CN108665041B - Two-dimensional code generation and identification method and device, computer equipment and storage medium - Google Patents

Two-dimensional code generation and identification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN108665041B
CN108665041B CN201810437810.1A CN201810437810A CN108665041B CN 108665041 B CN108665041 B CN 108665041B CN 201810437810 A CN201810437810 A CN 201810437810A CN 108665041 B CN108665041 B CN 108665041B
Authority
CN
China
Prior art keywords
dimensional code
verification information
target object
matched
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810437810.1A
Other languages
Chinese (zh)
Other versions
CN108665041A (en
Inventor
吕世文
郑怀仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mayun Variable Data Technology Co ltd
Original Assignee
Shenzhen Mayun Variable Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Mayun Variable Data Technology Co ltd filed Critical Shenzhen Mayun Variable Data Technology Co ltd
Priority to CN201810437810.1A priority Critical patent/CN108665041B/en
Publication of CN108665041A publication Critical patent/CN108665041A/en
Application granted granted Critical
Publication of CN108665041B publication Critical patent/CN108665041B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Character Discrimination (AREA)

Abstract

The embodiment of the invention discloses a two-dimensional code generation and identification method, a device, computer equipment and a storage medium, wherein the two-dimensional code generation method comprises the following steps: acquiring a target object corresponding to a two-dimensional code generation instruction, and generating at least one piece of verification information matched with the target object; establishing and storing a corresponding relation between the target object and the at least one piece of verification information; and generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information can be directly identified by human eyes in the two-dimensional code. According to the technical scheme of the embodiment of the invention, the common two-dimension code is upgraded to have an anti-counterfeiting function, so that the safety of the two-dimension code is improved.

Description

Two-dimensional code generation and identification method and device, computer equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of information processing, in particular to a two-dimensional code generation and identification method and device, computer equipment and a storage medium.
Background
The two-dimensional code records data symbol information by black and white patterns which are distributed on a plane (in a two-dimensional direction) according to a certain rule by using a certain specific geometric figure. The two-dimensional code can be divided into a stacked/row-type two-dimensional bar code and a matrix-type two-dimensional bar code.
Fig. 1 is a schematic structural diagram of a conventional QR (Quick Response) two-dimensional code in the prior art, and as shown in fig. 1, the conventional QR two-dimensional code is encoded in a rectangular space by different distributions of black and white pixels in a matrix. On the corresponding element positions of the matrix, binary '1' is represented by the appearance of points (square points, round points or other shapes), binary '0' is represented by the absence of the points, and the significance represented by the matrix type two-dimensional bar code is determined by the arrangement and combination of the points. Matrix two-dimensional bar code is a new pattern symbol automatic reading processing code system based on computer image processing technology and combined coding principle.
In the process of implementing the invention, the inventor finds that the traditional QR two-dimensional code has the following defects: the system is very easy to copy and utilize, and the safety is low; the anti-counterfeiting label only has the functions of coding and identifying, has single function and cannot realize the anti-counterfeiting function.
Disclosure of Invention
The embodiment of the invention provides a two-dimension code generation and identification method, a two-dimension code generation and identification device, computer equipment and a storage medium, which are used for optimizing the existing two-dimension code and improving the safety of the two-dimension code.
In a first aspect, an embodiment of the present invention provides a two-dimensional code generation method, including:
acquiring a target object corresponding to a two-dimensional code generation instruction, and generating at least one piece of verification information matched with the target object;
establishing and storing a corresponding relation between the target object and the at least one piece of verification information;
and generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information can be directly identified by human eyes in the two-dimensional code.
In a second aspect, an embodiment of the present invention further provides a two-dimensional code identification method, including:
acquiring a two-dimensional code to be identified, wherein the two-dimensional code to be identified comprises at least one piece of target verification information which can be directly identified by human eyes;
analyzing a target object included in the two-dimensional code to be identified, and acquiring at least one item of standard verification information which is prestored and matched with the target object;
and verifying the two-dimension code to be recognized according to the standard verification information and the target verification information.
In a third aspect, an embodiment of the present invention further provides a two-dimensional code generating apparatus, including:
the information generating module is used for acquiring a target object corresponding to the two-dimensional code generating instruction and generating at least one piece of verification information matched with the target object;
the relation establishing module is used for establishing and storing a corresponding relation between the target object and the at least one piece of verification information;
and the two-dimensional code generating module is used for generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information in the two-dimensional code can be directly identified by human eyes.
In a fourth aspect, an embodiment of the present invention further provides a two-dimensional code identification device, including:
the two-dimensional code recognition system comprises a two-dimensional code acquisition module, a recognition module and a recognition module, wherein the two-dimensional code acquisition module is used for acquiring a two-dimensional code to be recognized, the two-dimensional code to be recognized comprises at least one piece of target verification information, and the target verification information can be directly recognized by human eyes;
the information acquisition module is used for analyzing a target object included in the two-dimensional code to be identified and acquiring at least one item of standard verification information which is prestored and matched with the target object;
and the two-dimension code verification module is used for verifying the two-dimension code to be recognized according to the standard verification information and the target verification information.
In a fifth aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the two-dimensional code generation method provided in any embodiment of the present invention.
In a sixth aspect, an embodiment of the present invention further provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the two-dimensional code generation method provided in any embodiment of the present invention.
In a seventh aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the two-dimensional code recognition method provided by any embodiment of the invention.
In an eighth aspect, an embodiment of the present invention further provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the two-dimensional code recognition method provided in any embodiment of the present invention.
The embodiment of the invention generates at least one piece of verification information matched with the target object aiming at the corresponding target object; establishing and storing a corresponding relation between a target object and verification information; and generating a matched two-dimensional code according to the verification information and the target object. When the two-dimensional code is identified, analyzing a target object included in the two-dimensional code to be identified, and acquiring pre-stored standard verification information matched with the target object; according to the standard verification information and the target verification information, the two-dimensional code to be recognized is verified, the problem that the two-dimensional code in the prior art is lack of an anti-counterfeiting function is solved, the common two-dimensional code is upgraded, the anti-counterfeiting function is achieved, and therefore the safety of the two-dimensional code is improved.
Drawings
Fig. 1 is a schematic structural diagram of a conventional QR two-dimensional code in the prior art;
fig. 2 is a flowchart of a two-dimensional code generation method according to an embodiment of the present invention;
fig. 3 is a flowchart of a two-dimensional code generation method according to a second embodiment of the present invention;
fig. 4 is a schematic diagram of a two-dimensional code with an anti-counterfeit function according to a second embodiment of the present invention;
fig. 5 is a flowchart of a two-dimensional code recognition method according to a third embodiment of the present invention;
fig. 6 is a schematic diagram of a verification interface after two-dimensional codes are identified according to a third embodiment of the present invention;
fig. 7 is a schematic diagram of a two-dimensional code verification passing interface according to a third embodiment of the present invention;
fig. 8 is a schematic diagram of a two-dimensional code verification failure interface according to a third embodiment of the present invention;
fig. 9 is a schematic diagram of a two-dimensional code generating apparatus according to a fourth embodiment of the present invention;
fig. 10 is a schematic view of a two-dimensional code recognition apparatus according to a fifth embodiment of the present invention;
fig. 11 is a schematic structural diagram of a computer device according to a sixth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention.
It should be further noted that, for the convenience of description, only some but not all of the relevant aspects of the present invention are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 2 is a flowchart of a two-dimensional code generation method according to an embodiment of the present invention, where the embodiment is applicable to a case of generating a two-dimensional code, and the method may be executed by a two-dimensional code generation apparatus, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a two-dimensional code generation device (e.g., a mobile phone, a tablet computer, or a server), as shown in fig. 2, the method includes the following operations:
s110, acquiring a target object corresponding to the two-dimensional code generating instruction, and generating at least one piece of verification information matched with the target object.
The two-dimensional code generation instruction can be acquired by triggering a corresponding function key, and can also be identified and acquired by a corresponding code or program aiming at certain triggering operation. The target object may be any web page or link of a website, or may be a text, a picture or other file. Any object that can be made into a two-dimensional code can be taken as a target object, which is not limited in the embodiment of the present invention. The verification information is information for verifying the two-dimensional code, and may include numbers, letters, other types of characters, pictures, and the like. Any information that can be used for verifying the two-dimensional code can be used as the verification information, which is not limited in the embodiment of the present invention.
In the embodiment of the present invention, the target object for generating the two-dimensional code corresponding to the two-dimensional code generation instruction is obtained, and the target object may be obtained by copying or inputting a web page link, or by obtaining a local storage path of the target object (text, picture, other file, or the like). Of course, a person skilled in the art may also establish other methods for obtaining the target object in the technical background of the present technical solution according to the common general knowledge, which is not limited in the embodiment of the present invention. In order to ensure that the generated two-dimensional code has an anti-counterfeiting function, after the target image is obtained, at least one piece of verification information matched with the target object needs to be generated for verifying the two-dimensional code.
S120, establishing and storing a corresponding relation between the target object and the at least one piece of verification information.
Correspondingly, in order to realize the anti-counterfeiting function of verifying the two-dimensional code by using the verification information, a corresponding relationship needs to be established and stored between the target object and the generated verification information. Optionally, the corresponding relationship between the target object and the verification information may be stored in the setting database.
S130, generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information in the two-dimensional code can be directly identified by human eyes.
In the embodiment of the invention, the process of generating the matched two-dimensional code according to the verification information and the target object is similar to the traditional process of generating the QR two-dimensional code, and two main processes of data analysis and data coding are required. Wherein, the data analysis comprises determining the type of the coded character and converting the coded character into a symbolic character according to a corresponding character set; and selecting an error correction level, wherein the higher the error correction level is, the smaller the real data capacity is under the condition of a certain specification. Data encoding involves converting data characters into a bit stream, which collectively constitutes a sequence of codewords for the data. The data code word sequence reflects the data content of the two-dimensional code. The embodiment of the invention needs to add an additional verification information generation process besides the processes of data analysis and data coding.
It should be noted that, in the two-dimensional code according to the embodiment of the present invention, the verification information can be directly recognized by human eyes. The advantage of setting up like this is when the user verifies the two-dimensional code, and the user of being convenient for seeks and checks the verification information that includes in the two-dimensional code fast to shorten the verification time of two-dimensional code.
In an optional embodiment of the present invention, the two-dimensional code comprises a symbol; wherein, the color of the code element comprises black, white or color, and the size of the code element is smaller than the size of the code element in the standard two-dimensional code.
Wherein the symbol is a minimum unit in the two-dimensional code. As shown in fig. 1, a "small square" a in a two-dimensional code is a symbol. The color of the code element is not limited in the embodiment of the invention, but for the convenience of identifying the two-dimensional code, the color of the code element in the two-dimensional code is covered by a dark color, the color of the background of the two-dimensional code is covered by a light color, the color is softened and excessive as much as possible, and the color edge is avoided. The code elements of the two-dimensional code have stronger brightness contrast with the background color.
