Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimensional code generation method and application thereof

A technology of two-dimensional code and verification method, which is applied in data processing applications, special data processing applications, collaborative operation devices, etc., can solve time-consuming and labor-intensive problems, achieve high anti-counterfeiting coefficient, improve authenticity and reliability, and improve user experience. Effect

Active Publication Date: 2015-02-04
ANHUI GUOKE TESTING TECH CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. It is necessary to download and install the specified mobile phone client, and the verification code needs to be manually input by the consumer, which is time-consuming and laborious
[0005] 3. QR codes and verification codes are easy to be copied and reused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code generation method and application thereof
  • Two-dimensional code generation method and application thereof
  • Two-dimensional code generation method and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In this embodiment, a method for generating a QR code is as follows:

[0047] Step 1. Define variable i and initialize i=1;

[0048] Step 2. Batch generate traceable source code;

[0049] Step 2.1, use formula (1) to obtain the interval length R of the traceability source code l ;

[0050] R l = l n , 0 R l R max R max , R l ≥ R max - - - ( 1 )

[0051] In formula (1), l represents the length of the source code; n represents the number of generated source code, R max Represents the maximum value of the random function Rand();

[0052] Assuming that the length of the traceability source code is l=9, the traceability source code is generated from 000000000 to 99999999, which can generate up to 1000000000 traceability source codes; assuming that the product needs to generate 100,000 traceability source codes, that is, n=100000, then the formula (1 )Calculate interval length This example is r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimensional code generation method and an application thereof. The method is characterized by including the steps: 1 generating source tracing codes; 2 generating prefix codes; 3 generating Y-bit verification codes; 4 storing the source tracing codes, the prefix codes and the Y-bit verification codes into an anti-fake database, and generating an initial two-dimensional code by the aid of a bar code generator after the source tracing codes and the prefix codes are combined; embedding the Y-bit verification codes into the middle of the initial two-dimensional code to form a two-dimensional code. A lot of two-dimensional codes with high anti-fake performance and difficult simulation can be rapidly and stably generated, so that uniqueness of the two-dimensional code is effectively ensured, and the two-dimensional code is prevented from being copied or repeatedly used.

Description

Technical field [0001] The invention relates to the technical field of two-dimensional code anti-counterfeiting, in particular to a method for generating a two-dimensional code and its application. Background technique [0002] At present, the anti-counterfeiting methods based on QR codes mostly adopt the method of "scan + input": download the designated mobile client and install it, and "scan" the QR code through the mobile client to link to the corresponding website verification interface. "Enter" the verification code in the verification interface, and then the server completes the verification of the authenticity of the verification code, and returns the verification result information to the client to complete the verification of the authenticity of the product. This anti-counterfeiting method has its limitations: [0003] 1. Verify the authenticity of the product through a verification code, with a single method and simple anti-counterfeiting means. [0004] 2. It is necessar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06Q30/00G06F17/30
CPCG06K17/00G06K19/06037G06Q10/0635G06Q30/0185
Inventor 张友华陈莹赵永鑫王庆人胡嘉伟毛瑞彭琼琼金文林吴骏澜徐秀云王萍
Owner ANHUI GUOKE TESTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products