CN108334919A - A kind of product false proof verification method and its system based on Quick Response Code - Google Patents

A kind of product false proof verification method and its system based on Quick Response Code Download PDF

Info

Publication number
CN108334919A
CN108334919A CN201810339468.1A CN201810339468A CN108334919A CN 108334919 A CN108334919 A CN 108334919A CN 201810339468 A CN201810339468 A CN 201810339468A CN 108334919 A CN108334919 A CN 108334919A
Authority
CN
China
Prior art keywords
module
password
product
raw information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810339468.1A
Other languages
Chinese (zh)
Inventor
范玉荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Sino Indian Anti-Counterfeit Technology Co Ltd
Original Assignee
Nanjing Sino Indian Anti-Counterfeit Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Sino Indian Anti-Counterfeit Technology Co Ltd filed Critical Nanjing Sino Indian Anti-Counterfeit Technology Co Ltd
Priority to CN201810339468.1A priority Critical patent/CN108334919A/en
Publication of CN108334919A publication Critical patent/CN108334919A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of, and system is verified in the product false proof based on Quick Response Code, it is related to anti-counterfeit field, it solves illegal manufacturer and manufactures counterfeit and shoddy goods by the way of forging anti-false sign or recycling certified products packaging under the temptation of high profit, not the problem of consumer is not but easy to identify and inquires, its key points of the technical solution are that:Including:Main control terminal, identity information acquisition module, raw information acquisition module, coding module, user terminal, decoder module, checking module, when raw information is consistent with raw information, when unique identities password is consistent with unique identities password, user terminal voice broadcast Crypted password to raw information and product data, and in carrying out display raw information and product data on user terminal, system is verified in a kind of product false proof based on Quick Response Code of the present invention, improve distinguishing ability of the people to the true and false of product, the information of understanding is more abundant, illegal manufacturer is set to be not easy to crack imitation, improve safety.

