CN102779263A - Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature - Google Patents

Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature Download PDF

Info

Publication number
CN102779263A
CN102779263A CN2012102142864A CN201210214286A CN102779263A CN 102779263 A CN102779263 A CN 102779263A CN 2012102142864 A CN2012102142864 A CN 2012102142864A CN 201210214286 A CN201210214286 A CN 201210214286A CN 102779263 A CN102779263 A CN 102779263A
Authority
CN
China
Prior art keywords
information
dimension code
manufacturer
digital signature
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102142864A
Other languages
Chinese (zh)
Inventor
袁开国
袁静国
刘强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012102142864A priority Critical patent/CN102779263A/en
Publication of CN102779263A publication Critical patent/CN102779263A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature. The credible two-dimensional code scheme includes that plaintext information or ciphertext which is encrypted by a private key and digital signature of the plaintext information are embedded in two-dimensional codes, after users identify the two-dimensional codes, the ciphertext is decoded (plaintext does not need to be decoded), signature verification is performed so as to determine whether the two-dimensional codes are distorted simply and rapidly, if the two-dimensional codes are not distorted, the two-dimensional codes are credible, otherwise the two-dimensional codes are incredible. As shown in the drawing, the credible two-dimensional code scheme is formed at least by seven modules of CA, plaintext information digital signature generation, plaintext information encryption, two-dimensional figure generation, two-dimensional figure reading, plaintext information decoding and plaintext information digital signature verification.

