CN102202051A - Credible two-dimensional code system and application method thereof - Google Patents
Credible two-dimensional code system and application method thereof Download PDFInfo
- Publication number
- CN102202051A CN102202051A CN2011100865826A CN201110086582A CN102202051A CN 102202051 A CN102202051 A CN 102202051A CN 2011100865826 A CN2011100865826 A CN 2011100865826A CN 201110086582 A CN201110086582 A CN 201110086582A CN 102202051 A CN102202051 A CN 102202051A
- Authority
- CN
- China
- Prior art keywords
- dimension code
- information
- encrypted authentication
- special
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a credible two-dimensional code system and an application method thereof. Through an embedded credible two-dimensional code system and an application method thereof, the invention solves the existing problem that a two-dimensional code is easy to counterfeit, ensures integrity, security and confidentiality of the two-dimensional code and develops a new application area of the two-dimensional code used as a data label conventionally, so that the authenticity of two-dimensional code can be checked in all stages of the circulation process, the safety and reliability of the system can be ensured and the phenomenon of counterfeit can be prevented, thereby realizing a safe and effective supervision on products, certificates and bills and the like.
Description
Technical field
The present invention relates to a kind of trusted methods of two-dimension code, relate in particular to a kind of credible 2 D code system and application process thereof.
Background technology
Two-dimension code now has been widely used in fields such as public safety, communications and transportation, the tax, health care, industry, commerce, finance, customs and governability owing to the distinguishing feature that contains much information, use cost is low.In the process of circulation, two-dimension code is exposed in the market all the time, and it is very important that its information integrity, fail safe and confidentiality just seem.But because low, the technology publicity of two-dimension code cost, the incident of making the two-dimension code of personation emerges in an endless stream, and bills such as train ticket, tax invoice have just brought into use two-dimension code to indicate, and just finds the personation bill.
This just needs a safe and reliable 2 D code system and application process, and the safety of assurance 2 D code information and complete realizes false proof and monitoring, guarantees that two-dimension code can not pretended to be.
Summary of the invention
The object of the present invention is to provide a kind of credible 2 D code system and application process thereof.
A kind of credible 2 D code system, described system comprises:
Special-purpose read-write terminal, general reading terminals and cloud data terminal;
Described special-purpose read-write terminal comprises two-dimensional code generation module and encrypted authentication module for embedding the two-dimension code read-write terminal of special algorithm; Be used to read 2 D code information, read two-dimension code encrypted authentication sign indicating number, check encrypted authentication sign indicating number legitimacy, add average information, 2 D code information logic determines and generate new encrypted authentication sign indicating number;
Described two-dimensional code generation module is used for generating corresponding two-dimension code according to individual information and end message;
Described encrypted authentication module uses cryptographic algorithm to calculate the corresponding encrypted authentication sign indicating number of generation according to individual information and end message, and verifies described encrypted authentication sign indicating number according to verification algorithm;
Described general reading terminals is the terminal equipment that two-dimension code identification software and band camera are installed, and is used to read two-dimension code, obtains the individual information in the two-dimension code;
Described cloud data terminal is Web server and SMS port network data server, is used to receive the checking sequence number that two-dimension code that the user sends carries, and obtains corresponding details or authentication to described database, sends back to the user;
Described checking sequence number is the individual unique identification information that carries in the two-dimension code.
Described individual information comprises product vendor's information, product distribution merchant information, product original producton location information, product weight, time of making the product information, keeping life, batch number and product total quantity information; Sales outlet information, the term of validity, applying unit or the personal information of certificate, bill, the amount of money, the unit of sending, recruiting unit, send time, specification, toward ground return; People or unit information etc. under the certificate term of validity, reviewing authority's information, certificate, and the checking sequence number that produces by above-mentioned information;
Described end message comprises the specification of equipment of special-purpose read-write terminal, additional msu message, security control information.
Submit the checking sequence number that comprises in the two-dimension code by Internet visit Web server or by portable terminal to cloud data terminals such as short message port servers, described cloud data terminal obtains and returns individual information, authentication situation, the audit situation of relative articles such as the pairing product of described sequence number, certificate, bill again from described data server.
The embedded encrypted authentication algorithm of described special-purpose read-write terminal is used for directly reading described two-dimension code, and according to the information and the encrypted authentication sign indicating number of described two-dimension code two-dimension code is verified.
Described encrypted authentication sign indicating number is used for two-dimension code is discerned checking, and described checking sequence number is the individual unique identification information that carries in the two-dimension code.
Described general reading terminals is consulted two-dimension code on article or the packing with after obtaining individual information and authentication, obtains corresponding details and carries out authentication to the cloud data terminal by communication network.
A kind of believable two-dimension code application process may further comprise the steps:
(1) supplier gives devolution with product, certificate or bill and special-purpose read-write terminal supply of equipment;
(2) after devolution obtains product, certificate or bill, use that special-purpose read-write terminal will be distributed accordingly, sold, individual information and end message in the review process, cryptographic algorithm by the inside embedding, generate a two-dimension code that comprises the encrypted authentication sign indicating number, and with two-dimension code print to respective articles or the packing on, enter next step then;
(3) two-dimension code on article or the packing is consulted to obtain individual information and authentication by general reading terminals in product, certificate or the bill field that circulates;
(4) use special-purpose read-write terminal in any step of the field of circulation, to verify the legitimacy of this two-dimension code content, inside encrypted authentication algorithm according to special-purpose read-write terminal is verified encrypted authentication sign indicating number and individual information in the current two-dimension code, determines whether it is legal;
(5) if current two-dimension code is illegal, then current devolution reports an error to higher level department.
A kind of believable two-dimension code application process may further comprise the steps:
S1 supplier gives devolution with product, certificate or bill and special-purpose read-write terminal supply of equipment;
After the S2 devolution obtains product, certificate or bill, use that special-purpose read-write terminal will be distributed accordingly, sold, individual information and end message in the review process, cryptographic algorithm by the inside embedding, generate a two-dimension code that comprises the encrypted authentication sign indicating number, and with two-dimension code print to respective articles or the packing on, enter next step then;
S3 product, certificate or the bill field that circulates, use described general reading terminals to consult two-dimension code on article or the packing, obtain corresponding details and carry out authentication to the cloud data terminal by communication network with after obtaining individual information and authentication;
S4 uses special-purpose read-write terminal to verify the legitimacy of this two-dimension code content in any step of the field of circulation, inside encrypted authentication algorithm according to special-purpose read-write terminal is verified encrypted authentication sign indicating number and individual information in the current two-dimension code, determines whether it is legal;
If the current two-dimension code of S5 is illegal, then current devolution reports an error to higher level department.
The relative prior art of the present invention has the following advantages:
Compared with prior art, the present invention has solved the easily problem of personation of existing two-dimension code by the 2 D code system that embeds the native system and methods for using them, integrality, fail safe and the confidentiality of two-dimension code have been guaranteed, make two-dimension code each link in the process of circulation, can both check the true and false of two-dimension code, to guarantee the safe and reliable of system, take precautions against the personation phenomenon, realize safe and effective supervision product, certificate, bill etc.
Description of drawings
Fig. 1 is the composition system type schematic diagram of a kind of credible 2 D code system of the present invention;
Fig. 2 is the flow chart of a kind of credible two-dimension code application process of the present invention;
Fig. 3 is the instance graph of the present invention in tax invoice is used;
Fig. 4 is the instance graph of the present invention in train ticket is used;
Fig. 5 is the instance graph of the present invention in the vehicle examination is used;
Fig. 6 is the instance graph of the present invention in sale of ticket is used;
Fig. 7 is the instance graph of the present invention in production marketing is used.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
Fig. 1 to Fig. 7 shows the system configuration and the flow process signal of credible 2 D code system of the present invention and application process thereof, and native system comprises as the lower part:
1. cloud data terminal
The cloud data terminal comprises network data services devices such as Web server and SMS port, wherein database server comprises the various individual informations of product, certificate, bill, by these individual informations, the end user can understand the significant process and the data of process of producing product, the term of validity of certificate, bill, applying unit or personal information, the amount of money, the unit of sending, recruiting unit, sends information such as time.Web server, SMS port server are disposed voluntarily by supplier or functional government departments, if end user, devolution or supervision department etc. want to understand the individual information of product that record is stored in database server, certificate, bill, can visit Web server or submit the checking sequence number to and send to database server to the SMS port server by Internet by portable terminal (mobile phone), database server returns to the user with other detailed information of corresponding product again, so that user inquiring is checked.