Description

A kind of product false proof verification method and its system based on Quick Response Code
Technical field
The present invention relates to anti-counterfeit field, more particularly to a kind of product false proof verification method and its system based on Quick Response Code.
Background technology
Currently, with the fast development of social economy, people's living standard increases substantially, and type of merchandize is more and more Sample, produces the fake and inferior commodities for copying, forging best brand of product therewith, certified products, genuine piece anti-counterfeiting technology be also thus born.
Anti-counterfeiting technology refers to the measure taken to reach anti-fake purpose, and anti-counterfeiting technology is in a certain range can be accurate It discerns the false from the genuine, and is not easy the technology for being imitated and replicating.It is exactly briefly to prevent imitation, counterfeit technology, in order to protect enterprise Industry brand, protection market, a kind of precaution technical measures protected consumers in general's legitimate rights and interests and taken.Anti-counterfeiting technology product Be for the purpose of anti-fake, using made of anti-counterfeiting technology, have anti-fraud functional product.
There are many type of anti-counterfeiting technology, mainly have printing anti-counterfeiting technology, chemical material anti-counterfeiting technology, physical security technology, Digital information false proof technology, structure and package anti-counterfeiting technology, human body and biological characteristic anti-counterfeiting technology etc..
Although anti-counterfeiting technology type is various, and manufacture craft is cumbersome, and cost is high, still there is illegal manufacturer in high profit Temptation under using forge anti-false sign or recycling certified products packaging by the way of manufacture counterfeit and shoddy goods, consumer is but not easy to know It not and inquires, there is room for improvement.
Invention content
The first object of the present invention is to provide a kind of product false proof verification method based on Quick Response Code, improves people to production The information of the distinguishing ability of the true and false of product, understanding is more abundant, makes illegal manufacturer be not easy to crack imitation, improves safety.
The present invention above-mentioned technical purpose technical scheme is that:
A kind of product false proof verification method based on Quick Response Code includes the Quick Response Code generation mould for encrypting and being identified for user Block, for correct Quick Response Code read module to be read out and judged whether to Quick Response Code;
The two-dimensional code generation module includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library, And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
The Quick Response Code read module includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
Using the above scheme, by the analysis to product coding and product data, coordinate unique identities password and by adding Close mode is encrypted, to improve the secrecy ability of data, and meanwhile the unique identities after raw information and decryption are close Code is further encrypted by MD5, improves safety, and encryption data is converted to two-dimension code pattern by encoding, And Smartphone device can be scanned two-dimension code pattern, and be decoded, it is decrypted by MD5, to obtain original Beginning information and unique identities password report the true and false of product finally by comparison, and Quick Response Code is made to be not easy to be copied.
The second object of the present invention is to provide a kind of product false proof verification system based on Quick Response Code, improves people to production The information of the distinguishing ability of the true and false of product, understanding is more abundant, makes illegal manufacturer be not easy to crack imitation, improves safety.
The present invention above-mentioned technical purpose technical scheme is that:
A kind of product false proof verification system based on Quick Response Code, characterized in that including:
Main control terminal is stored and is handled for data;
Identity information acquisition module connect with main control terminal and is used to acquire product data and product coding and generates unique identities Password;
Raw information acquisition module connect with main control terminal and is used to acquire the raw information of product;
Coding module is connect with main control terminal and for being integrated raw information and unique identities password and simulating Quick Response Code figure Shape;
User terminal is connect with main control terminal for being scanned to two-dimension code pattern;
Decoder module connect with user terminal and is used to be decoded two-dimension code pattern close to obtain raw information and unique identities Code;
Checking module connect with user terminal and is compared with raw information and unique identities password to judge the true and false;
When the raw information that decoder module obtains is consistent with the raw information in raw information acquisition module, while decoder module obtains When the unique identities password arrived is consistent with identity information acquisition mould unique identities password in the block, the user terminal voice broadcast adds Password to raw information and product data, and in carrying out display raw information and product data on user terminal;
