CN106529977A - Anti-counterfeiting method and system with support of terminal memory based on WeChat public account - Google Patents

Anti-counterfeiting method and system with support of terminal memory based on WeChat public account Download PDF

Info

Publication number
CN106529977A
CN106529977A CN201610976744.6A CN201610976744A CN106529977A CN 106529977 A CN106529977 A CN 106529977A CN 201610976744 A CN201610976744 A CN 201610976744A CN 106529977 A CN106529977 A CN 106529977A
Authority
CN
China
Prior art keywords
code
fake
terminal
server
public number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610976744.6A
Other languages
Chinese (zh)
Inventor
蔡昌志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sheng Polytron Technologies Inc
Original Assignee
Shenzhen Sheng Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sheng Polytron Technologies Inc filed Critical Shenzhen Sheng Polytron Technologies Inc
Priority to CN201610976744.6A priority Critical patent/CN106529977A/en
Publication of CN106529977A publication Critical patent/CN106529977A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-counterfeiting method with the support of terminal memory based on a WeChat public account. A terminal submits the anti-counterfeiting information carried by a scanned anti-counterfeiting two-dimensional code to a server, the server carries out legality checking on the anti-counterfeiting two-dimensional code corresponding to the anti-counterfeiting information, when the anti-counterfeiting two-dimensional code is a legal two-dimensional code, the server inquires the merchant public account information corresponding to the anti-counterfeiting two-dimensional code and pushes the merchant public account information to the terminal, a Wechat server is asked to obtain the user token information corresponding to the terminal, and a merchant public account and user information are bonded according to the user token information. The invention also discloses an anti-counterfeiting system with the support of terminal memory based on a WeChat public account, through the method and the system, the waste of server resources can be avoided, the difficulty of input is reduced, and a user experience is improved.

Description

Based on wechat public number and the method for anti-counterfeit and its system of support terminal memory
Technical field
The invention belongs to field of anti-counterfeit technology, and in particular to a kind of false proof with support terminal memory based on wechat public number Method and its system.
Background technology
With the arrival of Internet era, numerous products are spread in a network, in order that the different rule of different type The product of lattice, it is easily identified in communication process, add the anti-dummy string code of unique identification code to have very much to every commodity It is necessary;
Simple security code is easy to be copied, and generated security code is all saved in server end, may cause again to send Most of being not used of code gone causes to waste.
Traditional security code identification, needs to fully enter one by one, and easy input error will also produce communication fee.
The content of the invention
In view of this, present invention is primarily targeted at providing a kind of based on preventing that wechat public number and support terminal are remembered Fake method and its system.
To reach above-mentioned purpose, the technical scheme is that what is be achieved in that:
The embodiment of the present invention provides a kind of method for anti-counterfeit remembered based on wechat public number and support terminal, and the method is:Terminal Anti-counterfeiting information entrained by anti-fake two-dimension code after scanning is submitted to into server, the server is to anti-counterfeiting information correspondence Anti-fake two-dimension code carry out legitimacy verifies, when the anti-fake two-dimension code be legal Quick Response Code when, the server lookup this prevent The corresponding businessman's public number information pushing of pseudo- Quick Response Code to the terminal, and ask wechat server to obtain the terminal-pair should User Token information, businessman's public number and user profile are bound according to the User Token information.
In such scheme, the anti-fake two-dimension code is previously generated by server, the decimal system is converted into 28 first specially and is entered The number of system, described 28 enter to be made as 6 digits, and deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splice after carry out Md5 is encrypted, then the character string of encryption is intercepted out a character, carries out hexdec process to a character of the taking-up, The value of acquisition obtains the incoming md5 encryption strings of algorithm heel and is only dissipated with 8 deliverys, hash algorithm in the remainder correspondence 8 of acquisition Row encryption, takes the character string wherein 4 after encryption and changes into capitalization and return as check code, obtain after check code by password ' 0', ' 1', ' C'} be substituted for ' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally, Combination anti-fake string code, false proof two that the character string that batch code, check code and sequence number are spliced into 14 bit lengths is as generated Dimension code.
In such scheme, the server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, tool Body is:Verify whether the corresponding false proof code length of the anti-fake two-dimension code is 14, the anti-fake two-dimension code is verified when meeting Legitimacy, blocks security code and obtains 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, will decompose 4 batch codes out Legal check code is generated by the generation method for previously generating anti-fake two-dimension code with 6 bit sequence numbers, the legal check code with treat The check code contrast for decomposing out in the anti-fake two-dimension code of checking, if completely the same, the anti-fake two-dimension code is legal two Dimension code, on the contrary then the anti-fake two-dimension code is illegal Quick Response Code.
It is in such scheme, described that businessman's public number and user profile are bound by it according to the User Token information Afterwards, the method also includes:Show the security code true and false and inquiry times, after successfully jumping to businessman's public number, the terminal The obvious position in top completely shows the security code of 14, while from showing that the security code is inquired about in which time inquiry is, if worked as The user of front terminal inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, Then this inquiry record can be recognized when inquired about for next time again and avoid repeat count.
In such scheme, the method also includes:Point out whether the terminal pays close attention to public number, on businessman's public number page after Continuous prompting user concern public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current false proof two When dimension code is scanning for the first time, it may appear that the prompting of prize drawing.
The embodiment of the present invention also provides a kind of Antiforge system remembered based on wechat public number and support terminal, the system bag Include:Anti-fake two-dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
In such scheme, the server enters to be made as specifically for the number that the decimal system is converted into 28 systems first, described 28 6 digits, deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then will encrypt Character string intercepts out a character, carries out hexdec process to a character of the taking-up, and the value of acquisition is obtained with 8 deliverys Hash algorithm in the remainder correspondence 8 for obtaining, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes after encrypting Character string wherein 4 changes into capitalization and returns as check code, obtain after check code by password ' 0', ' 1', ' C'} is substituted for ' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally, combination anti-fake string code, by batch Code, check code and sequence number are spliced into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
In such scheme, the server, specifically for whether verifying the corresponding false proof code length of the anti-fake two-dimension code For 14, the anti-fake two-dimension code legitimacy is verified when meeting, block security code and obtain 4 batch codes, 4 bit checks respectively Code, 6 bit sequence numbers, will decompose 4 batch codes out and 6 bit sequence numbers by previously generating the generation method of anti-fake two-dimension code Generate legal check code, the check code contrast for decomposing out in the legal check code and anti-fake two-dimension code to be verified, if Completely the same, then the anti-fake two-dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
In such scheme, the terminal is additionally operable to show the security code true and false and inquiry times, successfully jumps to the businessman public After number, the obvious position in the top of the terminal completely shows the security code of 14, while from showing that inquiring about the security code is Which time inquiry, if the user of present terminal inquired about the security code, when secondary inquiry will not be added up upwards;If present terminal User inquire about for the first time, then this inquiry record can be recognized when inquired about for next time again and avoid repeat count.
In such scheme, the server is additionally operable to point out whether the terminal pays close attention to public number, businessman's public number page It is upper to continue prompting user's concern public number, complete the precipitation function of user;Point out whether the terminal draws a lottery, if current is anti- When pseudo- Quick Response Code is scanning for the first time, it may appear that the prompting of prize drawing.
Compared with prior art, beneficial effects of the present invention:
Security of the present invention is good, while it also avoid the waste to server resource, reduces input difficulty, improves Consumer's Experience.
Description of the drawings
Fig. 1 provides a kind of flow process of the method for anti-counterfeit remembered based on wechat public number and support terminal for the embodiment of the present invention Figure;
Fig. 2 provides a kind of based on false proof two dimension in wechat public number and the method for anti-counterfeit for supporting terminal to remember for the embodiment of the present invention The product process figure of code.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and It is not used in the restriction present invention.
The embodiment of the present invention provides a kind of method for anti-counterfeit remembered based on wechat public number and support terminal, as shown in figure 1, The method is realized by following steps:
Step 101:Anti-counterfeiting information entrained by anti-fake two-dimension code after scanning is submitted to server by terminal.
Specifically, the anti-fake two-dimension code is previously generated by server, and the decimal system is converted into 28 systems first specially Number, described 28 enter to be made as 6 digits, and deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splice after carry out md5 Encryption, then the character string of encryption is intercepted into out a character, hexdec process is carried out to a character of the taking-up, is obtained Value with 8 deliverys, hash algorithm in the remainder correspondence 8 of acquisition, obtain the incoming md5 encryption strings of algorithm heel only carry out hash plus It is close, take the character string wherein 4 after encryption and change into capitalization and return as check code, obtain { ' the 0', ' in password after check code 1', ' C'} be substituted for { ' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally, combination Anti- dummy string code, the anti-fake two-dimension code that the character string that batch code, check code and sequence number are spliced into 14 bit lengths is as generated.
Specifically, as shown in Fig. 2 the generation method of the anti-fake two-dimension code:
S1:Generate 4 batch codes, batch code is combined and is formed by going here and there random 4 characters for obtaining in the character included by code , its uniqueness is ensured by technological means;According to rule, it is ensured that the combination of 4 can accommodate 614656 it is unduplicated Batch code
S2:6 bit sequence numbers are generated, sequence number is obtained after being arranged by self-defining 28 system number in sequence, Serial No. 6 Position and never repeat;The open ended number of 6 characters is 481890304.
S3:Check code is generated, check code is obtained by algorithm computing by sequence number and batch code;Its digit is 4.
Incoming 4 batch numbers and decimal numeral sequence number, the decimal system is first converted into the number of 28 systems(28 enter to be made as 6 digits, deficiency use 0 polishing), then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then by encryption Character string intercepts out a character, and to character using hexdec process, the value for obtaining is corresponded in 8 with 8 deliverys, the remainder of acquisition Hash algorithm, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption and turns Return as password into capitalization(Check code)Use, obtain after check code using replace by password ' 0', ' 1', ' C'}; Be substituted for ' H', ' K', ' S'};Cover character in 28 system numbers is A(A is substituted for by 0).
S4:Batch code, check code and sequence number are spliced into the character string of 14 bit lengths by combination anti-fake string code
S5:Batch code is stored, if batch code is to generate for the first time, batch code is saved in database, the security code of generation Do not preserve, server resource can be saved.
Step 102:The server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information.
Specifically, the server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, specially: Verify whether the corresponding false proof code length of the anti-fake two-dimension code is 14, the anti-fake two-dimension code is verified when meeting legal Property, block security code and obtain 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, 4 batch codes out and 6 will be decomposed Sequence number generates legal check code by the generation method for previously generating anti-fake two-dimension code, the legal check code with it is to be verified The 6 bit check codes contrast for decomposing out in anti-fake two-dimension code, if completely the same, the anti-fake two-dimension code is legal two dimension Code, because the process for generating check code [S3] is irreversible, cannot inversely derive legitimacy from check code.Otherwise then The anti-fake two-dimension code is illegal Quick Response Code.
Further, 4 batch codes out and 6 bit sequence numbers will be decomposed by previously generating the generation of anti-fake two-dimension code Method generates 6 new bit sequence numbers, specially:Md5 encryptions will be carried out after the sequence number of 28 system numbers and batch number splicing, then will The character string of encryption intercepts out a character, and to character using hexdec process, the value for obtaining is with 8 deliverys, the remainder of acquisition Correspondence 8 in hash algorithm, obtain algorithm heel it is incoming md5 encryption string only carry out hash encryption, take encryption after character string its In 4 change into capitalization return as password(Check code)Use, obtain after check code using replacing { ' the 0', ' in password 1','C'};Be substituted for ' H', ' K', ' S'};Cover character in 28 system numbers is A(A is substituted for by 0).
Step 103:When the anti-fake two-dimension code is legal Quick Response Code, the server lookup anti-fake two-dimension code is corresponding Businessman's public number information pushing to the terminal, and ask wechat server to obtain the corresponding User Token letter of the terminal Businessman's public number is bound with user profile by breath according to the User Token information.
Specifically, it is described according to the User Token information by the binding of businessman's public number and user profile after, should Method also includes:The security code true and false and inquiry times are shown, after successfully jumping to businessman's public number, the top of the terminal shows The position of eye completely shows the security code of 14, while from showing that the security code is inquired about in which time inquiry is, if present terminal User inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, can be by This inquiry record, can recognize when inquired about for next time again and avoid repeat count.
Whether terminal described in the server prompts pays close attention to public number, continues prompting user's concern on businessman's public number page Public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is to sweep for the first time When retouching, it may appear that the prompting of prize drawing.
The embodiment of the present invention also provides a kind of Antiforge system remembered based on wechat public number and support terminal, the system bag Include:Anti-fake two-dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
The server, enters to be made as 6 digits specifically for the number that the decimal system is converted into 28 systems first, described 28, not enough Use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character string of encryption is intercepted Go out a character, hexdec process is carried out to a character of the taking-up, the value of acquisition is with 8 deliverys, the remainder pair of acquisition Hash algorithm in answering 8, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption Position changes into capitalization and returns as check code, obtains { ' 0', ' 1', ' C'} be substituted for { ' H', ' the K', ' in password after check code S'}, the cover character in 28 system numbers are A, 0 will be substituted for A, finally, combination anti-fake string code, by batch code, check code The anti-fake two-dimension code that the character string that 14 bit lengths are spliced into sequence number is as generated.
Whether the server, be 14 specifically for verifying the corresponding false proof code length of the anti-fake two-dimension code, when full The anti-fake two-dimension code legitimacy is verified when sufficient, security code is blocked and is obtained 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, 4 batch codes out and 6 bit sequence numbers will be decomposed legal verification is generated by the generation method for previously generating anti-fake two-dimension code The 6 bit check codes contrast for decomposing out in code, the legal check code and anti-fake two-dimension code to be verified, if completely the same, Then the anti-fake two-dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
The terminal, is additionally operable to show the security code true and false and inquiry times, after successfully jumping to businessman's public number, described The obvious position in the top of terminal completely shows the security code of 14, while inquire about which time inquiry the security code is from showing, If the user of present terminal inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal first Secondary inquiry, then can recognize this inquiry record when inquired about for next time again and avoid repeat count.
The server, is additionally operable to point out whether the terminal pays close attention to public number, continues prompting on businessman's public number page User pays close attention to public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is When scanning for the first time, it may appear that the prompting of prize drawing.
The above, only presently preferred embodiments of the present invention is not intended to limit protection scope of the present invention.

Claims (10)

1. it is a kind of based on wechat public number and to support the method for anti-counterfeit of terminal memory, it is characterised in that the method is:Terminal will be swept The anti-counterfeiting information entrained by anti-fake two-dimension code after retouching is submitted to server, and the server is corresponding to the anti-counterfeiting information anti- Pseudo- Quick Response Code carries out legitimacy verifies, when the anti-fake two-dimension code be legal Quick Response Code when, the server lookup this false proof two The corresponding businessman's public number information pushing of dimension code is to the terminal, and asks wechat server to obtain the corresponding use of the terminal Businessman's public number is bound with user profile by family token information according to the User Token information.
2. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute State anti-fake two-dimension code to be previously generated by server, the decimal system is specially first converted into the number of 28 systems, described 28 enter to be made as 6 Number, deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character that will be encrypted Truncation take out a character, hexdec process is carried out to a character of the taking-up, the value of acquisition with 8 deliverys, acquisition Hash algorithm in remainder correspondence 8, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character after encryption String wherein 4 changes into capitalization and returns as check code, obtains { ' 0', ' 1', ' the C'} be substituted for { ' in password after check code H', ' K', ' S'}, the cover character in 28 system numbers are A, 0 will be substituted for A, finally, combination anti-fake string code, by batch Code, check code and sequence number are spliced into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
3. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute Stating server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, specially:Verify the false proof two dimension Whether the corresponding false proof code length of code is 14, and the anti-fake two-dimension code legitimacy is verified when meeting, and blocks security code difference 4 batch codes, 4 bit check codes, 6 bit sequence numbers are obtained, 4 batch codes out will be decomposed and 6 bit sequence numbers are passed through pre- Mr. Generation method into anti-fake two-dimension code generates legal check code, decomposes in the legal check code and anti-fake two-dimension code to be verified Check code contrast out, if completely the same, the anti-fake two-dimension code is legal Quick Response Code, on the contrary the then false proof two dimension Code is illegal Quick Response Code.
4. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute State after bound with user profile by businessman's public number, the method also includes:Show anti- The pseudo-code true and false and inquiry times, after successfully jumping to businessman's public number, the position that the top of the terminal is obvious completely shows The security code of 14, while inquire about which time inquiry the security code is from showing, if the user of present terminal inquired about this prevented Pseudo-code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, this inquiry can be recorded, with Can recognize when inquired about for next time again and avoid repeat count.
5. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that should Method also includes:Point out whether the terminal pays close attention to public number, on businessman's public number page, continue prompting user's concern public number, Complete the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is scanning for the first time, meeting There is the prompting of prize drawing.
6. it is a kind of based on wechat public number and support terminal memory Antiforge system, it is characterised in that the system includes:False proof two Dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
7. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute Server is stated, enters to be made as 6 digits specifically for the number that the decimal system is converted into 28 systems first, described 28, deficiency uses 0 polishing, so Afterwards by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character string of encryption is intercepted into out a character , hexdec process is carried out to a character of the taking-up, with 8 deliverys, in the remainder correspondence 8 of acquisition, hash is calculated the value of acquisition Method, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption and changes into capitalization Return as check code, obtain after check code by password { ' 0', ' 1', ' C'} be substituted for { ' H', ' K', ' S'}, enter 28 Cover character in number processed is A, 0 will be substituted for A, and finally, batch code, check code and sequence number are spelled by combination anti-fake string code It is connected into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
8. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute Server is stated, whether is 14 specifically for verifying the corresponding false proof code length of the anti-fake two-dimension code, institute is verified when meeting Anti-fake two-dimension code legitimacy is stated, security code is blocked and is obtained 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, will be decomposed out 4 batch codes and 6 bit sequence numbers legal check code is generated by the generation method for previously generating anti-fake two-dimension code, it is described legal The 6 bit check codes contrast for decomposing out in check code and anti-fake two-dimension code to be verified, if completely the same, described false proof two Dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
9. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute Terminal is stated, is additionally operable to show the security code true and false and inquiry times, after successfully jumping to businessman's public number, the top of the terminal Obvious position completely shows the security code of 14, while inquire about which time inquiry the security code is from display, if current whole The user at end inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, can By this inquiry record, can recognize when inquired about for next time again and avoid repeat count.
10. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that The server, is additionally operable to point out whether the terminal pays close attention to public number, continues prompting user's concern on businessman's public number page Public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is to sweep for the first time When retouching, it may appear that the prompting of prize drawing.
CN201610976744.6A 2016-11-04 2016-11-04 Anti-counterfeiting method and system with support of terminal memory based on WeChat public account Pending CN106529977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610976744.6A CN106529977A (en) 2016-11-04 2016-11-04 Anti-counterfeiting method and system with support of terminal memory based on WeChat public account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610976744.6A CN106529977A (en) 2016-11-04 2016-11-04 Anti-counterfeiting method and system with support of terminal memory based on WeChat public account

Publications (1)

Publication Number Publication Date
CN106529977A true CN106529977A (en) 2017-03-22

Family

ID=58349791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610976744.6A Pending CN106529977A (en) 2016-11-04 2016-11-04 Anti-counterfeiting method and system with support of terminal memory based on WeChat public account

Country Status (1)

Country Link
CN (1) CN106529977A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169775A (en) * 2017-05-11 2017-09-15 成都水微信息技术有限公司 False proof marketing system and the method for tracing to the source based on wechat
CN107480308A (en) * 2017-09-26 2017-12-15 四川长虹电器股份有限公司 Barcode scanning login method based on wechat public number band ginseng Quick Response Code
CN109165705A (en) * 2018-03-13 2019-01-08 深圳真智能科技有限公司 A kind of real-time anti-counterfeiting system and method based on wechat public platform
CN110390537A (en) * 2019-07-29 2019-10-29 深圳市鸣智电子科技有限公司 A kind of commodity counterfeit prevention implementation method that actual situation combines
CN110543755A (en) * 2019-09-04 2019-12-06 四川长虹电器股份有限公司 Method for realizing scratch card effect verification code based on Canvas
CN111612476A (en) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium
CN112104632A (en) * 2020-09-07 2020-12-18 中国联合网络通信集团有限公司 Advertisement-free method and device
CN112785317A (en) * 2021-01-14 2021-05-11 上海诺标防伪技术开发有限公司 Product anti-counterfeiting inspection method based on WeChat public platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104240093A (en) * 2014-05-23 2014-12-24 成都鹰瑞科技有限公司 Two-dimension code anti-counterfeiting method
CN204614021U (en) * 2015-04-24 2015-09-02 宁波千脑信息技术有限公司 Code anti-fake system is held up based on the two of micro-letter platform
CN104933586A (en) * 2015-06-30 2015-09-23 广州微啸网络科技有限公司 Anti-fake anti-channel conflict system based on public platform and inquiring method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104240093A (en) * 2014-05-23 2014-12-24 成都鹰瑞科技有限公司 Two-dimension code anti-counterfeiting method
CN204614021U (en) * 2015-04-24 2015-09-02 宁波千脑信息技术有限公司 Code anti-fake system is held up based on the two of micro-letter platform
CN104933586A (en) * 2015-06-30 2015-09-23 广州微啸网络科技有限公司 Anti-fake anti-channel conflict system based on public platform and inquiring method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169775A (en) * 2017-05-11 2017-09-15 成都水微信息技术有限公司 False proof marketing system and the method for tracing to the source based on wechat
CN107480308A (en) * 2017-09-26 2017-12-15 四川长虹电器股份有限公司 Barcode scanning login method based on wechat public number band ginseng Quick Response Code
CN109165705A (en) * 2018-03-13 2019-01-08 深圳真智能科技有限公司 A kind of real-time anti-counterfeiting system and method based on wechat public platform
CN110390537A (en) * 2019-07-29 2019-10-29 深圳市鸣智电子科技有限公司 A kind of commodity counterfeit prevention implementation method that actual situation combines
CN110543755A (en) * 2019-09-04 2019-12-06 四川长虹电器股份有限公司 Method for realizing scratch card effect verification code based on Canvas
CN110543755B (en) * 2019-09-04 2022-03-01 四川长虹电器股份有限公司 Method for realizing scratch card effect verification code based on Canvas
CN111612476A (en) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium
CN111612476B (en) * 2020-05-09 2023-04-07 艾斯芸防伪科技(福建)有限公司 Secondary check anti-counterfeiting method, device, equipment and storage medium
CN112104632A (en) * 2020-09-07 2020-12-18 中国联合网络通信集团有限公司 Advertisement-free method and device
CN112104632B (en) * 2020-09-07 2022-08-02 中国联合网络通信集团有限公司 Advertisement-free method and device
CN112785317A (en) * 2021-01-14 2021-05-11 上海诺标防伪技术开发有限公司 Product anti-counterfeiting inspection method based on WeChat public platform

Similar Documents

Publication Publication Date Title
CN106529977A (en) Anti-counterfeiting method and system with support of terminal memory based on WeChat public account
EP1326368B1 (en) Device for revocation and updating of tokens in a public key infrastructure
US7475250B2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
EP0881559B1 (en) Computer system for protecting software and a method for protecting software
CN107146120B (en) Electronic invoice generation method and generation device
US20020176582A1 (en) Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system
CN104835046A (en) Data identification method for two-dimension code safety verification
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN101897165A (en) Method of authentication of users in data processing systems
US20030221107A1 (en) Method and apparatus for generating serial number
CN108768608A (en) The secret protection identity identifying method of thin-client is supported at block chain PKI
CN107294964B (en) Information transmission method
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
CN103795546A (en) Generating method and authentication method of data label and system of generating method and authentication method
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN106897761A (en) A kind of two-dimensional code generation method and device
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
CN104125230B (en) A kind of short message certification service system and authentication method
CN106572076A (en) Web service access method, client side and server side
CN113961893A (en) User login method and device based on block chain, electronic equipment and storage medium
CN104320253A (en) Two-dimension code authentication system and method based on CBS signature mechanism
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN104239838A (en) Anti-fake verification method for color two-dimensional code with digital watermark
CN117097476B (en) Data processing method, equipment and medium based on industrial Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication