CN106529977A - Anti-counterfeiting method and system with support of terminal memory based on WeChat public account - Google Patents
Anti-counterfeiting method and system with support of terminal memory based on WeChat public account Download PDFInfo
- Publication number
- CN106529977A CN106529977A CN201610976744.6A CN201610976744A CN106529977A CN 106529977 A CN106529977 A CN 106529977A CN 201610976744 A CN201610976744 A CN 201610976744A CN 106529977 A CN106529977 A CN 106529977A
- Authority
- CN
- China
- Prior art keywords
- code
- fake
- terminal
- server
- public number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an anti-counterfeiting method with the support of terminal memory based on a WeChat public account. A terminal submits the anti-counterfeiting information carried by a scanned anti-counterfeiting two-dimensional code to a server, the server carries out legality checking on the anti-counterfeiting two-dimensional code corresponding to the anti-counterfeiting information, when the anti-counterfeiting two-dimensional code is a legal two-dimensional code, the server inquires the merchant public account information corresponding to the anti-counterfeiting two-dimensional code and pushes the merchant public account information to the terminal, a Wechat server is asked to obtain the user token information corresponding to the terminal, and a merchant public account and user information are bonded according to the user token information. The invention also discloses an anti-counterfeiting system with the support of terminal memory based on a WeChat public account, through the method and the system, the waste of server resources can be avoided, the difficulty of input is reduced, and a user experience is improved.
Description
Technical field
The invention belongs to field of anti-counterfeit technology, and in particular to a kind of false proof with support terminal memory based on wechat public number
Method and its system.
Background technology
With the arrival of Internet era, numerous products are spread in a network, in order that the different rule of different type
The product of lattice, it is easily identified in communication process, add the anti-dummy string code of unique identification code to have very much to every commodity
It is necessary;
Simple security code is easy to be copied, and generated security code is all saved in server end, may cause again to send
Most of being not used of code gone causes to waste.
Traditional security code identification, needs to fully enter one by one, and easy input error will also produce communication fee.
The content of the invention
In view of this, present invention is primarily targeted at providing a kind of based on preventing that wechat public number and support terminal are remembered
Fake method and its system.
To reach above-mentioned purpose, the technical scheme is that what is be achieved in that:
The embodiment of the present invention provides a kind of method for anti-counterfeit remembered based on wechat public number and support terminal, and the method is:Terminal
Anti-counterfeiting information entrained by anti-fake two-dimension code after scanning is submitted to into server, the server is to anti-counterfeiting information correspondence
Anti-fake two-dimension code carry out legitimacy verifies, when the anti-fake two-dimension code be legal Quick Response Code when, the server lookup this prevent
The corresponding businessman's public number information pushing of pseudo- Quick Response Code to the terminal, and ask wechat server to obtain the terminal-pair should
User Token information, businessman's public number and user profile are bound according to the User Token information.
In such scheme, the anti-fake two-dimension code is previously generated by server, the decimal system is converted into 28 first specially and is entered
The number of system, described 28 enter to be made as 6 digits, and deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splice after carry out
Md5 is encrypted, then the character string of encryption is intercepted out a character, carries out hexdec process to a character of the taking-up,
The value of acquisition obtains the incoming md5 encryption strings of algorithm heel and is only dissipated with 8 deliverys, hash algorithm in the remainder correspondence 8 of acquisition
Row encryption, takes the character string wherein 4 after encryption and changes into capitalization and return as check code, obtain after check code by password '
0', ' 1', ' C'} be substituted for ' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally,
Combination anti-fake string code, false proof two that the character string that batch code, check code and sequence number are spliced into 14 bit lengths is as generated
Dimension code.
In such scheme, the server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, tool
Body is:Verify whether the corresponding false proof code length of the anti-fake two-dimension code is 14, the anti-fake two-dimension code is verified when meeting
Legitimacy, blocks security code and obtains 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, will decompose 4 batch codes out
Legal check code is generated by the generation method for previously generating anti-fake two-dimension code with 6 bit sequence numbers, the legal check code with treat
The check code contrast for decomposing out in the anti-fake two-dimension code of checking, if completely the same, the anti-fake two-dimension code is legal two
Dimension code, on the contrary then the anti-fake two-dimension code is illegal Quick Response Code.