It should be noted that, if the two-dimensional code is directly recognized by using computer recognition software on a computer, one pixel corresponds to one code element and can be recognized. However, the QR two-dimensional code is generally recognized by a mobile phone camera, and in this case, a symbol corresponding to one pixel cannot be recognized by the mobile phone camera. The size of the traditional QR two-dimensional code is generally 0.42 mm/code element or more, and the size is 10 orders of magnitude-1And the above. The code element in the embodiment of the invention is different from the traditional QR two-dimensional code, and in order to prevent the two-dimensional code from being widely copied after being printed, the size of the code element is smaller than that of the code element in the standard two-dimensional code, the minimum size can be 0.076mm, and the order of magnitude reaches 10-2. Codes of this order of magnitudeAfter the meta-printing is not easily copied.
The embodiment of the invention generates at least one piece of verification information matched with the target object aiming at the corresponding target object; establishing and storing a corresponding relation between a target object and verification information; according to the verification information and the target object, the matched two-dimensional code is generated, the problems that the two-dimensional code is very easy to copy and lacks of an anti-counterfeiting function after being printed in the prior art are solved, the common two-dimensional code is upgraded, the common two-dimensional code has the anti-counterfeiting function and physical characteristics that the common two-dimensional code is not easy to copy, and therefore the safety of the two-dimensional code is improved.
Example two
Fig. 3 is a flowchart of a two-dimensional code generation method according to a second embodiment of the present invention, which is embodied on the basis of the above-mentioned embodiment, and in this embodiment, different technical solutions are provided for generating at least one piece of verification information matched with the target object and correspondingly generating a two-dimensional code identification area matched with the target object, as shown in fig. 3, the method according to the second embodiment of the present invention includes the following operations:
s210, acquiring a target object corresponding to the two-dimensional code generating instruction, and generating at least one piece of verification information matched with the target object.
The verification information may specifically include: the unique identity identifier, the recognizable identifier and the verification identifier, and accordingly, the S210 can be further refined into three parallel steps of S210a, S210b and S210 c.
S210a, generating a unique identity which is matched with the target object and has a set digit and is used as verification information according to a preset identity generation rule; wherein, the unique identity includes: letters, and/or numbers.
The identity generation rule may be a rule or a method corresponding to a character string for generating a unique letter or number combination. There are many mature methods for generating character strings of unique letter or number combinations in the prior art, and the embodiments of the present invention are not listed. The set number of bits may be 10 bits, 11 bits, or 12 bits, and specifically may be designed according to the size of the side length of the two-dimensional code pattern and the generation number of the two-dimensional code, which is not limited in the embodiment of the present invention.
In the embodiment of the present invention, the identity may be generated randomly or according to a certain rule, but no matter which generation method is adopted, it is necessary to ensure that the generated identity has uniqueness. To preserve aesthetics, embodiments of the present invention may first select a multi-digit alphanumeric and/or numeric combination of identifiers to generate a large number of unique identifiers. When the number of the identification marks formed by letters and/or numbers reaches a limit, other symbols can be considered to be added to form the identification marks. Therefore, the identity can identify the unique two-dimensional code.
S210b, generating a recognizable identifier matched with the target object as verification information according to a preset recognizable identifier generation rule; wherein the recognizable identifier comprises: letters, numbers, or recognizable patterns.
The recognizable mark generation rule may be randomly generating a letter, a number or a recognizable pattern. It should be noted that the distinguishable identifiers included in the different two-dimensional codes may be the same, that is, the distinguishable identifiers may not have uniqueness, as long as the distinguishable identifiers can be directly identified by the human eyes of the user.
S210c, generating a verification identifier matched with the target object as verification information according to a preset verification identifier generation rule; wherein the verification identification comprises: letters, and/or numbers, and the authentication identification matches the identification.
The verification identifier generation rule may randomly generate a preset number of character strings, where the preset number may be 6, 8, or 9, and the like, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, the verification identifier is used for further verifying the generated two-dimensional code. The verification mark can be matched with computer equipment for further logic verification, so that the anti-counterfeiting function of the two-dimensional code is further enhanced. Optionally, the verification identifier is a randomly generated number sequence, so that when the verification identifier is matched with a computer device for verification, the user operation is facilitated. Similarly, the verification identifiers included in different two-dimensional codes may also be the same, that is, the verification identifiers may not have uniqueness, but need to correspond to the identity identifiers of the two-dimensional codes.
S220, establishing and storing a corresponding relation between the target object and the at least one piece of verification information.
And S230, generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information in the two-dimensional code can be directly identified by human eyes.
S230a, generating a two-dimensional code identification area matched with the target object; and arranging the identity mark at a first set position outside the two-dimension code identification area to form the matched two-dimension code.
The first setting position may be above, below, left, or right of the two-dimensional code, and in order to maintain the aesthetic property of the two-dimensional code, the first setting position is optionally set to be above the two-dimensional code.
Specifically, when the unique identity is used as the verification information, the identification information of the identity such as a fixed "ID" or a "serial number" may be added before the identity. Fig. 4 is a schematic diagram of a two-dimensional code with an anti-counterfeiting function according to a second embodiment of the present invention, and as shown in fig. 4, an identifier "J3123456789" corresponding to an area a marked by a dashed box is an identity identifier, and an "ID" is identification information of the identity identifier.