When the raw information that decoder module obtains and the raw information in raw information acquisition module are inconsistent or decoder module obtains When the unique identities password arrived is inconsistent with identity information acquisition mould unique identities password in the block, the user terminal voice is accused It is alert, and in progress display alarm content on user terminal.
Using the above scheme, by the setting of main control terminal, data are preserved and is handled with signal, and identity information The setting of acquisition module is collected the acquisition product data and product coding of product and exports unique identities password, and leads to Cross the collected raw information of raw information acquisition module, matching coding module to be converted to two-dimension code pattern for user terminal into Row identification, display raw information and product data are carried out when being identified as genuine piece, on user terminal, are consulted for user.
Preferably, further including for receiving user terminal to the scanning times of two-dimension code pattern and being uploaded to main control terminal Counting module;
When user terminal scans, and when the raw information that decoder module obtains and the raw information one in raw information acquisition module It causes, while when the obtained unique identities password of decoder module is consistent with identity information acquisition mould unique identities password in the block, institute It states and shows scanning times on user terminal;Conversely, not showing.
Using the above scheme, the setting of counting module counts the scanned number of two-dimension code pattern, is produced when finding When two-dimension code pattern on product is certified products, will two-dimensional code display figure scanned number, improve safety.
Preferably, further including the date prompt on the date for connecting with main control terminal and be used to show first time contrast scans Module;
When user terminal scans, and when the raw information that decoder module obtains and the raw information one in raw information acquisition module It causes, while when the obtained unique identities password of decoder module is consistent with identity information acquisition mould unique identities password in the block, institute State the content that shows date on date prompt module and user terminal;Conversely, not showing.
Using the above scheme, the setting of date prompt module shows scanning date first time of two-dimension code pattern, To be consulted for user, when the time showing exception of first time scanning, user can be made to judge the true and false of its commodity.
Preferably, further including:
First encrypting module connect with main control terminal and is used to input the first encryption data and for being carried out to unique identities password It encrypts and is uploaded to main control terminal;
First deciphering module is connect with main control terminal so that the first encryption information inputs and encrypts number with first in main control terminal According to comparison to obtain unique identities password;
When the first encryption data is consistent with the first coded signal, unique identities password is obtained;Conversely, not obtaining.
Using the above scheme, the setting of the first encrypting module coordinates the use of the first deciphering module, makes user to unique Identification cipher carries out in use, the encryption shifted to an earlier date, to improve the safety used.
Preferably, first deciphering module includes:
First input unit inputs the first encryption information for user;
First display unit, for showing unique identities password.
Using the above scheme, the setting of the first input unit allows user to carry out the first encryption number data and adds with first The input of confidential information, while coordinating the exclusive use of the first display unit, to improve the speed of display.
Preferably, further including being connect with main control terminal and for being prompted the input content of the first input unit Prompt unit is preset with the prompt message opposite with the first encryption data in the main control terminal.
Using the above scheme, by the setting of prompt unit, to being carried out to the type inputted required for the first input unit People's prompt is given in prompt, highly practical to reduce the case where people forget.
Preferably, further including:
Second encrypting module connect with main control terminal and is carried out with receiving raw information and unique identities password and inputting cryptographic keys It encrypts and obtains the second encryption data;
The coding module is to receive the second encryption data and simulate two-dimension code pattern, and the decoder module is to two-dimension code pattern It is decoded to obtain the second encryption data;
Second deciphering module, and user terminal connection input corresponding with the second encryption data decryption key with obtain raw information and Unique identities password;
Ciphertext data corresponding with cryptographic keys is preset in the main control terminal, when the decryption key and ciphertext data of input When consistent, raw information and unique identities password are obtained;Conversely, not obtaining.
Using the above scheme, the setting of the second encrypting module, coordinate the second deciphering module use, make raw information with only One identification cipher is also encrypted, and improves the safety of system, highly practical.
Preferably, second deciphering module includes:
Second input unit inputs decryption key for user;
Second display unit, for showing raw information and unique identities password.
Using the above scheme, the setting of the second input unit makes cryptographic keys and decryption key be inputted, to improve The safety of system, and the use of the second display unit, raw information is individually shown with unique identities password, real It is strong with property.
Preferably, further including being connect with main control terminal and for being counted the character length of decryption key to export The statistical module of statistical information is preset with the statistical data consistent with the character length of ciphertext data in the main control terminal;
When statistical data and statistical information are inconsistent, the main control terminal is to realize alarm;Conversely, not alerting.
Using the above scheme, the setting of statistical module makes people when inputting decryption key, unites to character length Meter the case where to reduce few input, when there is character length mistake, will be alerted, to improve efficiency.
In conclusion the invention has the advantages that:Distinguishing ability of the people to the true and false of product is improved, is understood Information it is more abundant, make illegal manufacturer be not easy to crack imitation, improve safety.
Description of the drawings
Fig. 1 is the step schematic diagram of two-dimensional code generation module;
Fig. 2 is the step schematic diagram of Quick Response Code read module;
Fig. 3 is the system schematic of fake certification system;
Fig. 4 is the flow diagram that two-dimension code pattern generates;
Fig. 5 is the flow diagram that two-dimension code pattern is read;
Fig. 6 is the system block diagram of the first encrypting module;
Fig. 7 is the system block diagram of the second encrypting module;
Fig. 8 is the system block diagram of counting module and date prompt module.
In figure:1, two-dimensional code generation module;2, Quick Response Code read module;3, main control terminal;4, identity information acquisition module; 5, raw information acquisition module;6, coding module;7, user terminal;8, decoder module;9, checking module;10, counting module;11、 Date prompt module;12, the first encrypting module;13, the first deciphering module;14, the first input unit;15, the first display unit; 16, prompt unit;17, the second encrypting module;18, the second deciphering module;19, the second input unit;20, the second display unit; 21, statistical module.
Specific implementation mode
Below in conjunction with attached drawing 1-8, invention is further described in detail.
As shown in Figure 1, 2, a kind of product false proof verification system based on Quick Response Code disclosed in the present embodiment, and product false proof Verification system includes two-dimensional code generation module 1 and Quick Response Code read module 2, is given birth to Quick Response Code by two-dimensional code generation module 1 At Quick Response Code being read out by Quick Response Code read module 2, to be differentiated the true and false of the product containing Quick Response Code.
As shown in Figure 1, two-dimensional code generation module 1 includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library, And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
As shown in Fig. 2, Quick Response Code read module 2 includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
As shown in figure 3, X-Y scheme figure is generated in main control terminal 3, and two-dimension code pattern is scanned reading for user terminal 7 It takes, in the present embodiment, main control terminal 3 is mainframe computer, and user terminal 7 is that smart mobile phone, smartwatch, tablet computer etc. are set It is standby.
Main control terminal 3 is connect with user terminal 7.Main control terminal 3 and identity information acquisition module 4, the first encrypting module 12, the One deciphering module 13, prompt unit 16, raw information acquisition module 5, the second encrypting module 17, coding module 6 connect.User terminal 7 connect with decoder module 8, checking module 9, the second deciphering module 18, counting module 10, date prompt module 11, statistical module 21 It connects.And first deciphering module 13 include the first input unit 14 and the first display unit 15.Second deciphering module 18 includes second Input unit 19 and the second display unit 20.
As shown in figure 4, identity information acquisition module 4 is used to acquire the product data and product coding of product, and identity After information acquisition module 4 is collected product data and product coding, it is converted into unique identities password.
