date on date prompt module and user terminal;Conversely, not showing.
Using the above scheme, the setting of date prompt module shows scanning date first time of two-dimension code pattern,
To be consulted for user, when the time showing exception of first time scanning, user can be made to judge the true and false of its commodity.
Preferably, further including:
First encrypting module connect with main control terminal and is used to input the first encryption data and for being carried out to unique identities password
It encrypts and is uploaded to main control terminal;
First deciphering module is connect with main control terminal so that the first encryption information inputs and encrypts number with first in main control terminal
According to comparison to obtain unique identities password;
When the first encryption data is consistent with the first coded signal, unique identities password is obtained;Conversely, not obtaining.
Using the above scheme, the setting of the first encrypting module coordinates the use of the first deciphering module, makes user to unique
Identification cipher carries out in use, the encryption shifted to an earlier date, to improve the safety used.
Preferably, first deciphering module includes:
First input unit inputs the first encryption information for user;
First display unit, for showing unique identities password.
Using the above scheme, the setting of the first input unit allows user to carry out the first encryption number data and adds with first
The input of confidential information, while coordinating the exclusive use of the first display unit, to improve the speed of display.
Preferably, further including being connect with main control terminal and for being prompted the input content of the first input unit
Prompt unit is preset with the prompt message opposite with the first encryption data in the main control terminal.
Using the above scheme, by the setting of prompt unit, to being carried out to the type inputted required for the first input unit
People's prompt is given in prompt, highly practical to reduce the case where people forget.
Preferably, further including:
Second encrypting module connect with main control terminal and is carried out with receiving raw information and unique identities password and inputting cryptographic keys
It encrypts and obtains the second encryption data;
The coding module is to receive the second encryption data and simulate two-dimension code pattern, and the decoder module is to two-dimension code pattern
It is decoded to obtain the second encryption data;
Second deciphering module, and user terminal connection input corresponding with the second encryption data decryption key with obtain raw information and
Unique identities password;
Ciphertext data corresponding with cryptographic keys is preset in the main control terminal, when the decryption key and ciphertext data of input
When consistent, raw information and unique identities password are obtained;Conversely, not obtaining.
Using the above scheme, the setting of the second encrypting module, coordinate the second deciphering module use, make raw information with only
One identification cipher is also encrypted, and improves the safety of system, highly practical.
Preferably, second deciphering module includes:
Second input unit inputs decryption key for user;
Second display unit, for showing raw information and unique identities password.
Using the above scheme, the setting of the second input unit makes cryptographic keys and decryption key be inputted, to improve
The safety of system, and the use of the second display unit, raw information is individually shown with unique identities password, real
It is strong with property.
Preferably, further including being connect with main control terminal and for being counted the character length of decryption key to export
The statistical module of statistical information is preset with the statistical data consistent with the character length of ciphertext data in the main control terminal;
When statistical data and statistical information are inconsistent, the main control terminal is to realize alarm;Conversely, not alerting.
Using the above scheme, the setting of statistical module makes people when inputting decryption key, unites to character length
Meter the case where to reduce few input, when there is character length mistake, will be alerted, to improve efficiency.
In conclusion the invention has the advantages that:Distinguishing ability of the people to the true and false of product is improved, is understood
Information it is more abundant, make illegal manufacturer be not easy to crack imitation, improve safety.
Description of the drawings
Fig. 1 is the step schematic diagram of two-dimensional code generation module;
Fig. 2 is the step schematic diagram of Quick Response Code read module;
Fig. 3 is the system schematic of fake certification system;
Fig. 4 is the flow diagram that two-dimension code pattern generates;
Fig. 5 is the flow diagram that two-dimension code pattern is read;
Fig. 6 is the system block diagram of the first encrypting module;
Fig. 7 is the system block diagram of the second encrypting module;
Fig. 8 is the system block diagram of counting module and date prompt module.
In figure:1, two-dimensional code generation module;2, Quick Response Code read module;3, main control terminal;4, identity information acquisition module;
5, raw information acquisition module;6, coding module;7, user terminal;8, decoder module;9, checking module;10, counting module;11、
Date prompt module;12, the first encrypting module;13, the first deciphering module;14, the first input unit;15, the first display unit;
16, prompt unit;17, the second encrypting module;18, the second deciphering module;19, the second input unit;20, the second display unit;
21, statistical module.
Specific implementation mode
Below in conjunction with attached drawing 1-8, invention is further described in detail.
As shown in Figure 1, 2, a kind of product false proof verification system based on Quick Response Code disclosed in the present embodiment, and product false proof
Verification system includes two-dimensional code generation module 1 and Quick Response Code read module 2, is given birth to Quick Response Code by two-dimensional code generation module 1
At Quick Response Code being read out by Quick Response Code read module 2, to be differentiated the true and false of the product containing Quick Response Code.
As shown in Figure 1, two-dimensional code generation module 1 includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library,
And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm
Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one
Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random
Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
As shown in Fig. 2, Quick Response Code read module 2 includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string
According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close
Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
As shown in figure 3, X-Y scheme figure is generated in main control terminal 3, and two-dimension code pattern is scanned reading for user terminal 7
It takes, in the present embodiment, main control terminal 3 is mainframe computer, and user terminal 7 is that smart mobile phone, smartwatch, tablet computer etc. are set
It is standby.
Main control terminal 3 is connect with user terminal 7.Main control terminal 3 and identity information acquisition module 4, the first encrypting module 12, the
One deciphering module 13, prompt unit 16, raw information acquisition module 5, the second encrypting module 17, coding module 6 connect.User terminal
7 connect with decoder module 8, checking module 9, the second deciphering module 18, counting module 10, date prompt module 11, statistical module 21
It connects.And first deciphering module 13 include the first input unit 14 and the first display unit 15.Second deciphering module 18 includes second
Input unit 19 and the second display unit 20.
As shown in figure 4, identity information acquisition module 4 is used to acquire the product data and product coding of product, and identity
After information acquisition module 4 is collected product data and product coding, it is converted into unique identities password.
In unique identities Password Input to the first encrypting module 12, and the first encryption number is also inputted in the first encrypting module 12
According to, the first encryption data is uploaded to while input in main control terminal 3, and main control terminal 3 is connect with the first deciphering module 13, when
When the first encryption information inputted in first deciphering module 13 is corresponding with the first encryption data, the first deciphering module 13 exports only
One identification cipher.
Raw information acquisition module 5 is used to collect the raw information of product, and the second encrypting module 17 receives unique body simultaneously
Part password and raw information, and coordinate cryptographic keys, to the second encryption data of output, cryptographic keys are input to the second encryption mould
It is uploaded to main control terminal 3 while block 17, and the second encrypting module 17 exports the second encryption data, and passes through coding module 6
Processing, to export two-dimension code pattern.
As shown in figure 5, two-dimension code pattern is scanned reading by user terminal 7, and is decoded by decoder module 8,
To the second encryption data of output, the second encryption data is cracked by the second deciphering module 18, when opposite with cryptographic keys
When the decryption key answered is input in the second deciphering module 18, the second deciphering module 18 exports raw information and unique identities are close
Code, and coordinate the raw information of 5 offer of raw information acquisition module and identity information acquisition module 4 to obtain by checking module 9
Unique identities password compared, when compare it is correct when, voice broadcast comparing result.
As shown in fig. 6, in the first encrypting module 12 for input the first encryption data, and the first encrypting module 12 for pair
Unique identities password is encrypted, and encrypted result is uploaded to main control terminal 3, while will be given by prompt unit 16 need to
The first input unit 14 for inputting the first encryption information is prompted, and display reminding information.Such as:Need the information inputted
For apple when, then prompt message be fruit.
When the first encryption data is consistent with the first encryption information, the first display unit 15 shows unique identities password;When
When first encryption data is inconsistent with the second encryption information, the first display unit 15 does not show unique identities password then.
As shown in fig. 7, raw information and unique identities password are encrypted by the second encrypting module 17, and by defeated
The mode for entering cryptographic keys is encrypted, and exports the second encryption data, while matching ciphertext data and being uploaded to master control end
3 are held, is used to input decryption key in the second input unit 19.
When decryption key is consistent with ciphertext data, the second display unit 20 is for showing that raw information and unique identities are close
Code;When decryption key and ciphertext data are inconsistent, the second display unit 20 does not show raw information and unique identities password.