It is in such scheme, described that businessman's public number and user profile are bound by it according to the User Token information
Afterwards, the method also includes:Show the security code true and false and inquiry times, after successfully jumping to businessman's public number, the terminal
The obvious position in top completely shows the security code of 14, while from showing that the security code is inquired about in which time inquiry is, if worked as
The user of front terminal inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time,
Then this inquiry record can be recognized when inquired about for next time again and avoid repeat count.
In such scheme, the method also includes:Point out whether the terminal pays close attention to public number, on businessman's public number page after
Continuous prompting user concern public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current false proof two
When dimension code is scanning for the first time, it may appear that the prompting of prize drawing.
The embodiment of the present invention also provides a kind of Antiforge system remembered based on wechat public number and support terminal, the system bag
Include:Anti-fake two-dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer
Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information
Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code
Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described
Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
In such scheme, the server enters to be made as specifically for the number that the decimal system is converted into 28 systems first, described 28
6 digits, deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then will encrypt
Character string intercepts out a character, carries out hexdec process to a character of the taking-up, and the value of acquisition is obtained with 8 deliverys
Hash algorithm in the remainder correspondence 8 for obtaining, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes after encrypting
Character string wherein 4 changes into capitalization and returns as check code, obtain after check code by password ' 0', ' 1', ' C'} is substituted for
' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally, combination anti-fake string code, by batch
Code, check code and sequence number are spliced into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
In such scheme, the server, specifically for whether verifying the corresponding false proof code length of the anti-fake two-dimension code
For 14, the anti-fake two-dimension code legitimacy is verified when meeting, block security code and obtain 4 batch codes, 4 bit checks respectively
Code, 6 bit sequence numbers, will decompose 4 batch codes out and 6 bit sequence numbers by previously generating the generation method of anti-fake two-dimension code
Generate legal check code, the check code contrast for decomposing out in the legal check code and anti-fake two-dimension code to be verified, if
Completely the same, then the anti-fake two-dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
In such scheme, the terminal is additionally operable to show the security code true and false and inquiry times, successfully jumps to the businessman public
After number, the obvious position in the top of the terminal completely shows the security code of 14, while from showing that inquiring about the security code is
Which time inquiry, if the user of present terminal inquired about the security code, when secondary inquiry will not be added up upwards;If present terminal
User inquire about for the first time, then this inquiry record can be recognized when inquired about for next time again and avoid repeat count.
In such scheme, the server is additionally operable to point out whether the terminal pays close attention to public number, businessman's public number page
It is upper to continue prompting user's concern public number, complete the precipitation function of user;Point out whether the terminal draws a lottery, if current is anti-
When pseudo- Quick Response Code is scanning for the first time, it may appear that the prompting of prize drawing.
Compared with prior art, beneficial effects of the present invention:
Security of the present invention is good, while it also avoid the waste to server resource, reduces input difficulty, improves Consumer's Experience.
Description of the drawings
Fig. 1 provides a kind of flow process of the method for anti-counterfeit remembered based on wechat public number and support terminal for the embodiment of the present invention
Figure;
Fig. 2 provides a kind of based on false proof two dimension in wechat public number and the method for anti-counterfeit for supporting terminal to remember for the embodiment of the present invention
The product process figure of code.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is below in conjunction with drawings and Examples, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and
It is not used in the restriction present invention.
The embodiment of the present invention provides a kind of method for anti-counterfeit remembered based on wechat public number and support terminal, as shown in figure 1,
The method is realized by following steps:
Step 101:Anti-counterfeiting information entrained by anti-fake two-dimension code after scanning is submitted to server by terminal.
