Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-counterfeiting method and system of two-dimensional code for tracing

A technology of two-dimensional codes and users, which is applied in the anti-counterfeiting method and system field of two-dimensional codes for traceability, and can solve the problems that barcode technology does not have anti-counterfeiting capabilities, negatively affects the credibility of product quality traceability systems, and cannot meet traceability requirements, etc.

Pending Publication Date: 2019-07-05
LANZHOU CITY UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the generation of two-dimensional codes needs to strictly follow the relevant standards. Barcode technology itself does not have any anti-counterfeiting capabilities, so once the traceability barcode is copied by others and pasted on fake and shoddy products, it will have a great impact on the credibility of the product quality traceability system. big negative impact
[0005] In addition, in order to achieve the purpose of anti-counterfeiting, some product quality traceability systems require that the traceability code can only be used once, which cannot meet all the traceability needs of users in various links such as warehousing, transportation, and sales.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeiting method and system of two-dimensional code for tracing
  • Anti-counterfeiting method and system of two-dimensional code for tracing
  • Anti-counterfeiting method and system of two-dimensional code for tracing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] refer to figure 1 , in the query stage of traceability information, the anti-counterfeiting method of the traceability two-dimensional code of the present invention comprises:

[0035] S100. The user terminal scans the two-dimensional code for traceability, generates a traceability information query request according to the mobile phone number input by the user, and sends it to the server.

[0036] Among them, the traceability information inquiry request carries the QR code identification and the mobile phone number. The user terminal can be a smart terminal with a camera such as a smart phone, a smart tablet, etc. In practical applications, the QR code for traceability can be scanned using the existing WeChat, QQ and other APPs of the user terminal; the QR code can be a QR Code , it can also be a Chinese Sensible code, or a two-dimensional code generated by other technologies.

[0037] For the generation process of the traceability QR code, it specifically includes: ...

Embodiment 2

[0043] Based on the methods disclosed in the above embodiments, after the server determines that the mobile phone number in the request has the query authority for the two-dimensional code identification in the request, before feeding back the traceability information corresponding to the two-dimensional code identification to the user terminal, the server may also include the following steps:

[0044] S200. The server sends a dynamic SMS password to the user terminal after determining that the mobile phone number in the request has the right to query the two-dimensional code identifier in the request.

[0045] S201. The user terminal receives the dynamic SMS password, and sends the input dynamic password to the server.

[0046] Specifically, after the user terminal receives the dynamic SMS password, the user can check it by himself and input the dynamic password at a designated location, or the associated program can automatically detect and analyze the received dynamic SMS pa...

Embodiment 3

[0051] Based on the methods disclosed in the above embodiments, the traceability registration and authorization mentioned in Embodiment 1 will be described in detail. Specifically, the traceability registration and authorization process includes the following steps:

[0052] Step S300, the user terminal or the manager terminal scans the QR code for traceability, and sends a new user authorization registration request to the server.

[0053] Among them, the new user authorization registration request carries the new user mobile phone number and the authorization QR code identification.

[0054] Step S301, the server receives the new user authorization registration request, stores the new user's mobile phone number in the user authorization registration database, and includes the authorized QR code identifier into the scope of authority of the new user's mobile phone number, and completes the new user authorization registration operation.

[0055] It should be noted that the reg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-counterfeiting method and system of a two-dimensional code for tracing, and the method comprises the steps: enabling a user terminal to scan the tracing two-dimensional code, and generating a tracing information query request according to a mobile phone number input by a user; the server receives the traceability information query request, judges whether the mobilephone number in the request has a query permission for the two-dimensional code identifier in the request or not, and feeds back traceability information corresponding to the two-dimensional code identifier to the user terminal if the mobile phone number in the request has the query permission for the two-dimensional code identifier; and the user terminal receives and displays the tracing information. In this way, even if the two-dimensional code for tracing is copied and pasted to the counterfeit product by others, other people cannot obtain corresponding correct tracing information due to the fact that the two-dimensional code is scanned without permission qualification. On one hand, the reliability of the traceability system is improved, the consumption rights and interests of the consumers are truly protected, on the other hand, the difficulty that others use the two-dimensional code identification copy and paste to counterfeit is increased, the counterfeit behaviors of the otherscan be restrained to a certain extent, and the benefits of certified merchants are protected.

Description

technical field [0001] The invention relates to the technical field of traceability and anti-counterfeiting, in particular to an anti-counterfeiting method and system of a two-dimensional code for traceability. Background technique [0002] How to crack down on counterfeiting and shoddy products from the root cause? Simply verifying product manufacturer information is far from meeting market demand. While anti-counterfeiting can monitor product raw materials, production, warehousing, and logistics information, it has become the main focus of anti-counterfeiting development in recent years. The anti-counterfeiting traceability system has thus developed into an independent branch of the anti-counterfeiting system and continues to grow. VFRONT information traceability believes that information traceability marks (including QR codes, barcodes, and RFID) determine that they play an important role in anti-counterfeiting traceability, and have become an essential tool for anti-coun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00G06F16/953G06F21/62
CPCG06Q30/0185G06F21/6227
Inventor 丁永军张晶晶蓝才会姚海龙海波
Owner LANZHOU CITY UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products