CN107909375A - False proof and retrospect two-dimensional code generation method, terminal and medium - Google Patents
False proof and retrospect two-dimensional code generation method, terminal and medium Download PDFInfo
- Publication number
- CN107909375A CN107909375A CN201711215033.8A CN201711215033A CN107909375A CN 107909375 A CN107909375 A CN 107909375A CN 201711215033 A CN201711215033 A CN 201711215033A CN 107909375 A CN107909375 A CN 107909375A
- Authority
- CN
- China
- Prior art keywords
- user
- dimensional code
- received
- quick response
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 230000004044 response Effects 0.000 claims abstract description 95
- 238000004806 packaging method and process Methods 0.000 claims abstract description 17
- 238000004519 manufacturing process Methods 0.000 claims abstract description 10
- 230000004913 activation Effects 0.000 claims description 47
- 238000000605 extraction Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 7
- 238000012856 packing Methods 0.000 claims description 4
- 238000007689 inspection Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Provided by the invention false proof and retrospect two-dimensional code generation method, terminal and medium, this method, including:The operational order of user is received, opens wechat;The login instruction of user is received, into registration login interface;Identity information input by user is received, user's registration is completed and logs in;The product information and product packaging hierarchical information of user's typing are received, is preserved in the database, two-dimensional code data is generated according to product packaging hierarchical information, product information and the code of selection file level;Two-dimensional code data is stored in database;Generate the corresponding download address of the two-dimensional code data, the download address is shared with user, the product information of typing can be so directed to, special production two-dimensional code data, anti-fake effect is played using the unique property of Quick Response Code, in addition the two-dimensional code data only needs to share download address by wechat, and easy to operate, cost is low.
Description
Technical field
The invention belongs to field of communication technology, and in particular to false proof with tracing two-dimensional code generation method, terminal and medium.
Background technology
Product false proof refers to product in production and sales, and a kind of means used occur in counterfeit and shoddy goods in order to prevent.
Product false proof is primarily now to be pasted onto the surface of product by label or hide to realize in the product.
The product false proof that domestic each false proof enterprise is possessed at present mainly has following a few classes:
The first kind is that vision products are false proof, such as Multiple laser is false proof, fluorescence falsification preventing, alternating temperature are false proof, watermark anti-counterfeiting etc..This
A kind of anti-counterfeiting technology play the role of really in the initial stage that anti-counterfeiting technology develops it is preferable, it is false but with the development in market
Emit the also counterfeit above-mentioned technology of low-quality goods.
Second class is electronic recognition product false proof:Such as magnetic card record, IC card anti-counterfeiting mark, this mark play really
Good anti-fake effect, counterfeit and shoddy goods are due to cannot be introduced into computer management system, so can not be palmed off.It is but this
Anti-counterfeiting mark needs to be inquired about using special equipment, that is, can only be possible to be inquired about under given conditions, so that
Limit the use scope of user.And cost of manufacture is of a relatively high, popularization is also just restricted.
Three classes are that digital product is false proof, such as:Carried out by means such as telephone code, phone, decoding, information, internets
False proof, this anti-counterfeiting system is more state-of-the-art at present, is provided with the false proof technical characteristic of individual character, but use different skills
Larger difference also occurs in art, and cost is higher, troublesome in poeration.
The content of the invention
For in the prior art the defects of, the present invention provides false proof with retrospect two-dimensional code generation method, terminal and medium, leads to
Cross planar bar code technology carry out it is false proof, cost is low, easy to operate.
In a first aspect, the present invention provides a kind of false proof and retrospect two-dimensional code generation method, including:
The operational order of user is received, opens wechat;
The login instruction of user is received, into registration login interface;
Identity information input by user is received, user's registration is completed and logs in;
Receive user's typing product information and product packaging hierarchical information, preserve in the database, according to product information,
Product packaging hierarchical information and the code file level of selection generation two-dimensional code data;
Two-dimensional code data is stored in database;
The corresponding download address of the two-dimensional code data is generated, the download address is shared with user.
Further, the barcode scanning instruction of user is received, to obtain inquiry Quick Response Code;
The corresponding product information of inquiry Quick Response Code and product flow to information in called data storehouse;
Show the product information.