Specifically, the anti-fake two-dimension code is previously generated by server, and the decimal system is converted into 28 systems first specially
Number, described 28 enter to be made as 6 digits, and deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splice after carry out md5
Encryption, then the character string of encryption is intercepted into out a character, hexdec process is carried out to a character of the taking-up, is obtained
Value with 8 deliverys, hash algorithm in the remainder correspondence 8 of acquisition, obtain the incoming md5 encryption strings of algorithm heel only carry out hash plus
It is close, take the character string wherein 4 after encryption and change into capitalization and return as check code, obtain { ' the 0', ' in password after check code
1', ' C'} be substituted for { ' H', ' K', ' S'}, the cover character in 28 system numbers is A, 0 will be substituted for A, finally, combination
Anti- dummy string code, the anti-fake two-dimension code that the character string that batch code, check code and sequence number are spliced into 14 bit lengths is as generated.
Specifically, as shown in Fig. 2 the generation method of the anti-fake two-dimension code:
S1:Generate 4 batch codes, batch code is combined and is formed by going here and there random 4 characters for obtaining in the character included by code
, its uniqueness is ensured by technological means;According to rule, it is ensured that the combination of 4 can accommodate 614656 it is unduplicated
Batch code
S2:6 bit sequence numbers are generated, sequence number is obtained after being arranged by self-defining 28 system number in sequence, Serial No. 6
Position and never repeat;The open ended number of 6 characters is 481890304.
S3:Check code is generated, check code is obtained by algorithm computing by sequence number and batch code;Its digit is 4.
Incoming 4 batch numbers and decimal numeral sequence number, the decimal system is first converted into the number of 28 systems(28 enter to be made as
6 digits, deficiency use 0 polishing), then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then by encryption
Character string intercepts out a character, and to character using hexdec process, the value for obtaining is corresponded in 8 with 8 deliverys, the remainder of acquisition
Hash algorithm, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption and turns
Return as password into capitalization(Check code)Use, obtain after check code using replace by password ' 0', ' 1', ' C'};
Be substituted for ' H', ' K', ' S'};Cover character in 28 system numbers is A(A is substituted for by 0).
S4:Batch code, check code and sequence number are spliced into the character string of 14 bit lengths by combination anti-fake string code
S5:Batch code is stored, if batch code is to generate for the first time, batch code is saved in database, the security code of generation
Do not preserve, server resource can be saved.
Step 102:The server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information.
Specifically, the server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, specially:
Verify whether the corresponding false proof code length of the anti-fake two-dimension code is 14, the anti-fake two-dimension code is verified when meeting legal
Property, block security code and obtain 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, 4 batch codes out and 6 will be decomposed
Sequence number generates legal check code by the generation method for previously generating anti-fake two-dimension code, the legal check code with it is to be verified
The 6 bit check codes contrast for decomposing out in anti-fake two-dimension code, if completely the same, the anti-fake two-dimension code is legal two dimension
Code, because the process for generating check code [S3] is irreversible, cannot inversely derive legitimacy from check code.Otherwise then
The anti-fake two-dimension code is illegal Quick Response Code.
Further, 4 batch codes out and 6 bit sequence numbers will be decomposed by previously generating the generation of anti-fake two-dimension code
Method generates 6 new bit sequence numbers, specially:Md5 encryptions will be carried out after the sequence number of 28 system numbers and batch number splicing, then will
The character string of encryption intercepts out a character, and to character using hexdec process, the value for obtaining is with 8 deliverys, the remainder of acquisition
Correspondence 8 in hash algorithm, obtain algorithm heel it is incoming md5 encryption string only carry out hash encryption, take encryption after character string its
In 4 change into capitalization return as password(Check code)Use, obtain after check code using replacing { ' the 0', ' in password
1','C'};Be substituted for ' H', ' K', ' S'};Cover character in 28 system numbers is A(A is substituted for by 0).
Step 103:When the anti-fake two-dimension code is legal Quick Response Code, the server lookup anti-fake two-dimension code is corresponding
Businessman's public number information pushing to the terminal, and ask wechat server to obtain the corresponding User Token letter of the terminal
Businessman's public number is bound with user profile by breath according to the User Token information.
Specifically, it is described according to the User Token information by the binding of businessman's public number and user profile after, should
Method also includes:The security code true and false and inquiry times are shown, after successfully jumping to businessman's public number, the top of the terminal shows
The position of eye completely shows the security code of 14, while from showing that the security code is inquired about in which time inquiry is, if present terminal
User inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, can be by
This inquiry record, can recognize when inquired about for next time again and avoid repeat count.
Whether terminal described in the server prompts pays close attention to public number, continues prompting user's concern on businessman's public number page
Public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is to sweep for the first time
When retouching, it may appear that the prompting of prize drawing.
The embodiment of the present invention also provides a kind of Antiforge system remembered based on wechat public number and support terminal, the system bag
Include:Anti-fake two-dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer
Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information
Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code
Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described
Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
The server, enters to be made as 6 digits specifically for the number that the decimal system is converted into 28 systems first, described 28, not enough
Use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character string of encryption is intercepted
Go out a character, hexdec process is carried out to a character of the taking-up, the value of acquisition is with 8 deliverys, the remainder pair of acquisition
Hash algorithm in answering 8, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption
Position changes into capitalization and returns as check code, obtains { ' 0', ' 1', ' C'} be substituted for { ' H', ' the K', ' in password after check code
S'}, the cover character in 28 system numbers are A, 0 will be substituted for A, finally, combination anti-fake string code, by batch code, check code
The anti-fake two-dimension code that the character string that 14 bit lengths are spliced into sequence number is as generated.
Whether the server, be 14 specifically for verifying the corresponding false proof code length of the anti-fake two-dimension code, when full
The anti-fake two-dimension code legitimacy is verified when sufficient, security code is blocked and is obtained 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively,
4 batch codes out and 6 bit sequence numbers will be decomposed legal verification is generated by the generation method for previously generating anti-fake two-dimension code
The 6 bit check codes contrast for decomposing out in code, the legal check code and anti-fake two-dimension code to be verified, if completely the same,
Then the anti-fake two-dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
The terminal, is additionally operable to show the security code true and false and inquiry times, after successfully jumping to businessman's public number, described
The obvious position in the top of terminal completely shows the security code of 14, while inquire about which time inquiry the security code is from showing,
If the user of present terminal inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal first
Secondary inquiry, then can recognize this inquiry record when inquired about for next time again and avoid repeat count.
The server, is additionally operable to point out whether the terminal pays close attention to public number, continues prompting on businessman's public number page
User pays close attention to public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is
When scanning for the first time, it may appear that the prompting of prize drawing.
The above, only presently preferred embodiments of the present invention is not intended to limit protection scope of the present invention.
Claims (10)
1. it is a kind of based on wechat public number and to support the method for anti-counterfeit of terminal memory, it is characterised in that the method is:Terminal will be swept
The anti-counterfeiting information entrained by anti-fake two-dimension code after retouching is submitted to server, and the server is corresponding to the anti-counterfeiting information anti-
Pseudo- Quick Response Code carries out legitimacy verifies, when the anti-fake two-dimension code be legal Quick Response Code when, the server lookup this false proof two
The corresponding businessman's public number information pushing of dimension code is to the terminal, and asks wechat server to obtain the corresponding use of the terminal
Businessman's public number is bound with user profile by family token information according to the User Token information.
2. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute
State anti-fake two-dimension code to be previously generated by server, the decimal system is specially first converted into the number of 28 systems, described 28 enter to be made as 6
Number, deficiency use 0 polishing, then by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character that will be encrypted
Truncation take out a character, hexdec process is carried out to a character of the taking-up, the value of acquisition with 8 deliverys, acquisition
Hash algorithm in remainder correspondence 8, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character after encryption
String wherein 4 changes into capitalization and returns as check code, obtains { ' 0', ' 1', ' the C'} be substituted for { ' in password after check code
H', ' K', ' S'}, the cover character in 28 system numbers are A, 0 will be substituted for A, finally, combination anti-fake string code, by batch
Code, check code and sequence number are spliced into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
3. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute
Stating server carries out legitimacy verifies to the corresponding anti-fake two-dimension code of the anti-counterfeiting information, specially:Verify the false proof two dimension
Whether the corresponding false proof code length of code is 14, and the anti-fake two-dimension code legitimacy is verified when meeting, and blocks security code difference
4 batch codes, 4 bit check codes, 6 bit sequence numbers are obtained, 4 batch codes out will be decomposed and 6 bit sequence numbers are passed through pre- Mr.
Generation method into anti-fake two-dimension code generates legal check code, decomposes in the legal check code and anti-fake two-dimension code to be verified
Check code contrast out, if completely the same, the anti-fake two-dimension code is legal Quick Response Code, on the contrary the then false proof two dimension
Code is illegal Quick Response Code.
4. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that institute
State after bound with user profile by businessman's public number, the method also includes:Show anti-
The pseudo-code true and false and inquiry times, after successfully jumping to businessman's public number, the position that the top of the terminal is obvious completely shows
The security code of 14, while inquire about which time inquiry the security code is from showing, if the user of present terminal inquired about this prevented
Pseudo-code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, this inquiry can be recorded, with
Can recognize when inquired about for next time again and avoid repeat count.
5. it is according to claim 1 based on wechat public number and support terminal memory method for anti-counterfeit, it is characterised in that should
Method also includes:Point out whether the terminal pays close attention to public number, on businessman's public number page, continue prompting user's concern public number,
Complete the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is scanning for the first time, meeting
There is the prompting of prize drawing.
6. it is a kind of based on wechat public number and support terminal memory Antiforge system, it is characterised in that the system includes:False proof two
Dimension code, server, terminal, wechat server;
The anti-fake two-dimension code, is the discernible Quick Response Code of wechat, and surface is provided with covering layer, needs during checking to scrape covering layer
Open, generated by server, for associating with corresponding businessman's public number;
The terminal, for the anti-counterfeiting information entrained by the anti-fake two-dimension code after scanning is submitted to server,
The server, for generating the anti-fake two-dimension code, is additionally operable to enter the corresponding anti-fake two-dimension code of the anti-counterfeiting information
Row legitimacy verifies, when the anti-fake two-dimension code is legal Quick Response Code, inquire about the corresponding businessman's public number of the anti-fake two-dimension code
Information pushing is to the terminal, and asks wechat server to obtain the corresponding User Token information of the terminal, according to described
Businessman's public number is bound by User Token information with user profile;
The wechat server, for pushing the corresponding User Token information of the terminal according to the request of the server.
7. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute
Server is stated, enters to be made as 6 digits specifically for the number that the decimal system is converted into 28 systems first, described 28, deficiency uses 0 polishing, so
Afterwards by conversion after 28 system numbers and batch number splicing after carry out md5 encryptions, then the character string of encryption is intercepted into out a character
, hexdec process is carried out to a character of the taking-up, with 8 deliverys, in the remainder correspondence 8 of acquisition, hash is calculated the value of acquisition
Method, obtaining the incoming md5 encryption strings of algorithm heel only carries out hash encryption, takes the character string wherein 4 after encryption and changes into capitalization
Return as check code, obtain after check code by password { ' 0', ' 1', ' C'} be substituted for { ' H', ' K', ' S'}, enter 28
Cover character in number processed is A, 0 will be substituted for A, and finally, batch code, check code and sequence number are spelled by combination anti-fake string code
It is connected into the anti-fake two-dimension code that the character string of 14 bit lengths is as generated.
8. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute
Server is stated, whether is 14 specifically for verifying the corresponding false proof code length of the anti-fake two-dimension code, institute is verified when meeting
Anti-fake two-dimension code legitimacy is stated, security code is blocked and is obtained 4 batch codes, 4 bit check codes, 6 bit sequence numbers respectively, will be decomposed out
4 batch codes and 6 bit sequence numbers legal check code is generated by the generation method for previously generating anti-fake two-dimension code, it is described legal
The 6 bit check codes contrast for decomposing out in check code and anti-fake two-dimension code to be verified, if completely the same, described false proof two
Dimension code is legal Quick Response Code, otherwise then the anti-fake two-dimension code is illegal Quick Response Code.
9. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that institute
Terminal is stated, is additionally operable to show the security code true and false and inquiry times, after successfully jumping to businessman's public number, the top of the terminal
Obvious position completely shows the security code of 14, while inquire about which time inquiry the security code is from display, if current whole
The user at end inquired about the security code, when secondary inquiry will not be added up upwards;If the user of present terminal inquires about for the first time, can
By this inquiry record, can recognize when inquired about for next time again and avoid repeat count.
10. it is according to claim 6 based on wechat public number and support terminal memory Antiforge system, it is characterised in that
The server, is additionally operable to point out whether the terminal pays close attention to public number, continues prompting user's concern on businessman's public number page
Public number, completes the precipitation function of user;Point out whether the terminal draws a lottery, if current anti-fake two-dimension code is to sweep for the first time
When retouching, it may appear that the prompting of prize drawing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610976744.6A CN106529977A (en) | 2016-11-04 | 2016-11-04 | Anti-counterfeiting method and system with support of terminal memory based on WeChat public account |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610976744.6A CN106529977A (en) | 2016-11-04 | 2016-11-04 | Anti-counterfeiting method and system with support of terminal memory based on WeChat public account |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529977A true CN106529977A (en) | 2017-03-22 |
Family
ID=58349791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610976744.6A Pending CN106529977A (en) | 2016-11-04 | 2016-11-04 | Anti-counterfeiting method and system with support of terminal memory based on WeChat public account |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529977A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169775A (en) * | 2017-05-11 | 2017-09-15 | 成都水微信息技术有限公司 | False proof marketing system and the method for tracing to the source based on wechat |
CN107480308A (en) * | 2017-09-26 | 2017-12-15 | 四川长虹电器股份有限公司 | Barcode scanning login method based on wechat public number band ginseng Quick Response Code |
CN109165705A (en) * | 2018-03-13 | 2019-01-08 | 深圳真智能科技有限公司 | A kind of real-time anti-counterfeiting system and method based on wechat public platform |
CN110390537A (en) * | 2019-07-29 | 2019-10-29 | 深圳市鸣智电子科技有限公司 | A kind of commodity counterfeit prevention implementation method that actual situation combines |
CN110543755A (en) * | 2019-09-04 | 2019-12-06 | 四川长虹电器股份有限公司 | Method for realizing scratch card effect verification code based on Canvas |
CN111612476A (en) * | 2020-05-09 | 2020-09-01 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
CN112104632A (en) * | 2020-09-07 | 2020-12-18 | 中国联合网络通信集团有限公司 | Advertisement-free method and device |
CN112785317A (en) * | 2021-01-14 | 2021-05-11 | 上海诺标防伪技术开发有限公司 | Product anti-counterfeiting inspection method based on WeChat public platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104240093A (en) * | 2014-05-23 | 2014-12-24 | 成都鹰瑞科技有限公司 | Two-dimension code anti-counterfeiting method |
CN204614021U (en) * | 2015-04-24 | 2015-09-02 | 宁波千脑信息技术有限公司 | Code anti-fake system is held up based on the two of micro-letter platform |
CN104933586A (en) * | 2015-06-30 | 2015-09-23 | 广州微啸网络科技有限公司 | Anti-fake anti-channel conflict system based on public platform and inquiring method |
-
2016
- 2016-11-04 CN CN201610976744.6A patent/CN106529977A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104240093A (en) * | 2014-05-23 | 2014-12-24 | 成都鹰瑞科技有限公司 | Two-dimension code anti-counterfeiting method |
CN204614021U (en) * | 2015-04-24 | 2015-09-02 | 宁波千脑信息技术有限公司 | Code anti-fake system is held up based on the two of micro-letter platform |
CN104933586A (en) * | 2015-06-30 | 2015-09-23 | 广州微啸网络科技有限公司 | Anti-fake anti-channel conflict system based on public platform and inquiring method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169775A (en) * | 2017-05-11 | 2017-09-15 | 成都水微信息技术有限公司 | False proof marketing system and the method for tracing to the source based on wechat |
CN107480308A (en) * | 2017-09-26 | 2017-12-15 | 四川长虹电器股份有限公司 | Barcode scanning login method based on wechat public number band ginseng Quick Response Code |
CN109165705A (en) * | 2018-03-13 | 2019-01-08 | 深圳真智能科技有限公司 | A kind of real-time anti-counterfeiting system and method based on wechat public platform |
CN110390537A (en) * | 2019-07-29 | 2019-10-29 | 深圳市鸣智电子科技有限公司 | A kind of commodity counterfeit prevention implementation method that actual situation combines |
CN110543755A (en) * | 2019-09-04 | 2019-12-06 | 四川长虹电器股份有限公司 | Method for realizing scratch card effect verification code based on Canvas |
CN110543755B (en) * | 2019-09-04 | 2022-03-01 | 四川长虹电器股份有限公司 | Method for realizing scratch card effect verification code based on Canvas |
CN111612476A (en) * | 2020-05-09 | 2020-09-01 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
CN111612476B (en) * | 2020-05-09 | 2023-04-07 | 艾斯芸防伪科技(福建)有限公司 | Secondary check anti-counterfeiting method, device, equipment and storage medium |
CN112104632A (en) * | 2020-09-07 | 2020-12-18 | 中国联合网络通信集团有限公司 | Advertisement-free method and device |
CN112104632B (en) * | 2020-09-07 | 2022-08-02 | 中国联合网络通信集团有限公司 | Advertisement-free method and device |
CN112785317A (en) * | 2021-01-14 | 2021-05-11 | 上海诺标防伪技术开发有限公司 | Product anti-counterfeiting inspection method based on WeChat public platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106529977A (en) | Anti-counterfeiting method and system with support of terminal memory based on WeChat public account | |
EP1326368B1 (en) | Device for revocation and updating of tokens in a public key infrastructure | |
US7475250B2 (en) | Assignment of user certificates/private keys in token enabled public key infrastructure system | |
EP0881559B1 (en) | Computer system for protecting software and a method for protecting software | |
CN107146120B (en) | Electronic invoice generation method and generation device | |
US20020176582A1 (en) | Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system | |
CN104835046A (en) | Data identification method for two-dimension code safety verification | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN101897165A (en) | Method of authentication of users in data processing systems | |
US20030221107A1 (en) | Method and apparatus for generating serial number | |
CN108768608A (en) | The secret protection identity identifying method of thin-client is supported at block chain PKI | |
CN107294964B (en) | Information transmission method | |
CN112165382B (en) | Software authorization method and device, authorization server side and terminal equipment | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
CN103795546A (en) | Generating method and authentication method of data label and system of generating method and authentication method | |
CN104322003A (en) | Cryptographic authentication and identification method using real-time encryption | |
CN106897761A (en) | A kind of two-dimensional code generation method and device | |
CN109728896A (en) | A kind of incoming call certification and source tracing method and process based on block chain | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN106572076A (en) | Web service access method, client side and server side | |
CN113961893A (en) | User login method and device based on block chain, electronic equipment and storage medium | |
CN104320253A (en) | Two-dimension code authentication system and method based on CBS signature mechanism | |
US7739500B2 (en) | Method and system for consistent recognition of ongoing digital relationships | |
CN104239838A (en) | Anti-fake verification method for color two-dimensional code with digital watermark | |
CN117097476B (en) | Data processing method, equipment and medium based on industrial Internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication |