Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimensional code-based object identity dual-code identification method

A two-dimensional code and article technology, which is applied in the field of anti-counterfeiting and identification, can solve the problems of not being able to use coating to cover, increase the complexity of production process and production cost, increase the risk of counterfeiting, realize product anti-counterfeiting and integral management, and simplify The effect of the production process

Active Publication Date: 2012-09-12
SIGMATRIX TECH CO LTD
View PDF6 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical difficulty here is that the anti-counterfeiting code is connected to the background database, and coating coverage is required to ensure that only one query is valid. However, the query codes used for anti-smuggling and logistics management are plain codes and cannot be covered by coating, so that each logistics point and inspection points can be queried at any time
In this way, in order to achieve anti-counterfeiting and anti-channeling at the same time, two sets of coding systems are usually required, which increases the complexity and production cost of the production process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code-based object identity dual-code identification method
  • Two-dimensional code-based object identity dual-code identification method
  • Two-dimensional code-based object identity dual-code identification method

Examples

Experimental program
Comparison scheme
Effect test

application example 1

[0047] Application example 1: product anti-counterfeiting

[0048] Currently, two-dimensional code recognition software installed on smart terminals is becoming more and more popular. Some people have proposed the technical idea of ​​using two-dimensional codes for product anti-counterfeiting, but the common practice is to cover all or part of the coating on the two-dimensional code. QR code, and submit the data to the background database to verify the authenticity of the item. This simple two-dimensional code anti-counterfeiting method cannot solve the anti-counterfeiting query problem before the user purchases the product, so the user's enthusiasm for using it is not high.

[0049] In the double-code identification method provided by the present invention, the user can know the authenticity of the product before purchasing, and can also verify the auxiliary code after purchasing. The specific operation process is as follows:

[0050] (1) The user uses an intelligent termi...

application example 2

[0056] Application Example 2: Points Management

[0057] In order to encourage consumers to conduct anti-counterfeiting inquiries, the anti-counterfeiting inquiry of auxiliary codes and point management can be combined, so that users can obtain consumption points when conducting anti-counterfeiting inquiries, thereby greatly enhancing consumers' inquiry enthusiasm.

[0058] The operation process of point management is as follows:

[0059] (1) The user uses an intelligent terminal with two-dimensional code recognition software to take pictures of the two-dimensional code generated by the main code;

[0060] (2) Send the identified main code data content to the background server through the wired / wireless network for verification;

[0061] (3) The background server returns the operation page with the auxiliary code input box, prompting the user to input the auxiliary code;

[0062] (4) The user enters the auxiliary code, and after clicking Confirm, the data is sent to the back...

application example 3

[0065] Application Example 3: Item Uniqueness Authentication

[0066] With the development of the national economy, users have more and more demands for collectibles. An important feature of collectibles is the need to ensure the uniqueness of items, which is the key to maintaining and increasing the value of collectibles. Users hope that it is easy to identify the authenticity of collectibles, and manufacturers also hope that their own collectibles will not be counterfeited. The double-code identification method provided by the present invention has a good uniqueness authentication function of items, and can be applied to authenticity authentication of collectibles. The specific operation process is as Figure 7 shown, including the following steps:

[0067] (1) The user uses an intelligent terminal with two-dimensional code recognition software to take pictures of the two-dimensional code generated by the main code;

[0068] (2) Send the identified main code data content...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed in the invention is a two-dimensional code-based object identity dual-code identification method. According to the method, a two-dimensional code is used as a primary code and numbers or letters are used as a secondary code; and the two codes are combined together to carry out identification on uniqueness of an object. Besides, two-dimensional code identification software is utilized to rapidly identify a two-dimensional code corresponding to the primary code; if it is necessary to carry out anti-counterfeiting query and point management, a coating layer can be revealed and the secondary code is further input. Because the length of the secondary code is short and the inputting process is simple, the provided method has good applicability; and meanwhile, multiple functions including a product anti-counterfeiting function, goods-fleeing prevention, logistics management, tracking of source tracing and point management can be realized.

Description

technical field [0001] The invention relates to a method for identifying the identity of an item, in particular to a method for identifying the uniqueness of the identity of an item (or commodity, product) by combining a main code and an auxiliary code based on a two-dimensional code, which belongs to anti-counterfeiting technology field. Background technique [0002] Currently, fake goods have become a worldwide public hazard. The economic losses caused by counterfeit goods in the world are no less than hundreds of billions of dollars every year. Therefore, governments and enterprises of various countries are adopting powerful measures to carry out anti-counterfeiting work on relevant commodities. For example, from October 2010 to March 2011, China launched special campaigns to crack down on intellectual property infringement and the production and sale of counterfeit and shoddy goods, effectively curbing the further spread of counterfeit and shoddy goods. [0003] The s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00G06K19/06G06K7/10
Inventor 吴林崔征
Owner SIGMATRIX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products