S230b, generating a two-dimensional code identification area matched with the target object; and arranging the recognizable mark in the two-dimension code recognition area to form the matched two-dimension code.
The two-dimensional code identification area is an area where a user uses a two-dimensional code to identify, and generally, the area is a square area. As shown in fig. 4, the mark "W" corresponding to the area B marked by the dashed line is the recognizable mark.
It should be noted that the recognizable pattern in the recognizable mark in the embodiment of the present invention is different from a head portrait or a company logo included in the conventional QR two-dimensional code. Patterns such as an avatar or a company logo included in a conventional QR two-dimensional code may cover part of data information in a two-dimensional code recognition area, and the patterns and the recognition area covered by the patterns cannot be recognized when the code is scanned. However, since the two-dimensional code has a fault-tolerant capability, the two-dimensional code can be recognized even if a small part of the recognition area is covered by the pattern, provided that the pattern must be smaller than a safe area. Once the pattern covers an area exceeding the safety area, the conventional QR two-dimensional code cannot be recognized. The recognizable pattern in the embodiment of the invention is embedded in the two-dimensional code recognition area, can be recognized during code scanning and does not cover data information in the two-dimensional code recognition area.
S230c, generating a two-dimensional code identification area matched with the target object; and setting the verification identifier at a second set position outside the two-dimension code identification area to form the matched two-dimension code.
The second setting position can be above, below, left or right of the two-dimensional code, and in order to maintain the aesthetic property of the two-dimensional code and correspond to the identity identifier in the two-dimensional code, optionally, the second setting position is set below the two-dimensional code. As shown in fig. 4, the identifier "300766281" corresponding to the region C marked by the dashed box is the verification identifier.
It should be noted that, in the embodiment of the present invention, S210a, S210b, S210c, S220, S230a, S230b, and S230c are exemplarily combined into one embodiment to execute a two-dimensional code generation method, but the embodiment is only one example of the present invention, and S210a, S220, and S230a may also be used; s210b, S220, and S230 b; s210a, S210b, S220, S230a, and S230 b; and S210a, S210c, S220, S230a, and S230c constitute respective embodiments to perform a two-dimensional code generation method.
That is, in the embodiment of the present invention, the identity identifier, the recognizable identifier, and the verification identifier may be set in the two-dimensional code at the same time, or the identity identifier and the recognizable identifier may be set separately, or the identity identifier and the verification identifier may be set at the same time, or the identity identifier and the recognizable identifier may be set at the same time. This is because the authentication mark needs to be matched with the identification mark, so the authentication mark generally needs to be provided together with the identification mark.
It should be noted that, the sequence of S210a and S210b and the sequence of S230a and S230b do not have any precedence, and steps S210a and S230a may be performed first, or steps S210b and S230b may be performed first, or both may be performed in parallel or alternatively.
That is, the embodiment of the present invention does not limit the generation sequence of the two types of verification information, i.e., the identity identifier and the recognizable identifier, in the two-dimensional code, but since the verification identifier is matched with the identity identifier, the generation of the verification identifier is usually performed after the identity identifier.
In an optional embodiment of the present invention, generating a two-dimensional code recognition area matching the target object includes: generating a two-dimensional code functional graph for positioning; the two-dimension code functional graph comprises a positioning graph, the positioning graph is formed by two straight lines formed by black lines and white lines, and the positioning graph can be directly identified by human eyes; generating a two-dimensional code coding region according to the target object; and combining the two-dimension code functional graph with the two-dimension code coding area to obtain the two-dimension code identification area.
The two-dimension code functional graph is mainly used for realizing other auxiliary functions of the two-dimension code. The two-dimensional code encoding area refers to an area including data information corresponding to a target object in the two-dimensional code recognition area. The positioning graph and a positioning graph included in the traditional QR two-dimensional code are generated in the same method, and two straight lines formed by black and white are embedded in a two-dimensional code coding region. The difference is that the positioning pattern included in the traditional QR two-dimensional code cannot be recognized by human eyes, but the positioning pattern in the embodiment of the invention can be directly recognized by human eyes. The advantage of setting up the location figure like this can realize confirming the angle of two-dimensional code fast, corrects the distortion. The two dotted lines L as marked in fig. 4 are the positioning patterns.
It should be noted that, in the two-dimensional code functional graph, in addition to the positioning graph directly identified by human eyes, the two-dimensional code functional graph may further include 3 position detection graphs and correction graphs. As shown in fig. 4, the position detection pattern D is formed by three large black-white square nests, and the large black-white square nests are respectively located at the upper left corner, the upper right corner and the lower left corner of the two-dimensional code, so as to determine the size and the position of the two-dimensional code. The correction graph J is formed by nesting three black-white small squares, so that the center of the two-dimensional code can be conveniently determined, and the distortion can be corrected. The position detection pattern D and the correction pattern J are the same as those in the conventional QR two-dimensional code.
According to the embodiment of the invention, the traditional QR two-dimensional code is upgraded, and the corresponding verification information is added to the traditional QR two-dimensional code so as to verify the two-dimensional code in the process of identifying the two-dimensional code, so that the common two-dimensional code is upgraded, and has an anti-counterfeiting function and physical characteristics which are not easy to copy, and the safety of the two-dimensional code is improved.
