Credible two-dimensional code system and application method thereof

A two-dimensional code, trusted technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problem of low cost of two-dimensional code, achieve safe and effective supervision, ensure integrity, and prevent counterfeiting. Effect

Inactive Publication Date: 2011-09-28
SOUTH CHINA AGRI UNIV
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the low cost of two-dimensional codes and the openness of the technology, incidents of making fake two-dimensional codes emerge in endlessly. As soon as train tickets, tax invoices and other bills were marked with two-dimensional codes, counterfeit bills were discovered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible two-dimensional code system and application method thereof
  • Credible two-dimensional code system and application method thereof
  • Credible two-dimensional code system and application method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Hereinafter, the present invention will be further described in detail with reference to the examples and drawings, but the implementation of the present invention is not limited thereto.

[0041] Figure 1 to Figure 7 The system structure and flow diagram of the trusted two-dimensional code system and its application method of the present invention are shown. The system includes the following parts:

[0042] 1. Cloud data terminal

[0043] The cloud data terminal includes network data servers such as web servers and mobile SMS ports. The database server includes various individual information of products, certificates, and bills. Through these individual information, the end user can understand the important processes and materials of the product production process, certificates, Information such as the validity period of the bill, the unit of use or personal information, the amount, the issuing unit, the receiving unit, and the issuing time. The web server and mobile SMS ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible two-dimensional code system and an application method thereof. Through an embedded credible two-dimensional code system and an application method thereof, the invention solves the existing problem that a two-dimensional code is easy to counterfeit, ensures integrity, security and confidentiality of the two-dimensional code and develops a new application area of the two-dimensional code used as a data label conventionally, so that the authenticity of two-dimensional code can be checked in all stages of the circulation process, the safety and reliability of the system can be ensured and the phenomenon of counterfeit can be prevented, thereby realizing a safe and effective supervision on products, certificates and bills and the like.

Description

Technical field [0001] The invention relates to a credible method of a two-dimensional code, in particular to a credible two-dimensional code system and an application method thereof. Background technique [0002] Due to the remarkable characteristics of large amount of information and low cost of use, QR codes are now widely used in public security, transportation, taxation, healthcare, industry, commerce, finance, customs and government management. In the circulation process, the QR code is always exposed to the market, and the integrity, security and confidentiality of its information are extremely important. However, due to the low cost of QR codes and the openness of technology, incidents of making counterfeit QR codes have emerged in an endless stream. When tickets such as train tickets and tax invoices were first marked with QR codes, counterfeit bills were discovered. [0003] This requires a secure and reliable QR code system and application method to ensure the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 曹维刘财兴林毅申
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products