Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method

A technology of anti-counterfeiting labels and two-dimensional codes, which is applied to collaborative devices, record carriers used by machines, instruments, etc., can solve the problems of being easy to be copied, and achieve the effect of not easy to copy and good security

Inactive Publication Date: 2016-04-06
SHANGHAI ZHONGSHUO INFORMATION TECH
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current anti-counterfeiting traceability technical solutions and defects: digital two-dimensional codes are directly printed with a series of anti-counterfeiting codes on the two-dimensional codes. When consumers scan and enter the anti-counterfeiting query page, they can directly input this series of anti-counterfeiting codes to check the authenticity
The disadvantage of this anti-counterfeiting technology is that it is easy to be copied, because most anti-counterfeiting companies currently have this technology, which is an open anti-counterfeiting technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
  • Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
  • Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] see figure 1 and figure 2 , the Internet of Things traceability anti-counterfeiting label of this double code includes a QR code, an upper label 1 and a lower label 2; the QR code includes a QR code outer code 3 and a QR code inner code 4; the QR code outer code 3 setting On the upper label 1, it is used for commodity traceability query; the two-dimensional code internal code 4 is set on the lower label 2, used for anti-counterfeiting verification; only the edge is bonded between the upper label 1 and the lower label 2, and the upper label 2 is set. tear mouth. Both the outer code 3 of the QR code and the inner code 4 of the QR code are composed of URL, version number, product ID, service group, carrier category and manufacturer-defined data, and the outer code 3 of the QR code and the inner code of the QR code 4 are all one type of two-part, that is, two-part code; the carrier type of the outer code 3 of the two-dimensional code adopts W to represent the outer code;...

Embodiment 2

[0129] see figure 1 , figure 2 and image 3 , the two-dimensional code anti-counterfeit traceability method includes the following steps:

[0130] Make a double-coded Internet of Things traceability anti-counterfeiting label: the two-dimensional code includes the outer code 3 of the two-dimensional code and the inner code 4 of the two-dimensional code; set the outer code 3 of the two-dimensional code on the upper label 1 for commodity traceability query; The inner code 4 of the two-dimensional code is set on the lower label 2 for anti-counterfeiting verification; only the edge is bonded between the upper label 1 and the lower label 2 and there is a tear on the upper label 1; the outer code 3 of the two-dimensional code and the second The internal code 4 of the two-dimensional code is composed of URL, version number, product ID, service group, carrier category, and manufacturer-defined data, and the external code 3 of the two-dimensional code and the internal code 4 of the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a duplicate coding internet of things traceability security label, comprising a 2-dimensional bar code, an upper layer label and a lower layer label. The 2-dimensional bar code comprises a 2-dimensional bar code external code and a 2-dimensional bar code internal code, wherein the 2-dimensional bar code external code is arranged on the upper layer label and used for goods traceablility querying; the 2-dimensional bar code internal code is arranged on the lower layer label and used for security verification; the upper layer label and the lower layer label only have edges jointed, and the upper layer label is provided with a tearing port; the 2-dimensional bar code internal code is used for a consumer to perform network security verification through handset scanning, the security verification being performed only once. After security verification, the security function of the 2-dimensional bar code internal code is immediately disabled, and scanning the 2-dimensional bar code internal code is equal to scanning a torn 2-dimensional bar code external code. The invention also discloses a 2-dimensional bar code security traceability method which is hard to copy and has high security.

Description

technical field [0001] The invention relates to a double-coded Internet of Things traceability anti-counterfeit label and a two-dimensional code anti-counterfeit traceability method. Background technique [0002] Two-dimensional barcode / two-dimensional barcode (2-dimensional barcode) records data symbol information with a specific geometric figure distributed on a plane (two-dimensional direction) according to certain rules; The concepts of "0" and "1" bit streams that constitute the internal logic basis of the computer use several geometric shapes corresponding to the binary to represent text and numerical information, and automatically read through image input equipment or photoelectric scanning equipment to realize automatic information processing. Processing: It has some common features of barcode technology: each code system has its specific character set; each character occupies a certain width; it has certain verification functions, etc. At the same time, it also has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06Q30/00G06K17/00
CPCG06K19/06037G06K17/0025G06K19/06046G06Q30/0185
Inventor 尤霞
Owner SHANGHAI ZHONGSHUO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products