Second encrypting module 17 is encrypted using MD5, and statistical module 21 examines the character length of decryption key
It surveys, and exports statistical information, and be preset with statistical data in main control terminal 3, the character length phase of statistical data and ciphertext data
It is corresponding.
When statistical data is consistent with statistical information, main control terminal 3 is without alarm;When statistical data and statistical information not
When consistent, main control terminal 3 is alerted.To be warned to user.
As shown in figure 8, output has two-dimension code pattern in main control terminal 3, and two-dimension code pattern is read out for user terminal 7,
User terminal 7 is decoded by decoder module 8, and to the second encryption data of output, the second encryption data passes through the second decryption mould
Block 18 is decrypted, and exports raw information and unique identity information.
When decoder module 8 is by 18 obtained raw information of the second deciphering module, and in raw information acquisition module 5
Raw information is consistent, while the unique identities password that decoder module 8 obtains, with the unique identities in identity information acquisition module 4
When password is consistent, 7 voice broadcast Crypted password of user terminal to raw information and product data, and in being carried out on user terminal 7
It shows raw information and product data, while counting module 10 adds up present scan, and shows scanning times, and the date
Reminding module 11 is for showing the first scan date.
When decoder module 8 is by 18 obtained raw information of the second deciphering module, and in raw information acquisition module 5
Raw information is inconsistent or decoder module 8 is by 18 obtained unique identities password of the second deciphering module, is adopted with identity information
Collect unique identities password in module 4 it is inconsistent when, user terminal 7 carries out phonic warning, and in carrying out display alarm on user terminal 7
Content, counting module 10 is without counting, while date prompt module 11 also and carries out date display.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, people in the art
Member can as needed make the present embodiment the modification of not creative contribution after reading this specification, but as long as at this
It is all protected by Patent Law in the right of invention.
Claims (10)
1. a kind of product false proof verification method based on Quick Response Code, characterized in that include two for encrypting and being identified for user
Tie up code generation module (1), for correct Quick Response Code read module (2) to be read out and judged whether to Quick Response Code;
The two-dimensional code generation module (1) includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library,
And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm
Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one
Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random
Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
The Quick Response Code read module (2) includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string
According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close
Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
2. system is verified in a kind of product false proof based on Quick Response Code, characterized in that including:
Main control terminal (3) is stored and is handled for data;
Identity information acquisition module (4) is connect with main control terminal (3) and for acquiring product data and product coding and generating only
One identification cipher;
Raw information acquisition module (5) connect with main control terminal (3) and is used to acquire the raw information of product;
Coding module (6) is connect with main control terminal (3) and for being integrated raw information and unique identities password and simulating two
Tie up code figure;
User terminal (7) is connect with main control terminal (3) for being scanned to two-dimension code pattern;
Decoder module (8), connect with user terminal (7) and for two-dimension code pattern is decoded with obtain raw information and uniquely
Identification cipher;
Checking module (9) connect with user terminal (7) and is compared with raw information and unique identities password to judge the true and false;
When the raw information that decoder module (8) obtains is consistent with the raw information in raw information acquisition module (5), decode simultaneously
When the unique identities password that module (8) obtains is consistent with the unique identities password in identity information acquisition module (4), the user
Hold (7) voice broadcast Crypted password to raw information and product data, and in carrying out display raw information on user terminal (7)
And product data;
When the raw information that decoder module (8) obtains and the raw information in raw information acquisition module (5) are inconsistent, or decoding
When unique identities password in unique identities password and identity information acquisition module (4) that module (8) obtains is inconsistent, the use
Family end (7) phonic warning, and in progress display alarm content on user terminal (7).
3. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include being used for
User terminal (7) is received to the scanning times of two-dimension code pattern and is uploaded to the counting module (10) of main control terminal (3);
When user terminal (7) are scanned, and when in the raw information and raw information acquisition module (5) that decoder module (8) obtains
Raw information is consistent, while the obtained unique identities password of decoder module (8) and unique body in identity information acquisition module (4)
When part password is consistent, scanning times are shown on the user terminal (7);Conversely, not showing.