In unique identities Password Input to the first encrypting module 12, and the first encryption number is also inputted in the first encrypting module 12 According to, the first encryption data is uploaded to while input in main control terminal 3, and main control terminal 3 is connect with the first deciphering module 13, when When the first encryption information inputted in first deciphering module 13 is corresponding with the first encryption data, the first deciphering module 13 exports only One identification cipher.
Raw information acquisition module 5 is used to collect the raw information of product, and the second encrypting module 17 receives unique body simultaneously Part password and raw information, and coordinate cryptographic keys, to the second encryption data of output, cryptographic keys are input to the second encryption mould It is uploaded to main control terminal 3 while block 17, and the second encrypting module 17 exports the second encryption data, and passes through coding module 6 Processing, to export two-dimension code pattern.
As shown in figure 5, two-dimension code pattern is scanned reading by user terminal 7, and is decoded by decoder module 8, To the second encryption data of output, the second encryption data is cracked by the second deciphering module 18, when opposite with cryptographic keys When the decryption key answered is input in the second deciphering module 18, the second deciphering module 18 exports raw information and unique identities are close Code, and coordinate the raw information of 5 offer of raw information acquisition module and identity information acquisition module 4 to obtain by checking module 9 Unique identities password compared, when compare it is correct when, voice broadcast comparing result.
As shown in fig. 6, in the first encrypting module 12 for input the first encryption data, and the first encrypting module 12 for pair Unique identities password is encrypted, and encrypted result is uploaded to main control terminal 3, while will be given by prompt unit 16 need to The first input unit 14 for inputting the first encryption information is prompted, and display reminding information.Such as:Need the information inputted For apple when, then prompt message be fruit.
When the first encryption data is consistent with the first encryption information, the first display unit 15 shows unique identities password;When When first encryption data is inconsistent with the second encryption information, the first display unit 15 does not show unique identities password then.
As shown in fig. 7, raw information and unique identities password are encrypted by the second encrypting module 17, and by defeated The mode for entering cryptographic keys is encrypted, and exports the second encryption data, while matching ciphertext data and being uploaded to master control end 3 are held, is used to input decryption key in the second input unit 19.
When decryption key is consistent with ciphertext data, the second display unit 20 is for showing that raw information and unique identities are close Code;When decryption key and ciphertext data are inconsistent, the second display unit 20 does not show raw information and unique identities password.
Second encrypting module 17 is encrypted using MD5, and statistical module 21 examines the character length of decryption key It surveys, and exports statistical information, and be preset with statistical data in main control terminal 3, the character length phase of statistical data and ciphertext data It is corresponding.
When statistical data is consistent with statistical information, main control terminal 3 is without alarm;When statistical data and statistical information not When consistent, main control terminal 3 is alerted.To be warned to user.
As shown in figure 8, output has two-dimension code pattern in main control terminal 3, and two-dimension code pattern is read out for user terminal 7, User terminal 7 is decoded by decoder module 8, and to the second encryption data of output, the second encryption data passes through the second decryption mould Block 18 is decrypted, and exports raw information and unique identity information.
When decoder module 8 is by 18 obtained raw information of the second deciphering module, and in raw information acquisition module 5 Raw information is consistent, while the unique identities password that decoder module 8 obtains, with the unique identities in identity information acquisition module 4 When password is consistent, 7 voice broadcast Crypted password of user terminal to raw information and product data, and in being carried out on user terminal 7 It shows raw information and product data, while counting module 10 adds up present scan, and shows scanning times, and the date Reminding module 11 is for showing the first scan date.
When decoder module 8 is by 18 obtained raw information of the second deciphering module, and in raw information acquisition module 5 Raw information is inconsistent or decoder module 8 is by 18 obtained unique identities password of the second deciphering module, is adopted with identity information Collect unique identities password in module 4 it is inconsistent when, user terminal 7 carries out phonic warning, and in carrying out display alarm on user terminal 7 Content, counting module 10 is without counting, while date prompt module 11 also and carries out date display.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, people in the art Member can as needed make the present embodiment the modification of not creative contribution after reading this specification, but as long as at this It is all protected by Patent Law in the right of invention.

