Anti-counterfeit and traceability two-dimensional code generation method, terminal and medium

A two-dimensional code and password technology, which is applied in the field of anti-counterfeiting and traceability two-dimensional code generation, can solve the problems of troublesome operation, high cost, and restrictions on promotion, and achieve the effect of simple operation and low cost.

Active Publication Date: 2018-04-13
韵姁网络科技(上海)有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of anti-counterfeiting technology did play a good role in the initial stage of the development of anti-counterfeiting technology, but with the development of the market, fake and shoddy products also imitate the above-mentioned technologies
[0005] The second category is anti-counterfeiting of electronic identification products: such as anti-counterfeiting marks such as magnetic card records and IC cards.
However, this kind of anti-counterfeiting mark needs to be inquired with special equipment, that is, it is only possible to inquire under certain conditions, thus limiting the scope of use of users
Moreover, the production cost is relatively high, and the promotion is limited.
[0006] The third category is anti-counterfeiting of digital products, such as: anti-counterfeiting through telephone codes, telephones, decoding, information, Internet and other means. There will also be a big difference in technology, high cost, and troublesome operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeit and traceability two-dimensional code generation method, terminal and medium
  • Anti-counterfeit and traceability two-dimensional code generation method, terminal and medium
  • Anti-counterfeit and traceability two-dimensional code generation method, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] see figure 1 , Embodiment 1 provides a method for generating an anti-counterfeit and traceable two-dimensional code, including:

[0064] S101: Receive an operation instruction from the user, and open WeChat;

[0065] Specifically, users can follow and enter the official account through the WeChat scan function. This method directly applies for the QR code on the WeChat platform, which is convenient to use.

[0066] S102: Receive a login instruction from the user, and enter the registration login interface;

[0067] S103: Receive the identity information input by the user, and complete the user registration and login;

[0068] Specifically, for a user logging in for the first time, registration is required. When registering, the identity information entered includes company name, phone number, email address, user name, etc. During the registration process, SMS verification or email verification can also be performed. When the verification is passed, the registration...

Embodiment 2

[0076] The method provided in Embodiment 2 is based on the methods provided in other embodiments, and after sharing the download address with users, it further includes:

[0077] Receive the user's scan code command to obtain the query QR code;

[0078] Call the product information and product flow information corresponding to the query QR code in the database;

[0079] Display the product information.

[0080] Specifically, the product flow information includes production information entered in each process during the product production process, including production parameters, production conditions, production personnel information, and the like. This method has the function of traceability. Users can scan and identify the QR code, read the detailed information of the QR code, product authenticity, flow direction, how to use and other information, which is convenient for users to track the product.

[0081] The method can also generate a sample code of a two-dimensional co...

Embodiment 3

[0090] The method provided in Embodiment 3 is based on the methods provided in other embodiments, and after the two-dimensional code data is shared with users, it also includes:

[0091] receiving the user's address acquisition instruction to obtain the download address of the two-dimensional code data;

[0092] Receive the user's password setting instruction, save the password entered by the user, and obtain the file extraction password;

[0093] receiving a forwarding instruction from the user, and forwarding the download address to the specified user;

[0094] Receive the access address input by the user, when the access address is the download address of the two-dimensional code data, receive the password input by the user, and download the two-dimensional code data when the input password is equal to the file extraction password.

[0095] This function realizes the function of downloading QR code data. The QR code applicant can forward the generated QR code to other use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-counterfeit and traceability two-dimensional code generation method, a terminal and a medium. The method includes the following steps: receiving an operation instructionof a user, and opening WeChat; receiving a login instruction of the user, and entering a registration and login interface; receiving identity information input by the user, and completing user registration and login; receiving product information and product packaging level information entered by the user, saving the product information and the product packaging level information to a database, and generating two-dimensional code data according to the product packaging level information, the product information and a selected code file level; saving the two-dimensional code data to the database; and generating a downloading address corresponding to the two-dimensional code data, and sharing the downloading address to the user. Thus, special two-dimensional code data can be generated for entered product information, and an anti-counterfeit effect can be achieved based on the unique nature of the two-dimensional code. In addition, there is only the need to share the downloading addressof the two-dimensional code data through WeChat, the operation is simple, and the cost is low.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to an anti-counterfeiting and traceability two-dimensional code generation method, a terminal and a medium. Background technique [0002] Product anti-counterfeiting refers to a method used in the production and sales of products to prevent counterfeit and inferior products from appearing. Product anti-counterfeiting is now mainly achieved by pasting labels on the surface of the product or hiding them in the product. [0003] At present, the anti-counterfeiting products owned by domestic anti-counterfeiting enterprises mainly include the following categories: [0004] The first category is visual product anti-counterfeiting, such as multiple laser anti-counterfeiting, fluorescent anti-counterfeiting, variable temperature anti-counterfeiting, watermark anti-counterfeiting, etc. This type of anti-counterfeiting technology has indeed played a good role in the initia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06F17/30G06K19/06
CPCG06F16/9554G06K19/06037G06Q30/0185
Inventor 章永耀张玉
Owner 韵姁网络科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products