4. system is verified in a kind of product false proof based on Quick Response Code according to claim 3, it is characterized in that:Further include and master
Control terminal (3) connects and is used to show the date prompt module (11) on the date of first time contrast scans;
When user terminal (7) are scanned, and when in the raw information and raw information acquisition module (5) that decoder module (8) obtains
Raw information is consistent, while the obtained unique identities password of decoder module (8) and unique body in identity information acquisition module (4)
When part password is consistent, show date content on the date prompt module (11) and user terminal (7);Conversely, not showing.
5. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include:
First encrypting module (12) is connect with main control terminal (3) and for inputting the first encryption data and for unique identities
Password is encrypted and is uploaded to main control terminal (3);
First deciphering module (13), connect with main control terminal (3) for the first encryption information input and in main control terminal (3)
First encryption data is compared to obtain unique identities password;
When the first encryption data is consistent with the first coded signal, unique identities password is obtained;Conversely, not obtaining.
6. system is verified in a kind of product false proof based on Quick Response Code according to claim 5, it is characterized in that:First solution
Close module (13) includes:
First input unit (14) inputs the first encryption information for user;
First display unit (15), for showing unique identities password.
7. system is verified in a kind of product false proof based on Quick Response Code according to claim 6, it is characterized in that:Further include and master
Control terminal (3) connects and the prompt unit (16) for being prompted the input content of the first input unit (14), the master
Control terminal is preset with the prompt message opposite with the first encryption data in (3).
8. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include:
Second encrypting module (17) is connect with main control terminal (3) to receive raw information and unique identities password and input encryption
Secret key is encrypted and obtains the second encryption data;
The coding module (6) is to receive the second encryption data and simulate two-dimension code pattern, and the decoder module (8) is to two dimension
Code figure is decoded to obtain the second encryption data;
Second deciphering module (18), and user terminal (7) connection input decryption key corresponding with the second encryption data to obtain original
Beginning information and unique identities password;
It is preset with ciphertext data corresponding with cryptographic keys, the decryption key when input and decryption in the main control terminal (3)
When data are consistent, raw information and unique identities password are obtained;Conversely, not obtaining.
9. system is verified in a kind of product false proof based on Quick Response Code according to claim 8, it is characterized in that:Second solution
Close module (18) includes:
Second input unit (19) inputs decryption key for user;
Second display unit (20), for showing raw information and unique identities password.
10. system is verified in a kind of product false proof based on Quick Response Code according to claim 9, it is characterized in that:Further include with
Main control terminal (3) connects and for being counted to the character length of decryption key to export the statistical module of statistical information
(21), it is preset with the statistical data consistent with the character length of ciphertext data in the main control terminal (3);
When statistical data and statistical information are inconsistent, the main control terminal (3) is to realize alarm;Conversely, not alerting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810339468.1A CN108334919A (en) | 2018-04-16 | 2018-04-16 | A kind of product false proof verification method and its system based on Quick Response Code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810339468.1A CN108334919A (en) | 2018-04-16 | 2018-04-16 | A kind of product false proof verification method and its system based on Quick Response Code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108334919A true CN108334919A (en) | 2018-07-27 |
Family
ID=62933449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810339468.1A Pending CN108334919A (en) | 2018-04-16 | 2018-04-16 | A kind of product false proof verification method and its system based on Quick Response Code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108334919A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344654A (en) * | 2018-11-12 | 2019-02-15 | 金思成 | A kind of two dimensional code training clothes information encryption identifying system |
CN111783917A (en) * | 2020-07-01 | 2020-10-16 | 南京踢扑网络科技有限公司 | Encrypted two-dimensional code with tracing and anti-counterfeiting functions |
CN111882332A (en) * | 2020-07-31 | 2020-11-03 | 浙江水晶光电科技股份有限公司 | Information verification method and device |
GB2585107A (en) * | 2019-06-27 | 2020-12-30 | Chinapps Ltd | Method, device, terminal apparatus and storage medium for product authentication |
CN113312534A (en) * | 2021-05-28 | 2021-08-27 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930440A (en) * | 2012-09-13 | 2013-02-13 | 王清万 | Method for preventing and distinguishing fake products by using internet and two-dimension codes |
CN102932148A (en) * | 2012-10-25 | 2013-02-13 | 成都市易恒信科技有限公司 | System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication |
CN105205674A (en) * | 2015-09-08 | 2015-12-30 | 云南省通海正华印刷有限公司 | Product anti-counterfeiting method based on two-dimensional code |
CN107590669A (en) * | 2017-10-11 | 2018-01-16 | 覃和平 | A kind of combined ciphering joint supervision method for anti-counterfeit of Quick Response Code |
CN107798546A (en) * | 2017-11-07 | 2018-03-13 | 王清萍 | Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result |
-
2018
- 2018-04-16 CN CN201810339468.1A patent/CN108334919A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930440A (en) * | 2012-09-13 | 2013-02-13 | 王清万 | Method for preventing and distinguishing fake products by using internet and two-dimension codes |
CN102932148A (en) * | 2012-10-25 | 2013-02-13 | 成都市易恒信科技有限公司 | System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication |
CN105205674A (en) * | 2015-09-08 | 2015-12-30 | 云南省通海正华印刷有限公司 | Product anti-counterfeiting method based on two-dimensional code |
CN107590669A (en) * | 2017-10-11 | 2018-01-16 | 覃和平 | A kind of combined ciphering joint supervision method for anti-counterfeit of Quick Response Code |
CN107798546A (en) * | 2017-11-07 | 2018-03-13 | 王清萍 | Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344654A (en) * | 2018-11-12 | 2019-02-15 | 金思成 | A kind of two dimensional code training clothes information encryption identifying system |
CN109344654B (en) * | 2018-11-12 | 2021-11-19 | 金成思 | Two-dimensional code training clothes information encryption and identification system |
GB2585107A (en) * | 2019-06-27 | 2020-12-30 | Chinapps Ltd | Method, device, terminal apparatus and storage medium for product authentication |
CN111783917A (en) * | 2020-07-01 | 2020-10-16 | 南京踢扑网络科技有限公司 | Encrypted two-dimensional code with tracing and anti-counterfeiting functions |
CN111783917B (en) * | 2020-07-01 | 2022-09-13 | 南京踢扑网络科技有限公司 | Encrypted two-dimensional code with tracing and anti-counterfeiting functions |
CN111882332A (en) * | 2020-07-31 | 2020-11-03 | 浙江水晶光电科技股份有限公司 | Information verification method and device |
CN113312534A (en) * | 2021-05-28 | 2021-08-27 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
CN113312534B (en) * | 2021-05-28 | 2022-08-05 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108334919A (en) | A kind of product false proof verification method and its system based on Quick Response Code | |
CN107194449B (en) | Printing anti-counterfeiting and information tracing method based on combination of digital watermark and two-dimensional code | |
CN106452756B (en) | Can the safe Quick Response Code construction verification method of off-line verification and device | |
US8249350B2 (en) | Brand protection and product autentication using portable devices | |
CN100530253C (en) | System and method of authenticating an article | |
US9800408B2 (en) | Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof | |
CN105099712B (en) | A kind of data ciphering method based on Dicode verification | |
CN101201886B (en) | Three-he-code method for recognizing commodity | |
CN111639734B (en) | Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code | |
CN113627958B (en) | NFC anti-counterfeiting tracing method and server | |
CN104268610B (en) | One kind classification QR code generating methods and read method | |
US20120290841A1 (en) | Unique identifier, method for providing the unique identifier and use of the unique identifier | |
CN102270294A (en) | Bar code and two-dimension code hybrid coding and decoding methods and devices | |
CN108154208B (en) | Article identification method, article identification method and article identification system based on two-dimensional code | |
CN104794626B (en) | A kind of method for anti-counterfeit and device based on hardware information | |
CN103886469A (en) | Product two-dimension code generation and query system | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN103489086A (en) | Authority control system and method of logistics information | |
CN109615402A (en) | Product quality back-tracing anti-fake system based on block chain technology | |
CN104574119B (en) | A kind of method that commodity Jianzhen traces to the source | |
CN105373933A (en) | Food circulation traceability method based on electronic inspection report | |
CN103810457A (en) | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code | |
CN104680392A (en) | Identity-based product tracing system and method | |
CN104899751A (en) | Method for identifying cigarette authenticity based on self-encrypted self-checking two-dimensional code | |
CN108960387A (en) | A kind of anti-counterfeiting two dimensional code and its generation and recognition methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180727 |
|
RJ01 | Rejection of invention patent application after publication |