Further, this method it is described two-dimensional code data is shared with user after, further include:
The address for receiving user obtains instruction, to obtain the download address of the two-dimensional code data;
The password for receiving user sets instruction, preserves the password of user's typing, to obtain file extraction password;
The forwarding instruction of user is received, the download address is transmitted to specified user;
Access address input by user is received, when the access address is the download address of the two-dimensional code data, is received
Password input by user, when the password of input is equal to file extraction password, downloads the two-dimensional code data.
Further, the step of download two-dimensional code data is specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the face information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the face information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Further, the step of download two-dimensional code data is specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the iris information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the iris information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Further, this method receives access address input by user described, when the access address is the Quick Response Code
During the download address of data, password input by user is received, when the password of input is equal to file extraction password, downloads described two
After tieing up code data, further include:
Activation Quick Response Code is stored in database, each Quick Response Code that activates is both provided with sequence number;The two-dimentional yardage of activation
According to including the activation Quick Response Code;
The first sequence number and the second sequence number input by user are received, judges whether the second sequence number is more than the first sequence number;If so,
The corresponding activation Quick Response Code of sequence number between the first sequence number and the second sequence number is activated, if it is not, activation failure;
First sequence number and the second sequence number are obtained by one kind in following two modes:
1. first sequence number and the second sequence number are directly inputted by user;
2. the barcode scanning instruction of user is received, to obtain the first Quick Response Code;Judge to whether there is and described first in database
The activation Quick Response Code that Quick Response Code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain first sequence number;
The barcode scanning instruction of user is received, to obtain the second Quick Response Code;Judge to whether there is and the described 2nd 2 in database
The activation Quick Response Code that dimension code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain second sequence number.
Further, this method further includes after the activation two-dimensional code data:
The binding information of user's typing is received, binding information and the two-dimensional code data after activation are bound;It is described to tie up
Determining information includes packing date, date of manufacture, batch number, factory, producing line and inspection certificate.
Further, this method is generated according to the code file level of product information, product packaging hierarchical information and selection
After two-dimensional code data, before two-dimensional code data is stored in database, further include:
Quick Response Code sample code is generated according to the code file level of product information, product packaging hierarchical information and selection;
Quick Response Code sample code is stored in database;
The barcode scanning instruction of user is received, to obtain inquiry Quick Response Code sample code;
The corresponding product information of inquiry Quick Response Code sample code and product flow to information in called data storehouse;
Show the product information.
Second aspect, the present invention provides a kind of mobile terminal, including processor, input equipment, output equipment and storage
Device, the processor, input equipment, output equipment and memory are connected with each other, and the memory is used to store computer program,
The computer program includes programmed instruction, and the processor is arranged to call described program instruction, performs above-mentioned side
Method.
The third aspect, the present invention provides a kind of computer-readable recording medium, the computer-readable storage medium is stored with
Computer program, the computer program include programmed instruction, and described program instruction makes the processing when being executed by a processor
Device performs above-mentioned method.
As shown from the above technical solution, it is provided by the invention false proof with tracing two-dimensional code generation method, terminal and medium, energy
The product information of typing is enough directed to, two-dimensional code data is specially produced, anti-fake effect is played using the unique property of Quick Response Code,
In addition the two-dimensional code data only needs to obtain by wechat, and easy to operate, cost is low.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution of the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all of the figs, similar element
Or part is generally identified by similar reference numeral.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is the method flow diagram that embodiment one provides.
Fig. 2 is the method flow diagram that embodiment three provides.
Fig. 3 is the module frame chart for the mobile terminal that embodiment five provides.
Embodiment
The embodiment of technical solution of the present invention is described in detail below in conjunction with attached drawing.Following embodiments are only used for
Clearly illustrate technical scheme, therefore be only used as example, and the protection model of the present invention cannot be limited with this
Enclose.It should be noted that unless otherwise indicated, technical term or scientific terminology used in this application are should be belonging to the present invention
The ordinary meaning that field technology personnel are understood.
