Supercharge Your Innovation With Domain-Expert AI Agents!

Two-dimensional code cutting and splicing authentication method and system

A technology of two-dimensional code and two-dimensional code library, applied in the field of two-dimensional code cutting and splicing authentication method system, can solve the problem of single two-dimensional code being applied to a single scene, etc.

Active Publication Date: 2016-09-21
上海翼码信息科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a two-dimensional code cutting and splicing authentication method or system, which is used to solve the problem in the prior art that a single two-dimensional code can only be applied to a single scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code cutting and splicing authentication method and system
  • Two-dimensional code cutting and splicing authentication method and system
  • Two-dimensional code cutting and splicing authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment provides a two-dimensional code cutting and splicing authentication system, which is applied to a two-dimensional code authentication system composed of an application platform and at least two mobile terminals. The system is as follows: figure 1 As shown, it includes: an application platform, and at least two mobile terminals, wherein the system includes a two-dimensional code library generation module 1, a two-dimensional code cutting module 2, a two-dimensional code distribution module 3, a two-dimensional code receiving module 4, Two-dimensional code reading module 5 , two-dimensional code submission module 6 , two-dimensional code splicing module 7 , and two-dimensional code matching and judging module 8 .

[0046] The two-dimensional code library generation module 1 is used to form a two-dimensional code library from a plurality of two-dimensional code pictures, and systematically number each two-dimensional code picture in the two-dimensional code ...

Embodiment 2

[0056]This embodiment provides a two-dimensional code cutting and splicing authentication method, which is applied to a two-dimensional code authentication system composed of an application platform and at least two mobile terminals. The two-dimensional code cutting and splicing authentication method is as follows: image 3 shown, including:

[0057] S1. Create a two-dimensional code library composed of multiple two-dimensional code pictures, and perform a system number for each two-dimensional code picture in the two-dimensional code library. Wherein, the serial number of each QR code image is unique.

[0058] S2, cutting a two-dimensional code picture in the two-dimensional code library into N parts, and generating a descriptive file for each part; for example, in this embodiment, dividing the two-dimensional code picture into part A and part B, The descriptive documents for Part A include:

[0059] Position Part A description file name

[0060] OX123456789 unique number ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a two-dimensional code cutting and splicing authentication method and system. The method comprises the steps of establishing a two-dimensional code base comprising a plurality of two-dimensional code images, performing system numbering to each two-dimensional code image, cutting one two-dimensional code image into N parts, distributing the N parts of the two-dimensional code image to N mobile terminals, respectively receiving the N parts of the two-dimensional code image through N mobile terminals, reading each part of the two-dimensional code image, obtaining descriptive files attached to all the parts of the two-dimensional code image, submitting read N two-dimensional code images, splicing the N two-dimensional code images, judging whether the spliced two-dimensional code image is matched with an original two-dimensional code image, and accomplishing authentication if the spliced two-dimensional code image is matched with an original two-dimensional code image. The core of the method is to cut the two-dimensional code image into a plurality of parts with irregular shapes, perform numbering to all the parts and finally splice the irregular parts into the original two-dimensional code, thereby realizing that the operation can be accomplished by a plurality cooperative operators at the same time, and obtaining corresponding rights.

Description

technical field [0001] The technical field of two-dimensional code authentication of the present invention, in particular relates to a two-dimensional code cutting and splicing authentication method system. Background technique [0002] Traditionally, if consumers want to take a variety of public transportation such as airplanes, cars and ships, or consumers to go to movie theaters, concert halls, gymnasiums, exhibitions and other places that require vouchers, they need to go to the designated ticket office to buy tickets, and then It takes a lot of time to check tickets at a designated time and place, or when consumers go to restaurants to eat, consumers need to spend a lot of time waiting for seats or waiting for checkout during peak dining hours. Today's consumers can order and purchase tickets through telephone, Internet and other channels. But even so, the problem of ticket delivery has not been resolved, and tickets can only be delivered by manual door-to-door, mail, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/10G06K19/06
Inventor 万青吴庆先范汉星
Owner 上海翼码信息科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More