Claims (10)

1. a kind of product false proof verification method based on Quick Response Code, characterized in that include two for encrypting and being identified for user Tie up code generation module (1), for correct Quick Response Code read module (2) to be read out and judged whether to Quick Response Code;
The two-dimensional code generation module (1) includes the following steps:
S1, two-dimensional code data library is established;
Product data and the corresponding product coding of Quick Response Code are made required for S2, generation and are uploaded in two-dimensional code data library, And the unique identities password of each product data representative products, unique identities password is encrypted and is formed according to Encryption Algorithm Crypted password is simultaneously stored in encrypting database;
S3, the raw information for extracting product are simultaneously uploaded to original information data library;
S4, middle Crypted password is transferred from encrypting database again and the unique identities password of product is obtained according to decipherment algorithm, one Crypted password only extracts once;
S5, operation is encrypted with md5 encryption key in the raw information of product and the Crypted password of extraction, obtains one at random Encryption data;
S6, the encryption data is encoded, generates the two-dimension code pattern of a product;
S7, the two-dimension code pattern of product coding and product is printed respectively on a product;
The Quick Response Code read module (2) includes the following steps:
P1, the two-dimension code pattern being printed upon on product is read with Smartphone device;
P2, the two-dimension code pattern is decoded, obtains the encryption number of the product information carried in two-dimension code pattern and character string According to;
P3, operation is decrypted with MD5 decruption keys to the encryption data, raw information and the unique identities for obtaining product are close Code, and compared with original information data library and encrypting database;
P4, comparison result is reported by smart mobile phone voice broadcasting system.
2. system is verified in a kind of product false proof based on Quick Response Code, characterized in that including:
Main control terminal (3) is stored and is handled for data;
Identity information acquisition module (4) is connect with main control terminal (3) and for acquiring product data and product coding and generating only One identification cipher;
Raw information acquisition module (5) connect with main control terminal (3) and is used to acquire the raw information of product;
Coding module (6) is connect with main control terminal (3) and for being integrated raw information and unique identities password and simulating two Tie up code figure;
User terminal (7) is connect with main control terminal (3) for being scanned to two-dimension code pattern;
Decoder module (8), connect with user terminal (7) and for two-dimension code pattern is decoded with obtain raw information and uniquely Identification cipher;
Checking module (9) connect with user terminal (7) and is compared with raw information and unique identities password to judge the true and false;
When the raw information that decoder module (8) obtains is consistent with the raw information in raw information acquisition module (5), decode simultaneously When the unique identities password that module (8) obtains is consistent with the unique identities password in identity information acquisition module (4), the user Hold (7) voice broadcast Crypted password to raw information and product data, and in carrying out display raw information on user terminal (7) And product data;
When the raw information that decoder module (8) obtains and the raw information in raw information acquisition module (5) are inconsistent, or decoding When unique identities password in unique identities password and identity information acquisition module (4) that module (8) obtains is inconsistent, the use Family end (7) phonic warning, and in progress display alarm content on user terminal (7).
3. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include being used for User terminal (7) is received to the scanning times of two-dimension code pattern and is uploaded to the counting module (10) of main control terminal (3);
When user terminal (7) are scanned, and when in the raw information and raw information acquisition module (5) that decoder module (8) obtains Raw information is consistent, while the obtained unique identities password of decoder module (8) and unique body in identity information acquisition module (4) When part password is consistent, scanning times are shown on the user terminal (7);Conversely, not showing.
4. system is verified in a kind of product false proof based on Quick Response Code according to claim 3, it is characterized in that:Further include and master Control terminal (3) connects and is used to show the date prompt module (11) on the date of first time contrast scans;
When user terminal (7) are scanned, and when in the raw information and raw information acquisition module (5) that decoder module (8) obtains Raw information is consistent, while the obtained unique identities password of decoder module (8) and unique body in identity information acquisition module (4) When part password is consistent, show date content on the date prompt module (11) and user terminal (7);Conversely, not showing.
5. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include:
First encrypting module (12) is connect with main control terminal (3) and for inputting the first encryption data and for unique identities Password is encrypted and is uploaded to main control terminal (3);
First deciphering module (13), connect with main control terminal (3) for the first encryption information input and in main control terminal (3) First encryption data is compared to obtain unique identities password;
When the first encryption data is consistent with the first coded signal, unique identities password is obtained;Conversely, not obtaining.
6. system is verified in a kind of product false proof based on Quick Response Code according to claim 5, it is characterized in that:First solution Close module (13) includes:
First input unit (14) inputs the first encryption information for user;
First display unit (15), for showing unique identities password.
7. system is verified in a kind of product false proof based on Quick Response Code according to claim 6, it is characterized in that:Further include and master Control terminal (3) connects and the prompt unit (16) for being prompted the input content of the first input unit (14), the master Control terminal is preset with the prompt message opposite with the first encryption data in (3).
8. system is verified in a kind of product false proof based on Quick Response Code according to claim 2, it is characterized in that:Further include:
Second encrypting module (17) is connect with main control terminal (3) to receive raw information and unique identities password and input encryption Secret key is encrypted and obtains the second encryption data;
The coding module (6) is to receive the second encryption data and simulate two-dimension code pattern, and the decoder module (8) is to two dimension Code figure is decoded to obtain the second encryption data;
Second deciphering module (18), and user terminal (7) connection input decryption key corresponding with the second encryption data to obtain original Beginning information and unique identities password;
It is preset with ciphertext data corresponding with cryptographic keys, the decryption key when input and decryption in the main control terminal (3) When data are consistent, raw information and unique identities password are obtained;Conversely, not obtaining.
9. system is verified in a kind of product false proof based on Quick Response Code according to claim 8, it is characterized in that:Second solution Close module (18) includes:
Second input unit (19) inputs decryption key for user;
Second display unit (20), for showing raw information and unique identities password.
10. system is verified in a kind of product false proof based on Quick Response Code according to claim 9, it is characterized in that:Further include with Main control terminal (3) connects and for being counted to the character length of decryption key to export the statistical module of statistical information (21), it is preset with the statistical data consistent with the character length of ciphertext data in the main control terminal (3);
When statistical data and statistical information are inconsistent, the main control terminal (3) is to realize alarm;Conversely, not alerting.
CN201810339468.1A 2018-04-16 2018-04-16 A kind of product false proof verification method and its system based on Quick Response Code Pending CN108334919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810339468.1A CN108334919A (en) 2018-04-16 2018-04-16 A kind of product false proof verification method and its system based on Quick Response Code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810339468.1A CN108334919A (en) 2018-04-16 2018-04-16 A kind of product false proof verification method and its system based on Quick Response Code