In this application, term " first ", " second " etc. are only used for description purpose, and it is not intended that instruction or hint phase
To importance or the implicit quantity for indicating indicated technical characteristic.In the description of the present invention, " multiple " are meant that two
More than a, unless otherwise specifically defined.
It should be appreciated that ought be special described by the instruction of term " comprising " use in this specification and in the appended claims
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, entirety, step,
Operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.In this way, the public physical structure of terminal is (for example, touch
Sensing surface) it can support the various application programs with user interface directly perceived and transparent for a user.
Embodiment one:
Referring to Fig. 1, embodiment one provides a kind of false proof and retrospect two-dimensional code generation method, including:
S101:The operational order of user is received, opens wechat;
Specifically, user can be swept by wechat sweeps function and pays close attention to and enter public platform.This method is directly put down in wechat
Apply for Quick Response Code on platform, it is easy to use.
S102:The login instruction of user is received, into registration login interface;
S103:Identity information input by user is received, user's registration is completed and logs in;
Specifically, for the user that logs in first, it is necessary to register.During registration, the identity information of typing include enterprise name,
Telephone number, mailbox, user's name etc..Short-message verification or mailbox verification can also be carried out during registration, when being verified
When, just succeed in registration.After succeeding in registration, user can be logged in by register account number.
S104:The product information and product packaging hierarchical information of user's typing are received, is preserved in the database, according to product
The code file level generation two-dimensional code data of information, product packaging hierarchical information and selection;Two-dimensional code data is stored in database
In;
Specifically, the product information of user's typing includes name of product, product type, product parameters, product photo etc..Often
One product generates unique two-dimensional code data.If it is desired to generating two-dimensional code data again, last time application can be clicked on
Code record, click generate again, can change the information such as quantity.It can also select corresponding product, application code.Due to product bag
Dress has many levels, each level is correspondingly provided with product packaging hierarchical information, when product maintenance, can set
Multi-layer packaging, when Quick Response Code generates, it is possible to specify the Quick Response Code code file of which level, i.e. code file layers only generated
Level.
The two-dimensional code data of the present embodiment uses static random number+dynamic random number, and the mode being association of activity and inertia, ensures code life
It is fast into speed, and ensure that code is in DYNAMIC DISTRIBUTION, it is ensured that the external world can not know algorithm to guess code, so as to prevent false proof system
Collapse.
S105:The corresponding download address of the two-dimensional code data is generated, the download address is shared with user.
Specifically, it can be shared by link to share mode, directly share download address.Can be directly using wechat certainly
The sharing function of band.
This method can be directed to the product information of typing, specially produce two-dimensional code data, utilize the unique of Quick Response Code
Property plays anti-fake effect, and in addition the two-dimensional code data only needs to obtain by wechat, and easy to operate, cost is low.
Embodiment two:
The method that embodiment two provides is shared with the basis of other embodiment offer method by the download address
After user, further include:
The barcode scanning instruction of user is received, to obtain inquiry Quick Response Code;
The corresponding product information of inquiry Quick Response Code and product flow to information in called data storehouse;
Show the product information.
Specifically, product flows to information and includes in process of producing product, the production information of each process typing, including production
Parameter, working condition, producers' information etc..This method plays the function of retrospect, user can by scanning recognition Quick Response Code,
The details of Quick Response Code are read, authenticity of products, how flow direction, the information such as use, facilitate user tracking product.
This method can also generate Quick Response Code sample code, it is fast to realize user while real two-dimensional code data is generated
Speed customization, display code specifying information, quick experience, true-false inquiring.
This method is generating two-dimensional code data according to the code file level of product information, product packaging hierarchical information and selection
Afterwards, before two-dimensional code data is stored in database, further include:
Quick Response Code sample code is generated according to the code file level of product information, product packaging hierarchical information and selection;
Quick Response Code sample code is stored in database;
The barcode scanning instruction of user is received, to obtain inquiry Quick Response Code sample code;
The corresponding product information of inquiry Quick Response Code sample code and product flow to information in called data storehouse;
Show the product information.