2. special-purpose read-write terminal
This special use read-write terminal can be to be with the hand-held all-in-one of camera, printer, keyboard, liquid crystal display screen etc. or on hand-held PDA or embedded system device, to add input-output apparatus such as camera, printer.The inner embedding of this read-write terminal has the encrypted authentication algorithm, end message during use, reads image in 2 D code and identifies wherein information, cooperate end message that the information in the two-dimension code is verified comparison by the encrypted authentication algorithm, determine the legitimacy of this two-dimension code.This two-dimension code read-write terminal can use by off-line, also can connect on computers and use as peripheral hardware.This special use read-write terminal is provided by supplier or relevant government department, and adopts the mechanism of periodic auditing to guarantee its reliability.Special-purpose read-write terminal also can need to save printing function, constitutes special-purpose reading terminals;
3. general reading terminals
General reading terminals refers to be equipped with the terminal equipment of two-dimension code identification software and band camera, as common PDA, mobile phone etc., is used to read two-dimension code, thereby obtains individual information in the two-dimension code etc.; Obtain corresponding details by communication network to the cloud data terminal, perhaps authentication etc.;
4. two-dimensional code generation module
The two-dimension code system has the hundreds of kind at present, commonly used also has tens kinds, and that lists national standard, international standard in mainly contains QRcode, PDF417, Chinese letter co etc., and the present invention can adopt the existing two-dimensional sign indicating number to generate software, also can design two-dimension code voluntarily and generate software, generate different two-dimension codes.
5. encrypted authentication module
This module is equipped with the encrypted authentication algorithm, embed special-purpose read-write terminal inside, be used in the process of circulation, prevent imitation, counterfeit behavior, comprise cryptographic algorithm and verification algorithm, whether correct cryptographic algorithm wherein is used for generating corresponding encrypted authentication sign indicating number according to individual information and end message, and verification algorithm is then according to the legitimacy of individual information and end message authenticate reverse encrypted authentication sign indicating number, be exactly conversion relation the process between authorization information and the encrypted authentication sign indicating number in fact.Adopt following formula form:
H1(X1,X2)=?H2(X3),
Wherein, H1 is a cryptographic algorithm, and H2 is a verification algorithm, and X1 is an individual information, and X2 is an end message, and X3 is the encrypted authentication sign indicating number
For the devolution that has obtained special-purpose read-write terminal equipment, this encrypted authentication algorithm is built in this two-dimension code read-write equipment.
This method comprises the steps:
Step 1: supplier is supplied to devolution with relative articles such as product, certificate, bills, distributes corresponding special-purpose read-write terminal equipment simultaneously and gives devolution.Encrypted authentication sign indicating number wherein passes through cryptographic algorithm, cooperating built-in end message of special-purpose read-write terminal and individual information to calculate generates, cryptographic algorithm can guarantee to have only effective devolution just can produce and print legal two-dimension code in the process of distributing, selling, examining, and perhaps is called the two-dimension code figure.The code system of two-dimension code used herein can be various Open Standards, for example PDF417, Chinese letter co, GM sign indicating number, CM sign indicating number, Datamatrix sign indicating number or QRcode sign indicating number, but be not limited to the above-mentioned type.
Step 2: devolution carry out next step distribution, sell, audit etc.: with individual information and end message, generate the encrypted authentication sign indicating number, print the two-dimension code that generates to corresponding article, perhaps on the packing by special-purpose read-write terminal by cryptographic algorithm.Special-purpose read-write terminal equipment comprises following function: the function that reads 2 D code information, check encrypted authentication sign indicating number legitimacy, the average information of adding, infologic arbitration functions, generation encrypted authentication sign indicating number, printing two-dimension code; These two-dimension code read-write equipments can be to be with the terminal equipment of camera, printer, keyboard, liquid crystal display screen etc. or on hand-held PDA or embedded system device, to add input-output apparatus such as camera, printer.
Step 3: devolution or related check controlling unit can use special-purpose read-write terminal to read 2 D code information in the field of circulation, verify its legitimacy, do not conform to rule and stop to distribute, selling, examine, and also can report an error to higher level department simultaneously.If source, identity legal then that proof is individual are correct, can continue circulation.
The process of encrypted authentication is as follows:
The encrypted authentication module is verified encrypted authentication sign indicating number and individual information in the current two-dimension code according to inner encrypted authentication algorithm, if the encrypted authentication algorithm equations is set up, illustrate that then this two-dimension code is legal, otherwise this two-dimension code is illegal.Terminal inner encrypted authentication algorithmic formula is encrypted in described identification: H1(X1, X2)=H2(X3), wherein, H1 is a cryptographic algorithm, and H2 is a verification algorithm, and H 1 and H 2 all can adopt existing encryption/decryption algorithm, also can design voluntarily, X1 is an individual information, and X2 is an end message, and X3 is the encrypted authentication sign indicating number; Cryptographic algorithm and verification algorithm all are built in described identification and encrypt terminal inner, and are distributed to devolution and used by supplier, relevant functional government departments; End message is meant the specification of institute's special-purpose terminal, additional msu message, security control information etc.This terminal needs supplier, the periodic auditing of relevant functional government departments, just can continue use.
Step 4: the consumer can use the reading terminals such as the mobile phone of band camera, equipment such as common PDA, these general reading terminals need to be equipped with the software that reads 2 D code information that obtains from the communication operator or download from other channels simultaneously, promptly can read the two-dimension code on the corresponding individuality, obtain product, certificate, the individual information of bill etc., reading unit reads two-dimension code on article or the packing to obtain identifying information and checking identifying information, the checking identifying information that transmits described two-dimension code by communication network is discerned checking to described cloud data terminal module;
In above-mentioned flow process, if consumer or devolution, relevant functional department of government, related check controlling unit etc. want to understand the details that record is stored in intermediate server, then can visit Web server or submit to the checking sequence number to obtain detailed information to methods such as short message port servers by Internet from the correspondence database server by portable terminal (mobile phone).
Embodiments of the present invention are not limited thereto; under the above-mentioned basic fundamental thought of the present invention prerequisite;, all drop within the rights protection scope of the present invention modification, replacement or the change of other various ways that content of the present invention is made according to the ordinary skill knowledge of this area and customary means.
Claims (9)
1. a credible 2 D code system is characterized in that, described system comprises:
Special-purpose read-write terminal, general reading terminals and cloud data terminal;
Described special-purpose read-write terminal comprises two-dimensional code generation module and encrypted authentication module for embedding the two-dimension code read-write terminal of special algorithm; Be used to read 2 D code information, read two-dimension code encrypted authentication sign indicating number, check encrypted authentication sign indicating number legitimacy, add average information, 2 D code information logic determines and generate new encrypted authentication sign indicating number;
Described two-dimensional code generation module is used for generating corresponding two-dimension code according to individual information and end message;
Described encrypted authentication module uses cryptographic algorithm to calculate the corresponding encrypted authentication sign indicating number of generation according to individual information and end message, and verifies described encrypted authentication sign indicating number according to verification algorithm;
Described general reading terminals is the terminal equipment that two-dimension code identification software and band camera are installed, and is used to read two-dimension code, obtains the individual information in the two-dimension code;
Described cloud data terminal is Web server and SMS port network data server, is used to receive the checking sequence number that two-dimension code that the user sends carries, and obtains corresponding details or authentication to described database, sends back to the user;
Described checking sequence number is the individual unique identification information that carries in the two-dimension code.
2. credible 2 D code system according to claim 1, it is characterized in that described individual information comprises product vendor's information, product distribution merchant information, product original producton location information, product weight, time of making the product information, keeping life, batch number and product total quantity information; Sales outlet information, the term of validity, applying unit or the personal information of certificate, bill, the amount of money, the unit of sending, recruiting unit, send time, specification, toward ground return; People or unit information etc. under the certificate term of validity, reviewing authority's information, certificate, and the checking sequence number that produces by above-mentioned information;
Described end message comprises the specification of equipment of special-purpose read-write terminal, additional msu message, security control information.
3. credible 2 D code system according to claim 1, it is characterized in that, submit the checking sequence number that comprises in the two-dimension code by Internet visit Web server or by portable terminal to cloud data terminals such as short message port servers, described cloud data terminal obtains and returns individual information, authentication situation, the audit situation of relative articles such as the pairing product of described sequence number, certificate, bill again from described data server.
4. credible 2 D code system according to claim 1 is characterized in that, the embedded encrypted authentication algorithm of described special-purpose read-write terminal is used for directly reading described two-dimension code, and according to the information and the encrypted authentication sign indicating number of described two-dimension code two-dimension code is verified.
5. credible 2 D code system according to claim 1 is characterized in that, described encrypted authentication sign indicating number is used for two-dimension code is discerned checking, and described checking sequence number is the individual unique identification information that carries in the two-dimension code.
6. credible 2 D code system according to claim 1, it is characterized in that, described general reading terminals is consulted two-dimension code on article or the packing with after obtaining individual information and authentication, obtains corresponding details and carries out authentication to the cloud data terminal by communication network.
7. a believable two-dimension code application process is characterized in that, may further comprise the steps:
(1) supplier gives devolution with product, certificate or bill and special-purpose read-write terminal supply of equipment;
(2) after devolution obtains product, certificate or bill, use that special-purpose read-write terminal will be distributed accordingly, sold, individual information and end message in the review process, cryptographic algorithm by the inside embedding, generate a two-dimension code that comprises the encrypted authentication sign indicating number, and with two-dimension code print to respective articles or the packing on, enter next step then;
(3) two-dimension code on article or the packing is consulted to obtain individual information and authentication by general reading terminals in product, certificate or the bill field that circulates;
(4) use special-purpose read-write terminal in any step of the field of circulation, to verify the legitimacy of this two-dimension code content, inside encrypted authentication algorithm according to special-purpose read-write terminal is verified encrypted authentication sign indicating number and individual information in the current two-dimension code, determines whether it is legal;
(5) if current two-dimension code is illegal, then current devolution reports an error to higher level department.
8. believable two-dimension code application process according to claim 7, it is characterized in that, described encrypted authentication module is verified encrypted authentication sign indicating number and identifying information in the two-dimension code according to inner encrypted authentication algorithm, if the encrypted authentication algorithm equations is set up, then two-dimension code is legal, otherwise this two-dimension code is illegal, and the inner encrypted authentication algorithmic formula of described special-purpose read-write terminal is:
H1(X1,X2)=?H2(X3)
Wherein, H1 is a cryptographic algorithm, and H2 is a verification algorithm, and X1 is an individual information, and X2 is an end message, and X3 is the encrypted authentication sign indicating number; Described cryptographic algorithm and verification algorithm all are built in described special-purpose read-write terminal inside, and distribute to devolution by supplier and use.
9. a believable two-dimension code application process is characterized in that, may further comprise the steps:
S1 supplier gives devolution with product, certificate or bill and special-purpose read-write terminal supply of equipment;
After the S2 devolution obtains product, certificate or bill, use that special-purpose read-write terminal will be distributed accordingly, sold, individual information and end message in the review process, cryptographic algorithm by the inside embedding, generate a two-dimension code that comprises the encrypted authentication sign indicating number, and with two-dimension code print to respective articles or the packing on, enter next step then;
S3 product, certificate or the bill field that circulates, use described general reading terminals to consult two-dimension code on article or the packing, obtain corresponding details and carry out authentication to the cloud data terminal by communication network with after obtaining individual information and authentication;
S4 uses special-purpose read-write terminal to verify the legitimacy of this two-dimension code content in any step of the field of circulation, inside encrypted authentication algorithm according to special-purpose read-write terminal is verified encrypted authentication sign indicating number and individual information in the current two-dimension code, determines whether it is legal;
If the current two-dimension code of S5 is illegal, then current devolution reports an error to higher level department.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100865826A CN102202051A (en) | 2011-04-07 | 2011-04-07 | Credible two-dimensional code system and application method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100865826A CN102202051A (en) | 2011-04-07 | 2011-04-07 | Credible two-dimensional code system and application method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102202051A true CN102202051A (en) | 2011-09-28 |
Family
ID=44662446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100865826A Pending CN102202051A (en) | 2011-04-07 | 2011-04-07 | Credible two-dimensional code system and application method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102202051A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546174A (en) * | 2011-12-20 | 2012-07-04 | 贾松仁 | Two-dimensional code encryption/decryption method and anti-counterfeiting method |
CN102622823A (en) * | 2012-03-29 | 2012-08-01 | 华南农业大学 | Safe invoice system and realization method thereof |
CN102968718A (en) * | 2012-11-13 | 2013-03-13 | 江苏乐买到网络科技有限公司 | Mobile payment method |
CN103065244A (en) * | 2011-10-18 | 2013-04-24 | 杨筑平 | Two-dimensional barcode anti-counterfeiting, checking and service method |
CN103139223A (en) * | 2013-03-22 | 2013-06-05 | 北京我遥我控科技有限公司 | Data verification method, client-side and server based on network |
CN103514670A (en) * | 2012-06-25 | 2014-01-15 | 航天信息股份有限公司 | Tax-control inventory anti-counterfeiting system and method |
CN104184773A (en) * | 2013-05-24 | 2014-12-03 | 深圳市明之阳科技有限公司 | Data download method and system |
CN104239792A (en) * | 2013-06-21 | 2014-12-24 | 广州杰赛科技股份有限公司 | Cloud-based two-dimension code safety protecting method and device |
CN104517042A (en) * | 2013-09-29 | 2015-04-15 | 北京行的科技有限公司 | Use authority method and device of intelligent interactive toys |
CN106330286A (en) * | 2016-08-30 | 2017-01-11 | 西安小光子网络科技有限公司 | Relay transmission method of optical label |
CN106712934A (en) * | 2016-12-01 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identification information generation method and device |
CN107644343A (en) * | 2017-09-28 | 2018-01-30 | 贵州财大鼎新科创产业有限公司 | Article anti-counterfeit detection method and device based on Quick Response Code |
WO2018086515A1 (en) * | 2016-11-08 | 2018-05-17 | 王栋 | Verification construction method and device capable of offline verification of safety information tag |
CN108629216A (en) * | 2014-05-26 | 2018-10-09 | 阿里巴巴集团控股有限公司 | A kind of verification method of DOI, device and system |
CN109376818A (en) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | A kind of encryption time synchronization method based on offline dynamic two-dimension code |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006174232A (en) * | 2004-12-17 | 2006-06-29 | Nikon Corp | Communication terminal, electronic camera and method of providing electronic equipment information |
US20080183576A1 (en) * | 2007-01-30 | 2008-07-31 | Sang Hun Kim | Mobile service system and method using two-dimensional coupon code |
KR100878854B1 (en) * | 2007-05-29 | 2009-01-15 | (주) 애니모비 | System and method for a mobile service using 2-dimension coupon code |
CN101807241A (en) * | 2010-03-17 | 2010-08-18 | 四川创立信息科技有限责任公司 | Cloud computing-based mobile terminal barcode recognition method |
CN201573393U (en) * | 2009-11-25 | 2010-09-08 | 福建鸿博印刷股份有限公司 | Anti-counterfeiting printing system applied to rolled thermosensitive products |
JP4576160B2 (en) * | 2004-05-31 | 2010-11-04 | 株式会社サトー | Tag issue system and tag issue method |
-
2011
- 2011-04-07 CN CN2011100865826A patent/CN102202051A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4576160B2 (en) * | 2004-05-31 | 2010-11-04 | 株式会社サトー | Tag issue system and tag issue method |
JP2006174232A (en) * | 2004-12-17 | 2006-06-29 | Nikon Corp | Communication terminal, electronic camera and method of providing electronic equipment information |
US20080183576A1 (en) * | 2007-01-30 | 2008-07-31 | Sang Hun Kim | Mobile service system and method using two-dimensional coupon code |
KR100878854B1 (en) * | 2007-05-29 | 2009-01-15 | (주) 애니모비 | System and method for a mobile service using 2-dimension coupon code |
CN201573393U (en) * | 2009-11-25 | 2010-09-08 | 福建鸿博印刷股份有限公司 | Anti-counterfeiting printing system applied to rolled thermosensitive products |
CN101807241A (en) * | 2010-03-17 | 2010-08-18 | 四川创立信息科技有限责任公司 | Cloud computing-based mobile terminal barcode recognition method |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103065244A (en) * | 2011-10-18 | 2013-04-24 | 杨筑平 | Two-dimensional barcode anti-counterfeiting, checking and service method |
CN102546174A (en) * | 2011-12-20 | 2012-07-04 | 贾松仁 | Two-dimensional code encryption/decryption method and anti-counterfeiting method |
CN102622823A (en) * | 2012-03-29 | 2012-08-01 | 华南农业大学 | Safe invoice system and realization method thereof |
CN103514670A (en) * | 2012-06-25 | 2014-01-15 | 航天信息股份有限公司 | Tax-control inventory anti-counterfeiting system and method |
CN103514670B (en) * | 2012-06-25 | 2016-05-18 | 航天信息股份有限公司 | Tax control inventory Antiforge system and method |
CN102968718A (en) * | 2012-11-13 | 2013-03-13 | 江苏乐买到网络科技有限公司 | Mobile payment method |
CN103139223A (en) * | 2013-03-22 | 2013-06-05 | 北京我遥我控科技有限公司 | Data verification method, client-side and server based on network |
CN104184773A (en) * | 2013-05-24 | 2014-12-03 | 深圳市明之阳科技有限公司 | Data download method and system |
CN104184773B (en) * | 2013-05-24 | 2019-08-30 | 深圳市明之阳科技有限公司 | A kind of data download method and system |
CN104239792A (en) * | 2013-06-21 | 2014-12-24 | 广州杰赛科技股份有限公司 | Cloud-based two-dimension code safety protecting method and device |
CN104517042B (en) * | 2013-09-29 | 2017-09-29 | 北京行的科技有限公司 | The use authorization method and device of a kind of intelligent interaction type toy |
CN104517042A (en) * | 2013-09-29 | 2015-04-15 | 北京行的科技有限公司 | Use authority method and device of intelligent interactive toys |
CN108629216A (en) * | 2014-05-26 | 2018-10-09 | 阿里巴巴集团控股有限公司 | A kind of verification method of DOI, device and system |
CN108629216B (en) * | 2014-05-26 | 2021-02-05 | 创新先进技术有限公司 | DOI verification method, device and system |
CN106330286A (en) * | 2016-08-30 | 2017-01-11 | 西安小光子网络科技有限公司 | Relay transmission method of optical label |
CN106330286B (en) * | 2016-08-30 | 2020-01-31 | 西安小光子网络科技有限公司 | Relay transmission method for optical labels |
WO2018086515A1 (en) * | 2016-11-08 | 2018-05-17 | 王栋 | Verification construction method and device capable of offline verification of safety information tag |
CN106712934A (en) * | 2016-12-01 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identification information generation method and device |
CN107644343A (en) * | 2017-09-28 | 2018-01-30 | 贵州财大鼎新科创产业有限公司 | Article anti-counterfeit detection method and device based on Quick Response Code |
CN109376818A (en) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | A kind of encryption time synchronization method based on offline dynamic two-dimension code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102202051A (en) | Credible two-dimensional code system and application method thereof | |
US10387695B2 (en) | Authenticating and managing item ownership and authenticity | |
US9818113B2 (en) | Payment method using one-time card information | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
CN106452756A (en) | Construction verification method and device capable of verifying security two-dimensional code offline | |
CN101236677B (en) | False proof and false proof tax control integrated system for commodity product | |
CN105027153A (en) | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data | |
RU2485590C1 (en) | Internet-based commodity turnover monitoring method | |
CN107430755A (en) | The encrypted authentication in source in supply chain | |
CN107431622A (en) | The blocking tracking in supply chain occurs | |
CN103460230A (en) | Method and apparatus for marking manufactured items | |
CN102270294A (en) | Bar code and two-dimension code hybrid coding and decoding methods and devices | |
JPWO2003017157A1 (en) | Identification information issuing device and method, authentication device and method, program, and recording medium | |
CN101520865A (en) | Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure | |
CN102855593A (en) | Intelligent mobile terminal electronic guarantee system and method based on same | |
CN101138242A (en) | An interactive television system | |
US11810179B2 (en) | Method for tracking products using distributed, shared registration bases and random numbers generated by quantum processes | |
CN105162607A (en) | Authentication method and system of payment bill voucher | |
CN111630544A (en) | Method and system for controlling distribution of products in computer network | |
CN102156894A (en) | Layered two-dimension code system and application method of layered two-dimension code system | |
CN110942301B (en) | Data processing method and device based on block chain, computer and storage medium | |
CN105321078A (en) | Anti-fake direct purchase system | |
CN110992034A (en) | Supply chain transaction privacy protection system and method based on block chain and related equipment | |
KR20160082100A (en) | Mobile ticket security system and method of based location information and terminal unique number | |
CN111091430A (en) | Billing two-dimensional code processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110928 |