Publications (1)

Publication Number Publication Date
CN108334919A true CN108334919A (en) 2018-07-27

Family

ID=62933449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810339468.1A Pending CN108334919A (en) 2018-04-16 2018-04-16 A kind of product false proof verification method and its system based on Quick Response Code

Country Status (1)

Country Link
CN (1) CN108334919A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344654A (en) * 2018-11-12 2019-02-15 金思成 A kind of two dimensional code training clothes information encryption identifying system
CN111783917A (en) * 2020-07-01 2020-10-16 南京踢扑网络科技有限公司 Encrypted two-dimensional code with tracing and anti-counterfeiting functions
CN111882332A (en) * 2020-07-31 2020-11-03 浙江水晶光电科技股份有限公司 Information verification method and device
GB2585107A (en) * 2019-06-27 2020-12-30 Chinapps Ltd Method, device, terminal apparatus and storage medium for product authentication
CN113312534A (en) * 2021-05-28 2021-08-27 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930440A (en) * 2012-09-13 2013-02-13 王清万 Method for preventing and distinguishing fake products by using internet and two-dimension codes
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN105205674A (en) * 2015-09-08 2015-12-30 云南省通海正华印刷有限公司 Product anti-counterfeiting method based on two-dimensional code
CN107590669A (en) * 2017-10-11 2018-01-16 覃和平 A kind of combined ciphering joint supervision method for anti-counterfeit of Quick Response Code
CN107798546A (en) * 2017-11-07 2018-03-13 王清萍 Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930440A (en) * 2012-09-13 2013-02-13 王清万 Method for preventing and distinguishing fake products by using internet and two-dimension codes
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN105205674A (en) * 2015-09-08 2015-12-30 云南省通海正华印刷有限公司 Product anti-counterfeiting method based on two-dimensional code
CN107590669A (en) * 2017-10-11 2018-01-16 覃和平 A kind of combined ciphering joint supervision method for anti-counterfeit of Quick Response Code
CN107798546A (en) * 2017-11-07 2018-03-13 王清萍 Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344654A (en) * 2018-11-12 2019-02-15 金思成 A kind of two dimensional code training clothes information encryption identifying system
CN109344654B (en) * 2018-11-12 2021-11-19 金成思 Two-dimensional code training clothes information encryption and identification system
GB2585107A (en) * 2019-06-27 2020-12-30 Chinapps Ltd Method, device, terminal apparatus and storage medium for product authentication
CN111783917A (en) * 2020-07-01 2020-10-16 南京踢扑网络科技有限公司 Encrypted two-dimensional code with tracing and anti-counterfeiting functions
CN111783917B (en) * 2020-07-01 2022-09-13 南京踢扑网络科技有限公司 Encrypted two-dimensional code with tracing and anti-counterfeiting functions
CN111882332A (en) * 2020-07-31 2020-11-03 浙江水晶光电科技股份有限公司 Information verification method and device
CN113312534A (en) * 2021-05-28 2021-08-27 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform
CN113312534B (en) * 2021-05-28 2022-08-05 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform

Similar Documents

Publication Publication Date Title
CN108334919A (en) A kind of product false proof verification method and its system based on Quick Response Code
CN107194449B (en) Printing anti-counterfeiting and information tracing method based on combination of digital watermark and two-dimensional code
CN106452756B (en) Can the safe Quick Response Code construction verification method of off-line verification and device
US8249350B2 (en) Brand protection and product autentication using portable devices
CN100530253C (en) System and method of authenticating an article
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
CN105099712B (en) A kind of data ciphering method based on Dicode verification
CN101201886B (en) Three-he-code method for recognizing commodity
CN111639734B (en) Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code
CN113627958B (en) NFC anti-counterfeiting tracing method and server
CN104268610B (en) One kind classification QR code generating methods and read method
US20120290841A1 (en) Unique identifier, method for providing the unique identifier and use of the unique identifier
CN102270294A (en) Bar code and two-dimension code hybrid coding and decoding methods and devices
CN108154208B (en) Article identification method, article identification method and article identification system based on two-dimensional code
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
CN103886469A (en) Product two-dimension code generation and query system
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN103489086A (en) Authority control system and method of logistics information
CN109615402A (en) Product quality back-tracing anti-fake system based on block chain technology
CN104574119B (en) A kind of method that commodity Jianzhen traces to the source
CN105373933A (en) Food circulation traceability method based on electronic inspection report
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN104680392A (en) Identity-based product tracing system and method
CN104899751A (en) Method for identifying cigarette authenticity based on self-encrypted self-checking two-dimensional code
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180727

RJ01 Rejection of invention patent application after publication