Specifically, the generation method of Quick Response Code sample code is identical with the generation method of real two-dimensional code data, such as client
Apply for 100 Quick Response Codes, 102 codes can be generated from the background, including 2 Quick Response Code sample codes and 100 real Quick Response Codes, visitor
Family only downloads, activates 100 real Quick Response Codes, but can pass through Quick Response Code sample before real Quick Response Code is not downloaded
The function of code experience true-false inquiring.
Embodiment three:
The method that embodiment three provides shares two-dimensional code data described on the basis of other embodiment offer method
After user, further include:
The address for receiving user obtains instruction, to obtain the download address of the two-dimensional code data;
The password for receiving user sets instruction, preserves the password of user's typing, to obtain file extraction password;
The forwarding instruction of user is received, the download address is transmitted to specified user;
Access address input by user is received, when the access address is the download address of the two-dimensional code data, is received
Password input by user, when the password of input is equal to file extraction password, downloads the two-dimensional code data.
The function is accomplished that two-dimensional code data download function.The Quick Response Code of generation can be transmitted to by Quick Response Code applicant
Other users, it is necessary to input correct file extraction password when other users access the download address that Quick Response Code applicant shares
Download two-dimensional code data.File extraction password can also be informed by wechat, phone or short message.File extracts password by Quick Response Code
Applicant is set.
It is described download the two-dimensional code data the step of be specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the face information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the face information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Specifically, this method is downloaded by recognition of face.Quick Response Code applicant can setting unit user (i.e. authority first
Open subscriber identity information) authority so that the certain customers can download two-dimensional code data.When inquiry user face information with
The authority of setting opens subscriber identity information and is consistent, it is possible to downloads.
It is described download the two-dimensional code data the step of be specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the iris information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the iris information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Specifically, this method is downloaded by iris recognition.
Example IV:
Referring to Fig. 2, the method that example IV provides is defeated in the reception user on the basis of two offer method of embodiment
The access address entered, when the access address is the download address of the two-dimensional code data, receives password input by user, when defeated
When the password entered is equal to file extraction password, after downloading the two-dimensional code data, further include:
Activation Quick Response Code is stored in database, each Quick Response Code that activates is both provided with sequence number;The two-dimentional yardage of activation
According to including the activation Quick Response Code;
The first sequence number and the second sequence number input by user are received, judges whether the second sequence number is more than the first sequence number;If so,
The corresponding activation Quick Response Code of sequence number between the first sequence number and the second sequence number is activated, if it is not, activation failure;
Specifically, this method is accomplished that in certain section that multiple Quick Response Codes activate at the same time.Such as:If 5 two are applied for
Tie up code, Serial No. 1,2,3,4,5, Quick Response Code is respectively 11,22,33,44,55, when the first serial number 2 received, second
During serial number 4,2,3,4 three corresponding Quick Response Codes of sequence number, i.e. Quick Response Code 22,33,44 are activated.
First sequence number and the second sequence number are obtained by one kind in following two modes:
First way, first sequence number and the second sequence number are directly inputted by user;Sequence number or two can be directly inputted
Tie up code;
The second way, receives the barcode scanning instruction of user, to obtain the first Quick Response Code;Judge in database whether there is with
The activation Quick Response Code that first Quick Response Code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain described first
Sequence number;
The barcode scanning instruction of user is received, to obtain the second Quick Response Code;Judge to whether there is and the described 2nd 2 in database
The activation Quick Response Code that dimension code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain second sequence number.
This method identifies by scanning the Quick Response Code of two endpoints in activation interval section and obtains the sequence of two Quick Response Codes
Number, activation interval is obtained, it is easy to operate.
This method further includes after the activation two-dimensional code data:
The binding information of user's typing is received, binding information and the two-dimensional code data after activation are bound;It is described to tie up
Determining information includes packing date, date of manufacture, batch number, factory, producing line, inspection certificate etc..
Embodiment five:
Referring to Fig. 3, embodiment five provides a kind of movement eventually, and 100, including processor 105, input equipment, output equipment
With memory 103, the processor 105, input equipment, output equipment and memory 103 are connected with each other, the memory 103
For storing computer program, the computer program includes programmed instruction, and the processor is arranged to call the journey
Sequence instructs, and performs following methods:
The operational order of user is received, opens wechat;The login instruction of user is received, into registration login interface;
Identity information input by user is received, user's registration is completed and logs in;
Receive user's typing product information and product packaging hierarchical information, preserve in the database, according to product information,
Product packaging hierarchical information and the code file level of selection generation two-dimensional code data;
Two-dimensional code data is stored in database;
The corresponding download address of the two-dimensional code data is generated, the download address is shared with user.