Description

Credible two-dimension code scheme based on PKI and digital signature
Technical field
PKIX) and the credible two-dimension code scheme of digital signature the present invention relates to cryptography, product false proof and food and drug safety field, specifically, the present invention has provided a kind of based on PKI (Public Key Infrastructure:.
Background technology
Certificate issuing authority) and form jointly about the bases such as security strategy of public-key cryptography PKI is a kind of new safety technique, and it is by public-key cipher technology, digital certificate (Certificate), CA (Certificate Authority:.The PKI PKIX provides the system or the platform of public key encryption and digital signature service, and purpose is for managing keys and certificate.A mechanism can set up the network environment of a safety through adopting PKI framework managing keys and certificate.PKI mainly comprises four parts: the X.509 certificate of form and certification revocation list CRL; The CA operating protocol; The CA management agreement; The CA policy making.
Typical case, complete, an effective PKI application system should have following three parts at least:
(1) CA:CA of authentication center is the core of PKI; CA is in charge of all users' (comprising various application programs) under the PKI structure certificate; Bundle other information of user's PKI and user; Verify user's identity on the net, CA also will be responsible for the blacklist registration and the blacklist issue of user certificate.
(2) LIST SERVER X.500: X.500 LIST SERVER is used to issue user's certificate and blacklist
Information, the user can be through ldap protocol inquiry oneself or other people certificate and download blacklist information of standard.
(3) Secure Application system: the Secure Application system promptly uses key and certificate to guarantee the application system of information security, and the concrete application system of every profession and trade has nothing in common with each other, for example application system of bank, security etc.
Digital signature (claiming public key digital signature, Electronic Signature again) is the typical application of asymmetrical encryption algorithm.The application process of digital signature is; The private key that the data source transmit leg uses oneself to the data verification with or other variablees relevant with data content carry out encryption; Completion is to legal " signature " of data; " digital signature " that the data receiver then utilizes the other side's PKI to understand to receive, and will understand the result and be used for the check to the data integrality, to confirm the legitimacy of signature.Digital signature technology is an important technology of in the network system virtual environment, confirming identity, can replace " autographic signature " in the real process fully, in technology and guaranteed legally.In digital signature applications, sender's PKI can obtain easily, but his private key then need hold in close confidence.
Two-dimension code; Claim two-dimensional bar code again; It is to use certain specific geometric figure chequered with black and white graphic recording data symbol information that (on the two-dimensional directional) distributes on the plane according to certain rules; On coding, utilize " 0 ", the notion of " 1 " bit stream that constitutes the computer-internal logical foundations dexterously, use several and the corresponding geometrical body of scale-of-two to represent the literal numerical information, handle automatically with realization information through image input device or photoelectric scanning device automatically identifying and reading.It has some general character of barcode technology: every kind of code system has its specific character set; Each character occupies certain width; Has certain verifying function etc.Also have simultaneously the automatic recognition function of the information of different rows, and characteristics such as processing graphics rotation change.Two-dimension code code system commonly used has: Data Matrix, and Maxi Code, Aztec, QR Code, Vericode, PDF417, Ultracode, Code 49, Code 16K etc.
Summary of the invention
The present invention proposes a kind of credible two-dimension code scheme, through cleartext information or ciphertext behind encrypted private key and the digital signature of cleartext information are embedded in the two-dimension code, after User Recognition goes out two-dimension code based on PKI and digital signature; Through ciphertext being deciphered (if expressly then not needing deciphering); And carry out signature verification, thus can confirm quickly and easily whether this two-dimension code was distorted, if two-dimension code was not distorted; Then credible, otherwise insincere.Shown in accompanying drawing, this scheme is made up of CA, the generation of cleartext information digital signature, cleartext information encryption, the generation of two-dimension code figure, the recognition of two-dimension code figure, cleartext information deciphering and seven modules of cleartext information digital signature authentication at least.
(1) the CA system is that manufacturer's everyone or mechanism of right (content of explaining of two-dimension code with) generates signature private key, encryption key and corresponding with it digital certificate; Private key leaves in the USB KEY physical equipment and offers the manufacturer; Relevant information with digital certificate stores X.500 LIST SERVER into simultaneously, supplies user (individual or mechanism that two-dimension code is verified) or other third party's inquiry;
(2) manufacturer is to 2 D code information digital signature generation module input cleartext information; And select suitable Digital Signature Algorithm; Signature blocks adopts the signature private key that is stored among the USB KEY that cleartext information is signed; Form the digital signature of cleartext information, and export to two-dimension code figure generation module;
(3) if desired cleartext information is encrypted, then the manufacturer imports cleartext information to encrypting module, selects suitable rivest, shamir, adelman, and encrypting module adopts encryption key that cleartext information is encrypted, and generates cipher-text information;
(4) two-dimension code figure generation module is according to manufacturer's information, AES sign and signature algorithm identifier or wherein arbitrary combination, cleartext information or ciphertext, the digital signature of cleartext information; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking;
(5) manufacturer's information, AES sign and signature algorithm identifier three or any combination wherein also can appear at the mode of plaintext text near the two-dimension code, and two-dimension code checking user extracts these information through the OCR mode;
(6) after the user takes two-dimension code; Through two-dimension code figure recognition module two-dimension code is correctly distinguished; If include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein near the cleartext information the two-dimension code; Also need carry out OCR identification, extract information wherein, and it is outputed to the 2 D code information authentication module it;
(7) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.
Description of drawings
Accompanying drawing is a building-block of logic of the present invention.
Embodiment
Through technical scheme of the present invention, the user can confirm easily whether institute's canned data is distorted by the third party in the two-dimension code.The specific embodiments of scheme is described below:
(1) manufacturer CA system files an application, and the CA system provides signature private key and corresponding with it digital certificate for it, and signature private key leaves in the USB KEY physical equipment and offers the manufacturer.
(2) manufacturer to 2 D code information digital signature generation module input cleartext information expressly; And select suitable rivest, shamir, adelman; Encrypting module adopts the signature private key that is stored among the USB KEY that cleartext information is signed, and forms the digital signature of cleartext information.
(3) two-dimension code figure generation module is according to manufacturer's information, cleartext information plaintext (also can select the ciphertext of encrypted private key), the digital signature of cleartext information, signature algorithm identifier; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking.
(4) after the user takes two-dimension code, two-dimension code is correctly distinguished, extracted information wherein through two-dimension code figure recognition module.
(5) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.

Claims (5)

1. credible two-dimension code scheme based on PKI and digital signature; At least be made up of CA, the generation of cleartext information digital signature, cleartext information encryption, the generation of two-dimension code figure, the recognition of two-dimension code figure, cleartext information deciphering and seven modules of cleartext information digital signature authentication, its characteristic is made up of following step at least:
(1) the CA system is that manufacturer's everyone or mechanism of right (content of explaining of two-dimension code with) generates signature private key, encryption key and corresponding with it digital certificate; Private key leaves in the USB KEY physical equipment and offers the manufacturer; Relevant information with digital certificate stores X.500 LIST SERVER into simultaneously, supplies user (individual or mechanism that two-dimension code is verified) or other third party's inquiry;
(2) manufacturer is to 2 D code information digital signature generation module input cleartext information; And select suitable Digital Signature Algorithm; Signature blocks adopts the signature private key that is stored among the USB KEY that cleartext information is signed; Form the digital signature of cleartext information, and export to two-dimension code figure generation module;
(3) if desired cleartext information is encrypted, then the manufacturer imports cleartext information to encrypting module, selects suitable rivest, shamir, adelman, and encrypting module adopts encryption key that cleartext information is encrypted, and generates cipher-text information;
(4) two-dimension code figure generation module is according to manufacturer's information, AES sign and signature algorithm identifier or wherein arbitrary combination, cleartext information or ciphertext, the digital signature of cleartext information; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking;
(5) manufacturer's information, AES sign and signature algorithm identifier three or any combination wherein also can appear at the mode of plaintext text near the two-dimension code, and two-dimension code checking user extracts these information through the OCR mode;
(6) after the user takes two-dimension code; Through two-dimension code figure recognition module two-dimension code is correctly distinguished; If include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein near the cleartext information the two-dimension code; Also need carry out OCR identification, extract information wherein, and it is outputed to the 2 D code information authentication module it;
(7) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.
2. method according to claim 1, information with expressly or the stored in form of ciphertext in two-dimension code.
3. method according to claim 1 can include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein in the two-dimension code.
4. in the plaintext text around the method according to claim 1, two-dimension code, can include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein, two-dimension code checking user obtains these information through the OCR mode.
5. method according to claim 1, the user is to extracting cleartext information, and the digital signature in the two-dimension code is verified, thereby confirms whether two-dimension code was distorted, if two-dimension code is not distorted, was believable, otherwise insincere.
CN2012102142864A 2012-06-19 2012-06-19 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature Pending CN102779263A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102142864A CN102779263A (en) 2012-06-19 2012-06-19 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012102142864A CN102779263A (en) 2012-06-19 2012-06-19 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature

Publications (1)

Publication Number Publication Date
CN102779263A true CN102779263A (en) 2012-11-14

Family

ID=47124173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012102142864A Pending CN102779263A (en) 2012-06-19 2012-06-19 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature

Country Status (1)

Country Link
CN (1) CN102779263A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103295046A (en) * 2013-06-13 2013-09-11 北京网秦天下科技有限公司 Method and device for generating and using safe two-dimensional codes
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN103839097A (en) * 2014-03-20 2014-06-04 武汉信安珞珈科技有限公司 Method and device for generating two-dimension code based on digital signature
CN104050574A (en) * 2014-06-18 2014-09-17 广州市婴曼怡贸易有限公司 Anti-fake method and system
CN104462877A (en) * 2013-09-25 2015-03-25 北大方正集团有限公司 Digital resource acquisition method and system under copyright protection
CN104579683A (en) * 2014-12-31 2015-04-29 上海格尔软件股份有限公司 Electronic diploma certificate based on PKI, certificate issuing method and certificate verifying method
CN104680202A (en) * 2013-12-03 2015-06-03 航天信息股份有限公司 Methods for generating and verifying two-dimension code of invoice
CN104715274A (en) * 2013-12-16 2015-06-17 邵贵平 Safe two-dimensional bar code
CN104794516A (en) * 2015-04-22 2015-07-22 立德高科(北京)数码科技有限责任公司 Position-changeable combined anti-counterfeit label, combined anti-counterfeit label generation method and combined anti-counterfeit label generation device
CN104796379A (en) * 2014-01-16 2015-07-22 中国电信股份有限公司 Two-dimensional code authentication method, two-dimensional code authentication platform and two-dimensional code authentication system
CN105187357A (en) * 2014-06-04 2015-12-23 北京大学深圳研究生院 Two-dimension code verification method and system
CN105554908A (en) * 2015-12-31 2016-05-04 福建联迪商用设备有限公司 Method, master device, slave device and system for achieving code scanning automatic bluetooth connection
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106559219A (en) * 2015-09-29 2017-04-05 卓望数码技术(深圳)有限公司 A kind of digital signature method and system and its intelligent terminal and operation system
CN107315969A (en) * 2017-07-26 2017-11-03 广东电网有限责任公司佛山供电局 A kind of job instruction access system based on Quick Response Code
WO2018152184A1 (en) * 2017-02-14 2018-08-23 Alibaba Group Holding Limited Two-dimensional code generation method and device, and two-dimensional code recognition method and device
CN109409472A (en) * 2018-08-24 2019-03-01 阿里巴巴集团控股有限公司 Two-dimensional code generation method, data processing method, device and server
CN111260528A (en) * 2020-02-07 2020-06-09 赵�智 Real estate information verification method based on asymmetric algorithm
CN111340477A (en) * 2020-02-07 2020-06-26 支付宝实验室(新加坡)有限公司 Service processing method and device, electronic equipment and storage medium
CN111539496A (en) * 2020-04-20 2020-08-14 山东确信信息产业股份有限公司 Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
CN111985941A (en) * 2020-05-07 2020-11-24 张逸清 Article anti-counterfeiting authentication method
CN112422494A (en) * 2020-08-06 2021-02-26 上海幻电信息科技有限公司 Data transmission method, data security verification method and data transmission system
CN112801672A (en) * 2021-01-27 2021-05-14 浙江天演维真网络科技股份有限公司 Agricultural product traceability two-dimensional code signature method based on group signature
CN113239368A (en) * 2021-04-02 2021-08-10 暨南大学 QR code encryption and decryption method based on electronic signature
CN115396096A (en) * 2022-08-29 2022-11-25 北京航空航天大学 Encryption and decryption method and protection system for secret file based on national cryptographic algorithm
CN116489426A (en) * 2023-05-06 2023-07-25 中国计量科学研究院 Trusted video generation and verification system and method

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103236929B (en) * 2013-04-26 2016-09-14 天地融科技股份有限公司 A kind of information processing method and deciphering device
CN103295046A (en) * 2013-06-13 2013-09-11 北京网秦天下科技有限公司 Method and device for generating and using safe two-dimensional codes
CN104462877B (en) * 2013-09-25 2018-09-04 北大方正集团有限公司 A kind of digital resource acquisition method under copyright protection and system
CN104462877A (en) * 2013-09-25 2015-03-25 北大方正集团有限公司 Digital resource acquisition method and system under copyright protection
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN103605950B (en) * 2013-11-25 2016-06-29 广西大学 Method and system for hiding signature in credible two-dimensional code
CN104680202A (en) * 2013-12-03 2015-06-03 航天信息股份有限公司 Methods for generating and verifying two-dimension code of invoice
CN104715274B (en) * 2013-12-16 2018-02-13 邵贵平 A kind of safe two-dimensional bar code
CN104715274A (en) * 2013-12-16 2015-06-17 邵贵平 Safe two-dimensional bar code
CN104796379A (en) * 2014-01-16 2015-07-22 中国电信股份有限公司 Two-dimensional code authentication method, two-dimensional code authentication platform and two-dimensional code authentication system
CN103839097A (en) * 2014-03-20 2014-06-04 武汉信安珞珈科技有限公司 Method and device for generating two-dimension code based on digital signature
CN105187357A (en) * 2014-06-04 2015-12-23 北京大学深圳研究生院 Two-dimension code verification method and system
CN104050574A (en) * 2014-06-18 2014-09-17 广州市婴曼怡贸易有限公司 Anti-fake method and system
CN104050574B (en) * 2014-06-18 2018-04-27 广州澳滋亚进出口贸易有限公司 A kind of method for anti-counterfeit and its anti-counterfeiting system
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN104579683A (en) * 2014-12-31 2015-04-29 上海格尔软件股份有限公司 Electronic diploma certificate based on PKI, certificate issuing method and certificate verifying method
CN104794516A (en) * 2015-04-22 2015-07-22 立德高科(北京)数码科技有限责任公司 Position-changeable combined anti-counterfeit label, combined anti-counterfeit label generation method and combined anti-counterfeit label generation device
CN104794516B (en) * 2015-04-22 2019-02-01 深圳市纷享科技有限公司 Combined anti-fake mark, generation method and the generating means of position type variable
CN106559219B (en) * 2015-09-29 2019-05-10 卓望数码技术(深圳)有限公司 A kind of digital signature method and system and its intelligent terminal and operation system
CN106559219A (en) * 2015-09-29 2017-04-05 卓望数码技术(深圳)有限公司 A kind of digital signature method and system and its intelligent terminal and operation system
CN105554908A (en) * 2015-12-31 2016-05-04 福建联迪商用设备有限公司 Method, master device, slave device and system for achieving code scanning automatic bluetooth connection
WO2018086515A1 (en) * 2016-11-08 2018-05-17 王栋 Verification construction method and device capable of offline verification of safety information tag
CN106452756B (en) * 2016-11-08 2018-03-30 王栋 Can the safe Quick Response Code construction verification method of off-line verification and device
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
AU2018220925B2 (en) * 2017-02-14 2020-07-09 Advanced New Technologies Co., Ltd. Two-dimensional code generation method and device, and two-dimensional code recognition method and device
KR102208895B1 (en) 2017-02-14 2021-01-29 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. 2D code generation method and device, and 2D code recognition method and device
KR20190113840A (en) * 2017-02-14 2019-10-08 알리바바 그룹 홀딩 리미티드 2D code generation method and device, and 2D code recognition method and device
WO2018152184A1 (en) * 2017-02-14 2018-08-23 Alibaba Group Holding Limited Two-dimensional code generation method and device, and two-dimensional code recognition method and device
US10693663B2 (en) 2017-02-14 2020-06-23 Alibaba Group Holding Limited Two dimensional code generation and recognition
CN107315969A (en) * 2017-07-26 2017-11-03 广东电网有限责任公司佛山供电局 A kind of job instruction access system based on Quick Response Code
CN109409472A (en) * 2018-08-24 2019-03-01 阿里巴巴集团控股有限公司 Two-dimensional code generation method, data processing method, device and server
CN109409472B (en) * 2018-08-24 2022-11-22 创新先进技术有限公司 Two-dimensional code generation method, data processing device and server
US10992481B2 (en) 2018-08-24 2021-04-27 Advanced New Technologies Co., Ltd. Two-dimensional code generation method, apparatus, data processing method, apparatus, and server
CN111340477A (en) * 2020-02-07 2020-06-26 支付宝实验室(新加坡)有限公司 Service processing method and device, electronic equipment and storage medium
CN111260528A (en) * 2020-02-07 2020-06-09 赵�智 Real estate information verification method based on asymmetric algorithm
CN111260528B (en) * 2020-02-07 2021-09-28 赵�智 Real estate information verification method based on asymmetric algorithm
CN111539496A (en) * 2020-04-20 2020-08-14 山东确信信息产业股份有限公司 Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
CN111985941A (en) * 2020-05-07 2020-11-24 张逸清 Article anti-counterfeiting authentication method
CN112422494A (en) * 2020-08-06 2021-02-26 上海幻电信息科技有限公司 Data transmission method, data security verification method and data transmission system
CN112801672A (en) * 2021-01-27 2021-05-14 浙江天演维真网络科技股份有限公司 Agricultural product traceability two-dimensional code signature method based on group signature
CN112801672B (en) * 2021-01-27 2024-02-13 浙江天演维真网络科技股份有限公司 Agricultural product traceability two-dimensional code signature method based on group signature
CN113239368A (en) * 2021-04-02 2021-08-10 暨南大学 QR code encryption and decryption method based on electronic signature
CN115396096A (en) * 2022-08-29 2022-11-25 北京航空航天大学 Encryption and decryption method and protection system for secret file based on national cryptographic algorithm
CN116489426A (en) * 2023-05-06 2023-07-25 中国计量科学研究院 Trusted video generation and verification system and method
CN116489426B (en) * 2023-05-06 2024-02-06 中国计量科学研究院 Trusted video generation and verification system and method

Similar Documents

Publication Publication Date Title
CN102779263A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN102750510A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN102799990A (en) Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)
CN102799989A (en) Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes
CN102932148B (en) Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
CN103440444B (en) The signing method of electronic contract
CN105229965B (en) Equipment identification system and equipment authenticating method
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
US10147092B2 (en) System and method for signing and authenticating secure transactions through a communications network
CN105450395A (en) Information encryption and decryption processing method and system
Ahamed et al. A secure QR code system for sharing personal confidential information
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
Purnomo et al. Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure
KR20140108749A (en) Apparatus for generating privacy-protecting document authentication information and method of privacy-protecting document authentication using the same
CN110414193A (en) A kind of safe encryption method and system of the close PDF document E-seal of state
JP2015213288A (en) Optical code, information transmission method, and authentication method
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
EP3128696B1 (en) Entity authentication method and device
KR101561170B1 (en) A Safe Identification Card Method With Convergence of Fingerprint verification and Encrypted QR
JP2009272671A (en) Secret authentication system
CN111667039A (en) Two-dimensional code anti-counterfeiting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121114