EXAMPLE III
Fig. 5 is a flowchart of a two-dimensional code recognition method according to a third embodiment of the present invention, where this embodiment is applicable to a case where a two-dimensional code is verified according to standard verification information matched with a target object and target verification information included in the two-dimensional code, and the method may be executed by a two-dimensional code recognition apparatus, which may be implemented by software and/or hardware, and may be generally integrated in a computer device, as shown in fig. 5, and the method includes the following operations:
s310, acquiring a two-dimensional code to be identified, wherein the two-dimensional code to be identified comprises at least one target verification information, and the target verification information can be directly identified by human eyes.
The target verification information is verification information generated in the generation process of the two-dimensional code to be recognized and is used for verifying the two-dimensional code to be recognized by a user.
S320, analyzing the target object included in the two-dimensional code to be identified, and acquiring at least one item of standard verification information which is pre-stored and matched with the target object.
The standard verification information is verification information which is stored in the generation process of the two-dimensional code to be recognized and is matched with the target object.
Specifically, after the two-dimensional code to be identified is obtained, the two-dimensional code to be identified may be scanned in a general two-dimensional code scanning manner. After scanning, the two-dimensional code including data information can be analyzed to obtain a target object (web page link, text, picture or other files and the like), and at least one item of standard verification information matched with the target object can be obtained.
S330, verifying the two-dimensional code to be recognized according to the standard verification information and the target verification information.
In an optional embodiment of the present invention, verifying the two-dimensional code to be recognized according to the standard verification information and the target verification information includes: providing the standard verification information for a user so that the user can verify the two-dimensional code to be recognized; and/or acquiring target verification information input by a user, and matching the target verification information with the standard verification information to complete verification of the two-dimensional code to be recognized.
In the embodiment of the invention, the standard verification information can be displayed on the left side, the right side or the lower side of the two-dimensional code, so that a user can verify the target verification information included in the two-dimensional code according to the displayed standard verification information. Meanwhile, target verification information can be obtained in a user input mode, and when the target verification information input by the user is successfully matched with the marked verification information included in the two-dimensional code, the two-dimensional code to be identified passes verification.
Fig. 6 is a schematic diagram of a verification interface after two-dimensional code identification according to a third embodiment of the present invention, fig. 7 is a schematic diagram of a two-dimensional code verification pass interface according to a third embodiment of the present invention, and fig. 8 is a schematic diagram of a two-dimensional code verification failure interface according to a third embodiment of the present invention. In a specific example, as shown in fig. 6, after the user uses a computer device (e.g., a mobile phone or a computer) to scan and identify the two-dimensional code on the left side in fig. 6, a verification interface on the right side in fig. 6 pops up for further anti-counterfeit verification of the scanned two-dimensional code. When the two-dimensional code is verified by adopting the three target verification information of the identity identifier, the recognizable identifier and the verification identifier in the second embodiment, the three target verification information are verified in the verification interface respectively. Namely, the identity identifiers "ID: j3123456789 "and recognizable identification" W ", which enables the user to identify the identification" ID: j3123456789 "and the identification" ID: j3123456789 checks whether the two-dimensional code matches the recognizable symbol "W" in the two-dimensional code. Meanwhile, when the two-dimensional code is verified using the verification identifier, an area where the verification identifier is input, i.e., an input area below the submitted verification code in fig. 6, may be displayed in the verification interface. The user inputs the verification identifier '300766281' below the two-dimensional code according to the prompt and clicks the submission, and the verification result is displayed at the verification result of the verification interface. As shown in fig. 7, when the verification code input by the user is consistent with the verification identifier in the two-dimensional code, an interface passing the verification is displayed, and the user jumps to another interface to display the identified target object. As shown in fig. 8, when the verification code input by the user is inconsistent with the verification identifier in the two-dimensional code, an interface with verification failure is displayed, and meanwhile, the user does not jump to another interface to display the identified target object.
According to the embodiment of the invention, the two-dimensional code to be recognized is acquired, the target object included in the two-dimensional code to be recognized is analyzed, at least one item of pre-stored standard verification information matched with the target object is acquired, the two-dimensional code to be recognized is verified according to the standard verification information and the target verification information, the problem that the two-dimensional code in the prior art lacks an anti-counterfeiting function is solved, and the recognized two-dimensional code is verified through the verification information, so that the safety of the two-dimensional code is improved.
Example four
Fig. 9 is a schematic diagram of a two-dimensional code generating apparatus according to a fourth embodiment of the present invention, and as shown in fig. 9, the apparatus includes: an information generating module 410, a relationship establishing module 420 and a two-dimensional code generating module 430, wherein:
the information generating module 410 is configured to acquire a target object corresponding to a two-dimensional code generating instruction and generate at least one piece of verification information matched with the target object;
a relationship establishing module 420, configured to establish and store a corresponding relationship between the target object and the at least one piece of verification information;
and a two-dimension code generating module 430, configured to generate a matched two-dimension code according to the verification information and the target object, where the verification information in the two-dimension code can be directly recognized by human eyes.
The embodiment of the invention generates at least one piece of verification information matched with the target object aiming at the corresponding target object; establishing and storing a corresponding relation between a target object and verification information; according to the verification information and the target object, the matched two-dimensional code is generated, the problem that the two-dimensional code is lack of an anti-counterfeiting function in the prior art is solved, the common two-dimensional code is upgraded, the anti-counterfeiting function is achieved, and therefore the safety of the two-dimensional code is improved.
Optionally, the information generating module 410 is further configured to generate, according to a preset identity generation rule, a unique identity with a set number of bits, which is matched with the target object, as the verification information; wherein, the unique identity includes: letters, and/or numbers; the two-dimensional code generating module 430 is further configured to generate a two-dimensional code identification area matched with the target object; and setting the verification information at a first set position outside the two-dimension code identification area to form the matched two-dimension code.