Further, the barcode scanning instruction of user is received, to obtain inquiry Quick Response Code;
The corresponding product information of inquiry Quick Response Code and product flow to information in called data storehouse;
Show the product information.
Further, this method it is described two-dimensional code data is shared with user after, further include:
The address for receiving user obtains instruction, to obtain the download address of the two-dimensional code data;
The password for receiving user sets instruction, preserves the password of user's typing, to obtain file extraction password;
The forwarding instruction of user is received, the download address is transmitted to specified user;
Access address input by user is received, when the access address is the download address of the two-dimensional code data, is received
Password input by user, when the password of input is equal to file extraction password, downloads the two-dimensional code data.
Further, the step of download two-dimensional code data is specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the face information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the face information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Further, the step of download two-dimensional code data is specially:
The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;
The identification instruction of user is received, to obtain the iris information of user;
Judge that authority is opened with the presence or absence of the user being consistent with the iris information in subscriber identity information, if it does, under
Carry the two-dimensional code data.
Further, this method receives access address input by user described, when the access address is the Quick Response Code
During the download address of data, password input by user is received, when the password of input is equal to file extraction password, downloads described two
After tieing up code data, further include:
Activation Quick Response Code is stored in database, each Quick Response Code that activates is both provided with sequence number;The two-dimentional yardage of activation
According to including the activation Quick Response Code;
The first sequence number and the second sequence number input by user are received, judges whether the second sequence number is more than the first sequence number;If so,
The corresponding activation Quick Response Code of sequence number between the first sequence number and the second sequence number is activated, if it is not, activation failure;
First sequence number and the second sequence number are obtained by one kind in following two modes:
1. first sequence number and the second sequence number are directly inputted by user;
2. the barcode scanning instruction of user is received, to obtain the first Quick Response Code;Judge to whether there is and described first in database
The activation Quick Response Code that Quick Response Code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain first sequence number;
The barcode scanning instruction of user is received, to obtain the second Quick Response Code;Judge to whether there is and the described 2nd 2 in database
The activation Quick Response Code that dimension code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain second sequence number.
Further, this method further includes after the activation two-dimensional code data:
The binding information of user's typing is received, binding information and the two-dimensional code data after activation are bound;It is described to tie up
Determining information includes date of manufacture, producing line, factory, packing date etc..
Specifically, in the mobile terminal 100, input equipment 120 can include touch-screen-enabled input unit 101, display screen
102 and touch sensor 106, input equipment 120 can realize touch-screen input function.100 each module of mobile terminal passes through bus
107 connections, including voicefrequency circuit 113 realize audio signal processing function;Locating module 112, which is realized, obtains geographical location information
Function;Storage control 104 realizes data storage or read functions;Outside port 111, including microphone 114 and loudspeaker
115, realize the function of phonetic entry and output.Image capture device 116, including camera lens 1161, image sensor 1162 and shadow
As processor 1163, picture or video acquisition are realized.Sensor array 118 is used to gather various parameters, such as temperature, humidity
Deng.
It should be appreciated that in embodiments of the present invention, alleged processor can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment can include Trackpad, fingerprint adopts sensor and (is used for finger print information and the side of fingerprint for gathering user
To information), microphone etc., output equipment can include display (LCD etc.), loudspeaker etc..
The memory can include read-only storage and random access memory, and provide instruction and data to processor.
The a part of of memory can also include nonvolatile RAM.For example, memory can be with storage device type
Information.
Embodiment six:
Embodiment six provides a kind of computer-readable recording medium, and the computer-readable storage medium is stored with computer journey
Sequence, the computer program include programmed instruction, and described program instruction makes the processor perform reality when being executed by a processor
Apply the method that example one is described to embodiment five.
