Traceable verification two-dimensional code encryption anti-counterfeiting method

A technology of two-dimensional code and verification system, which is applied in the field of two-dimensional code encryption and anti-counterfeiting, which can solve the problem that anti-counterfeiting technology cannot solve the problem of counterfeiting damage to genuine brands, and achieve the effect of reducing the cost of counterfeiting and increasing the cost of counterfeiting

Pending Publication Date: 2021-04-27
江苏省广电网络科技发展有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the existing technology, the present invention provides a traceable and verified two-dimensional code encryption anti-counterfeiting method, mainly to solve the problem that the existing anti-counterfeiting technology cannot solve the brand damage caused by counterfeit goods to genuine products, and to provide terminal two-dimensional code labels for product manufacturers Problems that generate equipment that does not meet people's requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable verification two-dimensional code encryption anti-counterfeiting method
  • Traceable verification two-dimensional code encryption anti-counterfeiting method
  • Traceable verification two-dimensional code encryption anti-counterfeiting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] refer to Figure 1-3 , a traceable verified two-dimensional code encryption anti-counterfeiting method, comprising the following steps:

[0034] S1: Generate labels, and automatically generate labels through the manufacturer's terminal equipment;

[0035] S2: Print labels, use the label printer to print the generated labels. The label machine needs to have a liquid crystal display when printing labels. It shows that the label being printed is a certain type of product from the manufacturer. The label machine automatically obtains the manufacturer’s product model information from the network when printing. Then send a label generation request to the network verification system;

[0036] S3: Network verification, verify the label through the network, check the authenticity, the network verification system uses the product model + time + random salt provided by the manufacturer to generate a two-dimensional code for logistics, send it to the label machine terminal, and th...

Embodiment 2

[0043] refer to Figure 1-3 , a traceable verified two-dimensional code encryption anti-counterfeiting method, comprising the following steps:

[0044]S1: Generate labels, and automatically generate labels through the manufacturer's terminal equipment;

[0045] S2: Print labels, use the label printer to print the generated labels. The label machine needs to have a liquid crystal display when printing labels. It shows that the label being printed is a certain type of product from the manufacturer. The label machine automatically obtains the manufacturer’s product model information from the network when printing. Then send a label generation request to the network verification system;

[0046] S3: Network verification, verify the label through the network, check the authenticity, the network verification system uses the product model + time + random salt provided by the manufacturer to generate a two-dimensional code for logistics, send it to the label machine terminal, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of product anti-counterfeiting, and discloses a traceable verification two-dimensional code encryption anti-counterfeiting method, which comprises the following steps: S1, generating a label, and automatically generating the label through manufacturer terminal equipment; s2, label printing: using a label printer for printing the generated label, a liquid crystal display being needed when the label printer prints the label, and the printed label being displayed to be a product of a certain model of a manufacturer. The invention further provides traceable verification two-dimensional code encryption anti-counterfeiting terminal equipment which comprises a coding machine, and the coding machine comprises a lower shell and an upper shell. According to the invention, the problematic two-dimensional code can be found through verification quantity statistics to dynamically change the verification information, and the counterfeit information is sent to the user purchasing the counterfeit during verification, so that a manufacturer can conveniently track a product circulation channel and find a counterfeiter through logistics, the counterfeiting cost is reduced, the asymmetrically encrypted two-dimensional code information is provided, product manufacturers can be conveniently confirmed for users, and the counterfeiting cost is increased.

Description

technical field [0001] The invention relates to the technical field of product anti-counterfeiting, in particular to a traceable and verified two-dimensional code encryption anti-counterfeiting method. Background technique [0002] In recent years, with the rapid development of the information industry, enterprises have increasingly strong demands for real-time tracking and supervision of products in production, distribution, distribution and retail. At the same time, in the process of business operation, enterprises inevitably have to implement differentiated prices for dealers in different regions, resulting in the phenomenon of cross-selling from time to time, which brings direct economic losses to the enterprise and seriously interferes with the normal market of the enterprise. Advancing strategy and marketing approach. What's more, with the further improvement of corporate brand recognition, there may be criminals who think it is profitable to manufacture fake and shod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06Q30/00
CPCG06K17/0029G06Q30/0185
Inventor 赵斌耿建航
Owner 江苏省广电网络科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products