Optionally, the information generating module 410 is further configured to generate a recognizable identifier matched with the target object as the verification information according to a preset recognizable identifier generating rule; wherein the recognizable identifier comprises: letters, numbers or recognizable patterns; the two-dimensional code generating module 430 is further configured to generate a two-dimensional code identification area matched with the target object; and setting the verification information in the two-dimension code identification area to form the matched two-dimension code.
Optionally, the information generating module 410 is further configured to generate, according to a preset verification identifier generating rule, a verification identifier matched with the target object as verification information; wherein the verification identification comprises: letters and/or numbers, and the verification identifier is matched with the identity identifier; the two-dimensional code generating module 430 is further configured to generate a two-dimensional code identification area matched with the target object; and setting the verification information at a second set position outside the two-dimension code identification area to form the matched two-dimension code.
Optionally, the two-dimensional code includes a symbol; wherein, the color of the code element comprises black, white or color, and the size of the code element is smaller than the size of the code element in the standard two-dimensional code.
Optionally, the two-dimensional code generating module 430 is further configured to generate a two-dimensional code functional graph for positioning; the two-dimension code functional graph comprises a positioning graph, the positioning graph is formed by two straight lines formed by black lines and white lines, and the positioning graph can be directly identified by human eyes; generating a two-dimensional code coding region according to the target object; and combining the two-dimension code functional graph with the two-dimension code coding area to obtain the two-dimension code identification area.
The two-dimensional code generation device can execute the two-dimensional code generation method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For details of the two-dimensional code generation method, reference may be made to the two-dimensional code generation method provided in any embodiment of the present invention.
EXAMPLE five
Fig. 10 is a schematic view of a two-dimensional code recognition apparatus according to a fifth embodiment of the present invention, and as shown in fig. 10, the apparatus includes: two-dimensional code acquisition module 510, information acquisition module 520 and two-dimensional code verification module 530, wherein:
a two-dimensional code obtaining module 510, configured to obtain a two-dimensional code to be recognized, where the two-dimensional code to be recognized includes at least one piece of target verification information, and the target verification information can be directly recognized by human eyes;
the information acquisition module 520 is configured to analyze a target object included in the two-dimensional code to be identified and acquire at least one item of standard verification information that is pre-stored and matched with the target object;
and a two-dimension code verification module 530, configured to verify the two-dimension code to be recognized according to the standard verification information and the target verification information.
According to the embodiment of the invention, the two-dimensional code to be recognized is acquired, the target object included in the two-dimensional code to be recognized is analyzed, at least one item of pre-stored standard verification information matched with the target object is acquired, the two-dimensional code to be recognized is verified according to the standard verification information and the target verification information, the problem that the two-dimensional code in the prior art lacks an anti-counterfeiting function is solved, and the recognized two-dimensional code is verified through the verification information, so that the safety of the two-dimensional code is improved.
Optionally, the two-dimensional code verification module 530 is further configured to provide the standard verification information to a user, so that the user verifies the two-dimensional code to be recognized; and/or acquiring target verification information input by a user, and matching the target verification information with the standard verification information to complete verification of the two-dimensional code to be recognized.
The two-dimension code recognition device can execute the two-dimension code recognition method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For details of the two-dimensional code identification method provided in any embodiment of the present invention, reference may be made to the technical details that are not described in detail in this embodiment.
EXAMPLE six
Fig. 11 is a schematic structural diagram of a computer device according to a sixth embodiment of the present invention. FIG. 11 illustrates a block diagram of a computer device 612 suitable for use in implementing embodiments of the present invention. The computer device 612 shown in fig. 11 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present invention.
As shown in FIG. 11, computer device 612 is in the form of a general purpose computing device. Components of computer device 612 may include, but are not limited to: one or more processors 616, a memory device 628, and a bus 618 that couples the various system components including the memory device 628 and the processors 616.
Bus 618 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an enhanced ISA bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus.
Computer device 612 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 612 and includes both volatile and nonvolatile media, removable and non-removable media.
Storage 628 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) 630 and/or cache Memory 632. The computer device 612 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 634 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 11, and commonly referred to as a "hard drive"). Although not shown in FIG. 11, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk-Read Only Memory (CD-ROM), a Digital Video disk (DVD-ROM), or other optical media) may be provided. In such cases, each drive may be connected to bus 618 by one or more data media interfaces. Storage device 628 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program 636 having a set (at least one) of program modules 626 may be stored, for example, in storage device 628, such program modules 626 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may include an implementation of a network environment. Program modules 626 generally perform the functions and/or methodologies of embodiments of the invention as described herein.
Computer device 612 may also communicate with one or more external devices 614 (e.g., keyboard, pointing device, camera, display 624, etc.), with one or more devices that enable a user to interact with computer device 612, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 612 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 622. Further, computer device 612 may also communicate with one or more networks (e.g., a Local Area Network (LAN), Wide Area Network (WAN), and/or a public Network, such as the internet) via Network adapter 620. As shown, the network adapter 620 communicates with the other modules of the computer device 612 via the bus 618. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the computer device 612, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape drives, and data backup storage systems, to name a few.
The processor 616 executes programs stored in the storage device 628, so as to execute various functional applications and data processing, for example, implement the two-dimensional code generation method provided in the foregoing embodiment of the present invention, and implement the two-dimensional code identification method provided in the foregoing embodiment of the present invention.
Generating, by the computer device, at least one verification information matching a target object for a corresponding target object; establishing and storing a corresponding relation between a target object and verification information; and generating a matched two-dimensional code according to the verification information and the target object. When the two-dimensional code is identified, analyzing a target object included in the two-dimensional code to be identified, and acquiring pre-stored standard verification information matched with the target object; according to the standard verification information and the target verification information, the two-dimensional code to be recognized is verified, the problem that the two-dimensional code in the prior art is lack of an anti-counterfeiting function is solved, the common two-dimensional code is upgraded, the anti-counterfeiting function is achieved, and therefore the safety of the two-dimensional code is improved.
EXAMPLE seven
An embodiment of the present invention further provides a computer storage medium storing a computer program, where the computer program is used to execute the two-dimensional code generation method and the two-dimensional code identification method according to any one of the above embodiments of the present invention when executed by a computer processor.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM) or flash Memory), an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, Radio Frequency (RF), etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1. A two-dimensional code generation method is characterized by comprising the following steps:
acquiring a target object corresponding to a two-dimensional code generation instruction, and generating at least one piece of verification information matched with the target object;
establishing and storing a corresponding relation between the target object and the at least one piece of verification information;
generating a matched two-dimensional code according to the verification information and the target object, wherein the verification information can be directly identified by human eyes in the two-dimensional code;
the generating at least one verification information matching the target object comprises:
generating a recognizable identifier matched with the target object as verification information according to a preset recognizable identifier generation rule; wherein the recognizable identifier comprises: letters, numbers or recognizable patterns;
generating a matched two-dimensional code according to the verification information and the target object, wherein the matched two-dimensional code comprises the verification information and the target object;
generating a two-dimensional code identification area matched with the target object;
setting the verification information in the two-dimension code identification area to form the matched two-dimension code;
the recognizable pattern is embedded in the two-dimension code area and does not cover data information in the two-dimension code identification area.
2. The method of any of claims 1, wherein the two-dimensional code comprises symbols;
wherein, the color of the code element comprises black, white or color, and the size of the code element is smaller than the size of the code element in the standard two-dimensional code.
3. The method of any one of claims 1, wherein generating a two-dimensional code identification area that matches the target object comprises:
generating a two-dimensional code functional graph for positioning;
the two-dimension code functional graph comprises a positioning graph, the positioning graph is formed by two straight lines formed by black lines and white lines, and the positioning graph can be directly identified by human eyes;
generating a two-dimensional code coding region according to the target object;
and combining the two-dimension code functional graph with the two-dimension code coding area to obtain the two-dimension code identification area.
4. A two-dimensional code recognition method is characterized by comprising the following steps:
acquiring a two-dimensional code to be identified, wherein the two-dimensional code to be identified comprises at least one piece of target verification information which can be directly identified by human eyes;
analyzing a target object included in the two-dimensional code to be identified, and acquiring at least one item of standard verification information which is prestored and matched with the target object;
verifying the two-dimension code to be recognized according to the standard verification information and the target verification information;
the target verification information generation mode comprises the following steps:
generating a recognizable identifier matched with the target object as verification information according to a preset recognizable identifier generation rule; wherein the recognizable identifier comprises: letters, numbers or recognizable patterns;
generating a matched two-dimensional code according to the verification information and the target object, wherein the matched two-dimensional code comprises the verification information and the target object;
generating a two-dimensional code identification area matched with the target object;
setting the verification information in the two-dimension code identification area to form the matched two-dimension code;
the recognizable pattern is embedded in the two-dimension code area and does not cover data information in the two-dimension code identification area.
5. The method of claim 4, wherein verifying the two-dimensional code to be recognized according to the standard verification information and the target verification information comprises:
providing the standard verification information for a user so that the user can verify the two-dimensional code to be recognized; and/or
And acquiring target verification information input by a user, and matching the target verification information with the standard verification information to complete verification of the two-dimensional code to be recognized.
6. A computer device, characterized in that the computer device comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the two-dimensional code generation method according to any one of claims 1 to 3, or the two-dimensional code recognition method according to any one of claims 4 to 5.
7. A computer storage medium on which a computer program is stored, characterized in that the program, when executed by a processor, implements a two-dimensional code generation method as claimed in any one of claims 1 to 3, or implements a two-dimensional code recognition method as claimed in any one of claims 4 to 5.
CN201810437810.1A 2018-05-09 2018-05-09 Two-dimensional code generation and identification method and device, computer equipment and storage medium Expired - Fee Related CN108665041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810437810.1A CN108665041B (en) 2018-05-09 2018-05-09 Two-dimensional code generation and identification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810437810.1A CN108665041B (en) 2018-05-09 2018-05-09 Two-dimensional code generation and identification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108665041A CN108665041A (en) 2018-10-16
CN108665041B true CN108665041B (en) 2021-08-03

Family

ID=63778942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810437810.1A Expired - Fee Related CN108665041B (en) 2018-05-09 2018-05-09 Two-dimensional code generation and identification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108665041B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111209766B (en) * 2018-11-22 2023-09-01 奇酷互联网络科技(深圳)有限公司 Two-dimensional code identification method, intelligent terminal and device with storage function
CN109829349A (en) * 2018-12-20 2019-05-31 天翼电子商务有限公司 Promote two dimensional code safety in utilization method, system, storage medium and device
CN109739233B (en) * 2018-12-29 2022-06-14 歌尔光学科技有限公司 AGV trolley positioning method, device and system
CN110111461B (en) * 2019-04-30 2022-11-01 尤尼泰克(嘉兴)信息技术有限公司 Two-dimensional code-based pass offline identification method and device
CN111222610B (en) * 2020-01-09 2022-09-02 周晓明 Coding and decoding method and system for double-ID two-dimensional code micro-code element
CN114758327A (en) * 2020-02-25 2022-07-15 支付宝(杭州)信息技术有限公司 Method, device and equipment for identifying risks in code image
CN112837446A (en) * 2020-12-28 2021-05-25 重庆医药高等专科学校 Linkage human resource data cabinet by using mobile handheld intelligent terminal
CN114036320B (en) * 2022-01-10 2022-05-13 浙江万维空间信息技术有限公司 Two-dimensional code generation method and device for plot full-life-cycle map
CN114826601B (en) * 2022-03-22 2024-04-02 南京宁东远信息科技有限公司 Hybrid identification code and generation method, compiling method and system thereof
CN115310572B (en) * 2022-08-05 2024-04-16 蚂蚁区块链科技(上海)有限公司 Graphic code generation method and graphic code verification method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007293836A (en) * 2007-03-30 2007-11-08 Denso Wave Inc Method for reading information code printing medium and system for reading information code printing medium
CN104346640A (en) * 2013-08-08 2015-02-11 李润容 Two dimensional code and method of creating same
CN104778489A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Combined anti-counterfeit label, and generation method and generation device of combined anti-counterfeit label
CN104899748A (en) * 2014-10-17 2015-09-09 陈谦 Two-dimensional code and scratch-off code composite identifying method based on identity authentication technology
CN105740931A (en) * 2016-02-05 2016-07-06 上海孔诚物联网科技股份有限公司 Multidimensional anti-counterfeiting code as well as manufacture method and recognition method thereof
CN106650545A (en) * 2016-09-30 2017-05-10 浙江涵信科技有限公司 Anti-counterfeiting two-dimensional code tracing label and the method for generating and identifying the same
CN206348843U (en) * 2016-12-09 2017-07-21 北京大码技术有限公司 Combined two-dimension code anti-fake system, reading device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103093173A (en) * 2011-11-02 2013-05-08 李华容 Anti-fake method, anti-fake label and label manufacture method
CN107506816B (en) * 2017-08-15 2021-09-03 大连中盈科技股份有限公司 Two-dimensional code label, commodity anti-counterfeiting code label and commodity anti-counterfeiting analysis method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007293836A (en) * 2007-03-30 2007-11-08 Denso Wave Inc Method for reading information code printing medium and system for reading information code printing medium
CN104346640A (en) * 2013-08-08 2015-02-11 李润容 Two dimensional code and method of creating same
CN104899748A (en) * 2014-10-17 2015-09-09 陈谦 Two-dimensional code and scratch-off code composite identifying method based on identity authentication technology
CN104778489A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Combined anti-counterfeit label, and generation method and generation device of combined anti-counterfeit label
CN105740931A (en) * 2016-02-05 2016-07-06 上海孔诚物联网科技股份有限公司 Multidimensional anti-counterfeiting code as well as manufacture method and recognition method thereof
CN106650545A (en) * 2016-09-30 2017-05-10 浙江涵信科技有限公司 Anti-counterfeiting two-dimensional code tracing label and the method for generating and identifying the same
CN206348843U (en) * 2016-12-09 2017-07-21 北京大码技术有限公司 Combined two-dimension code anti-fake system, reading device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于二维码的信息隐藏方法;孙浩天 等;《电脑知识与技术》;20160630;第12卷(第16期);第77-80页 *

Also Published As

Publication number Publication date
CN108665041A (en) 2018-10-16

Similar Documents

Publication Publication Date Title
CN108665041B (en) Two-dimensional code generation and identification method and device, computer equipment and storage medium
US11210510B2 (en) Storing anonymized identifiers instead of personally identifiable information
US11349666B2 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
US20150235118A1 (en) Two-Dimensional Barcodes Having A Plurality of Different Regions
WO2014098136A1 (en) Information code, method for generating information code, device for reading information code, and system for using information code
CN110785773B (en) Bill identification system
RU2634194C1 (en) Verification of optical character recognition results
JP6403085B1 (en) Composite code pattern, generating device, reading device, method and program
CN112508145B (en) Electronic seal generation and verification method and device, electronic equipment and storage medium
US20180033020A1 (en) System and apparatus for detecting forgery features on identification documents
CA2954089A1 (en) Systems and methods for authentication of physical features on identification documents
CN113887689A (en) Method and system for printing forensic-encoded 2D barcodes
US9830756B1 (en) Resolving card malfunctions using card information access control
US20160078333A1 (en) Encoding an information object
CN112818852A (en) Seal checking method, device, equipment and storage medium
JP2015121830A (en) Information code use system, generation method for information code, information code, and information code reading device
US10685105B2 (en) Encoding of security codes
US10902278B2 (en) Image processing apparatus, image processing system, computer program product, and image processing method
US20150193900A1 (en) Composite device and application process and apparatus thereof
CN110764685A (en) Method and device for identifying two-dimensional code
US8649055B2 (en) Image processing apparatus and computer readable medium
Mantoro et al. Real-time printed document authentication using watermarked qr code
CN111476090A (en) Watermark identification method and device
US11755757B1 (en) Methods and systems for determining the authenticity of an identity document
US11438182B2 (en) Human- and machine-readable cryptographic keys from dice

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210803

CF01 Termination of patent right due to non-payment of annual fee