The computer-readable recording medium can be the internal storage unit of the terminal described in previous embodiment, such as eventually
The hard disk or memory at end.The computer-readable recording medium can also be the External memory equipment of the terminal, such as described
The plug-in type hard disk being equipped with terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is used to store described
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art may realize that each exemplary list described with reference to the embodiments described herein
Member and algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical solution.Specially
Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method, can be by other
Mode realize.For example, device embodiment described above is only schematical, for example, the division of the unit, only
For a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can combine
Or another system is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect or electricity, mechanical or other forms connections.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units integrate in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to contribute in other words to the prior art, or all or part of the technical solution can be in the form of software product
Embody, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment the method for the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe is described in detail the present invention with reference to foregoing embodiments, it will be understood by those of ordinary skill in the art that:Its according to
Can so modify to the technical solution described in foregoing embodiments, either to which part or all technical characteristic into
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme, it should all cover among the claim of the present invention and the scope of specification.
Claims (10)
- It is 1. a kind of false proof with tracing two-dimensional code generation method, it is characterised in that including:The operational order of user is received, opens wechat;The login instruction of user is received, into registration login interface;Identity information input by user is received, user's registration is completed and logs in;The product information and product packaging hierarchical information of user's typing are received, is preserved in the database, according to product information, product Pack hierarchical information and the code file level generation two-dimensional code data of selection;Two-dimensional code data is stored in database;The corresponding download address of the two-dimensional code data is generated, the download address is shared with user.
- It is 2. false proof with tracing two-dimensional code generation method according to claim 1, it is characterised in thatThis method further includes after the download address is shared with user:The barcode scanning instruction of user is received, to obtain inquiry Quick Response Code;The corresponding product information of inquiry Quick Response Code and product flow to information in called data storehouse;Show the product information.
- It is 3. false proof with tracing two-dimensional code generation method according to claim 1, it is characterised in thatThis method it is described two-dimensional code data is shared with user after, further include:The address for receiving user obtains instruction, to obtain the download address of the two-dimensional code data;The password for receiving user sets instruction, preserves the password of user's typing, to obtain file extraction password;The forwarding instruction of user is received, the download address is transmitted to specified user;Access address input by user is received, when the access address is the download address of the two-dimensional code data, receives user The password of input, when the password of input is equal to file extraction password, downloads the two-dimensional code data.
- It is 4. false proof with tracing two-dimensional code generation method according to claim 3, it is characterised in thatIt is described download the two-dimensional code data the step of be specially:The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;The identification instruction of user is received, to obtain the face information of user;Judge that authority is opened with the presence or absence of the user being consistent with the face information in subscriber identity information, if it does, downloading institute State two-dimensional code data.
- It is 5. false proof with tracing two-dimensional code generation method according to claim 3, it is characterised in thatIt is described download the two-dimensional code data the step of be specially:The priority assignation instruction of user is received, the authority for preserving user's typing opens subscriber identity information;The identification instruction of user is received, to obtain the iris information of user;Judge that authority is opened with the presence or absence of the user being consistent with the iris information in subscriber identity information, if it does, downloading institute State two-dimensional code data.
- It is 6. false proof with tracing two-dimensional code generation method according to claim 3, it is characterised in thatThis method receives access address input by user described, when the download address that the access address is the two-dimensional code data When, password input by user is received, when the password of input is equal to file extraction password, after downloading the two-dimensional code data, Further include:Activation Quick Response Code is stored in database, each Quick Response Code that activates is both provided with sequence number;The activation two-dimensional code data bag Include the activation Quick Response Code;The first sequence number and the second sequence number input by user are received, judges whether the second sequence number is more than the first sequence number;If so, activation The corresponding activation Quick Response Code of sequence number between first sequence number and the second sequence number, if it is not, activation failure;First sequence number and the second sequence number are obtained by one kind in following two modes:1. first sequence number and the second sequence number are directly inputted by user;2. the barcode scanning instruction of user is received, to obtain the first Quick Response Code;Judge in database to whether there is and the described first two dimension The activation Quick Response Code that code is consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain first sequence number;The barcode scanning instruction of user is received, to obtain the second Quick Response Code;Judge to whether there is and second Quick Response Code in database The activation Quick Response Code being consistent, if it does, the sequence number of the activation Quick Response Code is read, to obtain second sequence number.
- It is 7. false proof with tracing two-dimensional code generation method according to claim 6, it is characterised in thatThis method further includes after the activation two-dimensional code data:The binding information of user's typing is received, binding information and the two-dimensional code data after activation are bound;The binding letter Breath includes packing date, date of manufacture, batch number, factory, producing line and inspection certificate.
- It is 8. false proof with tracing two-dimensional code generation method according to claim 1, it is characterised in thatThis method according to the code file level of product information, product packaging hierarchical information and selection generate two-dimensional code data it Afterwards, before two-dimensional code data is stored in database, further include:Quick Response Code sample code is generated according to the code file level of product information, product packaging hierarchical information and selection;Quick Response Code sample code is stored in database;The barcode scanning instruction of user is received, to obtain inquiry Quick Response Code sample code;The corresponding product information of inquiry Quick Response Code sample code and product flow to information in called data storehouse;Show the product information.
- A kind of 9. mobile terminal, it is characterised in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, and the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performs such as any one of claim 1-8 The method.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the processor perform such as right when being executed by a processor It is required that 1-8 any one of them methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711215033.8A CN107909375B (en) | 2017-11-28 | 2017-11-28 | Anti-counterfeiting and tracing two-dimensional code generation method, terminal and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711215033.8A CN107909375B (en) | 2017-11-28 | 2017-11-28 | Anti-counterfeiting and tracing two-dimensional code generation method, terminal and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107909375A true CN107909375A (en) | 2018-04-13 |
CN107909375B CN107909375B (en) | 2021-12-14 |
Family
ID=61847886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711215033.8A Active CN107909375B (en) | 2017-11-28 | 2017-11-28 | Anti-counterfeiting and tracing two-dimensional code generation method, terminal and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107909375B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109190064A (en) * | 2018-08-31 | 2019-01-11 | 努比亚技术有限公司 | Inventory recording method, terminal and computer readable storage medium |
CN109461010A (en) * | 2018-11-16 | 2019-03-12 | 重庆工商职业学院 | Fake products tracking based on big data |
CN110297807A (en) * | 2019-07-01 | 2019-10-01 | 深圳盒子信息科技有限公司 | A kind of two dimension code management method and device |
CN110795753A (en) * | 2019-11-08 | 2020-02-14 | 深圳市理约云信息管理有限公司 | File security protection system, file security sharing method and security reading method |
CN111104882A (en) * | 2019-12-09 | 2020-05-05 | 曹玉平 | Scanning identification method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
US20150067781A1 (en) * | 2013-09-02 | 2015-03-05 | Alibaba Group Holding Limited | Data Processing Based on Two-Dimensional Code |
CN105631688A (en) * | 2015-06-30 | 2016-06-01 | 广州微啸网络科技有限公司 | Anti-fake and anti-commodity-fleeing query method and system based on public platform |
CN105894302A (en) * | 2015-02-11 | 2016-08-24 | 黄世纬 | Product anti-counterfeiting method |
CN106056187A (en) * | 2016-06-13 | 2016-10-26 | 中检溯源科技有限公司 | Product sale activation and query anti-counterfeit label |
CN107169775A (en) * | 2017-05-11 | 2017-09-15 | 成都水微信息技术有限公司 | False proof marketing system and the method for tracing to the source based on wechat |
-
2017
- 2017-11-28 CN CN201711215033.8A patent/CN107909375B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150067781A1 (en) * | 2013-09-02 | 2015-03-05 | Alibaba Group Holding Limited | Data Processing Based on Two-Dimensional Code |
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
CN105894302A (en) * | 2015-02-11 | 2016-08-24 | 黄世纬 | Product anti-counterfeiting method |
CN105631688A (en) * | 2015-06-30 | 2016-06-01 | 广州微啸网络科技有限公司 | Anti-fake and anti-commodity-fleeing query method and system based on public platform |
CN106056187A (en) * | 2016-06-13 | 2016-10-26 | 中检溯源科技有限公司 | Product sale activation and query anti-counterfeit label |
CN107169775A (en) * | 2017-05-11 | 2017-09-15 | 成都水微信息技术有限公司 | False proof marketing system and the method for tracing to the source based on wechat |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109190064A (en) * | 2018-08-31 | 2019-01-11 | 努比亚技术有限公司 | Inventory recording method, terminal and computer readable storage medium |
CN109190064B (en) * | 2018-08-31 | 2023-08-25 | 努比亚技术有限公司 | Inventory recording method, terminal and computer readable storage medium |
CN109461010A (en) * | 2018-11-16 | 2019-03-12 | 重庆工商职业学院 | Fake products tracking based on big data |
CN109461010B (en) * | 2018-11-16 | 2021-06-08 | 重庆工商职业学院 | Big data-based counterfeit product tracking method |
CN110297807A (en) * | 2019-07-01 | 2019-10-01 | 深圳盒子信息科技有限公司 | A kind of two dimension code management method and device |
CN110297807B (en) * | 2019-07-01 | 2023-03-14 | 深圳盒子信息科技有限公司 | Two-dimensional code management method and device |
CN110795753A (en) * | 2019-11-08 | 2020-02-14 | 深圳市理约云信息管理有限公司 | File security protection system, file security sharing method and security reading method |
CN110795753B (en) * | 2019-11-08 | 2023-06-30 | 深圳市理约云信息管理有限公司 | File security protection system, file security sharing method and security reading method |
CN111104882A (en) * | 2019-12-09 | 2020-05-05 | 曹玉平 | Scanning identification method |
Also Published As
Publication number | Publication date |
---|---|
CN107909375B (en) | 2021-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107909375A (en) | False proof and retrospect two-dimensional code generation method, terminal and medium | |
US10133824B2 (en) | Systems, methods, and apparatuses for associating flexible internet based information with physical objects | |
US20180349893A1 (en) | System for outputting product traceability code | |
EP3042318B1 (en) | Method and apparatus for the remote provision, display and/or presentation of dynamic informative contents | |
CN105814539B (en) | The method and apparatus generated for code virtualization and remote process call | |
US20160140626A1 (en) | Web page advertisement configuration and optimization with visual editor and automatic website and webpage analysis | |
CN106534356A (en) | Method and apparatus for processing template data, requesting template data and displaying template data | |
CN106682028A (en) | Method, device and system for obtaining web application | |
CN105229485A (en) | Multifactor location verification | |
CN104091140B (en) | A kind of information processing method and electronic equipment | |
CN107086984A (en) | A kind of method, terminal and server for obtaining and generating identifying code | |
CN106375191A (en) | News feed techniques | |
CN106504097A (en) | A kind for the treatment of method and apparatus of assets information | |
CN104820855A (en) | Generation and identification method of dynamic two-dimensional codes based on mobile environment perception technology | |
CN108986226A (en) | For providing the method and its equipment of delivering Item Information | |
US20120284099A1 (en) | System and method for managing hair stylist referrals | |
CN110457364B (en) | User information view generation method and device | |
US11232503B1 (en) | System and method for blockchain-based product configuration and referral | |
CN106899750A (en) | Information displaying method based on card, information show the processing method and processing device of business | |
CN105469260A (en) | Product anti-counterfeiting and anti-bugselling method and system | |
CN107704613A (en) | A kind of approaches to IM, terminal and computer-readable recording medium | |
CN107169668A (en) | A kind of data processing method, apparatus and system | |
EP2953084A1 (en) | Social network messaging with integrated advertising | |
CN107800776A (en) | A kind of document handling method, terminal, server and computer-readable medium | |
US11538116B2 (en) | Life event bank ledger |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20211119 Address after: 201500 Building 2, No. 360, Renmin Road, Zhujing Town, Jinshan District, Shanghai (Zhujing community) Applicant after: Yunzhen network technology (Shanghai) Co.,Ltd. Address before: 400042 23-12, No. 19, Changjiang Binjiang Road, Yuzhong District, Chongqing Applicant before: Zhang Yongyao |
|
GR01 | Patent grant | ||
GR01 | Patent grant |