CN102779263A - Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature - Google Patents
Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature Download PDFInfo
- Publication number
- CN102779263A CN102779263A CN2012102142864A CN201210214286A CN102779263A CN 102779263 A CN102779263 A CN 102779263A CN 2012102142864 A CN2012102142864 A CN 2012102142864A CN 201210214286 A CN201210214286 A CN 201210214286A CN 102779263 A CN102779263 A CN 102779263A
- Authority
- CN
- China
- Prior art keywords
- information
- dimension code
- manufacturer
- digital signature
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature. The credible two-dimensional code scheme includes that plaintext information or ciphertext which is encrypted by a private key and digital signature of the plaintext information are embedded in two-dimensional codes, after users identify the two-dimensional codes, the ciphertext is decoded (plaintext does not need to be decoded), signature verification is performed so as to determine whether the two-dimensional codes are distorted simply and rapidly, if the two-dimensional codes are not distorted, the two-dimensional codes are credible, otherwise the two-dimensional codes are incredible. As shown in the drawing, the credible two-dimensional code scheme is formed at least by seven modules of CA, plaintext information digital signature generation, plaintext information encryption, two-dimensional figure generation, two-dimensional figure reading, plaintext information decoding and plaintext information digital signature verification.
Description
Technical field
PKIX) and the credible two-dimension code scheme of digital signature the present invention relates to cryptography, product false proof and food and drug safety field, specifically, the present invention has provided a kind of based on PKI (Public Key Infrastructure:.
Background technology
Certificate issuing authority) and form jointly about the bases such as security strategy of public-key cryptography PKI is a kind of new safety technique, and it is by public-key cipher technology, digital certificate (Certificate), CA (Certificate Authority:.The PKI PKIX provides the system or the platform of public key encryption and digital signature service, and purpose is for managing keys and certificate.A mechanism can set up the network environment of a safety through adopting PKI framework managing keys and certificate.PKI mainly comprises four parts: the X.509 certificate of form and certification revocation list CRL; The CA operating protocol; The CA management agreement; The CA policy making.
Typical case, complete, an effective PKI application system should have following three parts at least:
(1) CA:CA of authentication center is the core of PKI; CA is in charge of all users' (comprising various application programs) under the PKI structure certificate; Bundle other information of user's PKI and user; Verify user's identity on the net, CA also will be responsible for the blacklist registration and the blacklist issue of user certificate.
(2) LIST SERVER X.500: X.500 LIST SERVER is used to issue user's certificate and blacklist
Information, the user can be through ldap protocol inquiry oneself or other people certificate and download blacklist information of standard.
(3) Secure Application system: the Secure Application system promptly uses key and certificate to guarantee the application system of information security, and the concrete application system of every profession and trade has nothing in common with each other, for example application system of bank, security etc.
Digital signature (claiming public key digital signature, Electronic Signature again) is the typical application of asymmetrical encryption algorithm.The application process of digital signature is; The private key that the data source transmit leg uses oneself to the data verification with or other variablees relevant with data content carry out encryption; Completion is to legal " signature " of data; " digital signature " that the data receiver then utilizes the other side's PKI to understand to receive, and will understand the result and be used for the check to the data integrality, to confirm the legitimacy of signature.Digital signature technology is an important technology of in the network system virtual environment, confirming identity, can replace " autographic signature " in the real process fully, in technology and guaranteed legally.In digital signature applications, sender's PKI can obtain easily, but his private key then need hold in close confidence.
Two-dimension code; Claim two-dimensional bar code again; It is to use certain specific geometric figure chequered with black and white graphic recording data symbol information that (on the two-dimensional directional) distributes on the plane according to certain rules; On coding, utilize " 0 ", the notion of " 1 " bit stream that constitutes the computer-internal logical foundations dexterously, use several and the corresponding geometrical body of scale-of-two to represent the literal numerical information, handle automatically with realization information through image input device or photoelectric scanning device automatically identifying and reading.It has some general character of barcode technology: every kind of code system has its specific character set; Each character occupies certain width; Has certain verifying function etc.Also have simultaneously the automatic recognition function of the information of different rows, and characteristics such as processing graphics rotation change.Two-dimension code code system commonly used has: Data Matrix, and Maxi Code, Aztec, QR Code, Vericode, PDF417, Ultracode, Code 49, Code 16K etc.
Summary of the invention
The present invention proposes a kind of credible two-dimension code scheme, through cleartext information or ciphertext behind encrypted private key and the digital signature of cleartext information are embedded in the two-dimension code, after User Recognition goes out two-dimension code based on PKI and digital signature; Through ciphertext being deciphered (if expressly then not needing deciphering); And carry out signature verification, thus can confirm quickly and easily whether this two-dimension code was distorted, if two-dimension code was not distorted; Then credible, otherwise insincere.Shown in accompanying drawing, this scheme is made up of CA, the generation of cleartext information digital signature, cleartext information encryption, the generation of two-dimension code figure, the recognition of two-dimension code figure, cleartext information deciphering and seven modules of cleartext information digital signature authentication at least.
(1) the CA system is that manufacturer's everyone or mechanism of right (content of explaining of two-dimension code with) generates signature private key, encryption key and corresponding with it digital certificate; Private key leaves in the USB KEY physical equipment and offers the manufacturer; Relevant information with digital certificate stores X.500 LIST SERVER into simultaneously, supplies user (individual or mechanism that two-dimension code is verified) or other third party's inquiry;
(2) manufacturer is to 2 D code information digital signature generation module input cleartext information; And select suitable Digital Signature Algorithm; Signature blocks adopts the signature private key that is stored among the USB KEY that cleartext information is signed; Form the digital signature of cleartext information, and export to two-dimension code figure generation module;
(3) if desired cleartext information is encrypted, then the manufacturer imports cleartext information to encrypting module, selects suitable rivest, shamir, adelman, and encrypting module adopts encryption key that cleartext information is encrypted, and generates cipher-text information;
(4) two-dimension code figure generation module is according to manufacturer's information, AES sign and signature algorithm identifier or wherein arbitrary combination, cleartext information or ciphertext, the digital signature of cleartext information; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking;
(5) manufacturer's information, AES sign and signature algorithm identifier three or any combination wherein also can appear at the mode of plaintext text near the two-dimension code, and two-dimension code checking user extracts these information through the OCR mode;
(6) after the user takes two-dimension code; Through two-dimension code figure recognition module two-dimension code is correctly distinguished; If include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein near the cleartext information the two-dimension code; Also need carry out OCR identification, extract information wherein, and it is outputed to the 2 D code information authentication module it;
(7) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.
Description of drawings
Accompanying drawing is a building-block of logic of the present invention.
Embodiment
Through technical scheme of the present invention, the user can confirm easily whether institute's canned data is distorted by the third party in the two-dimension code.The specific embodiments of scheme is described below:
(1) manufacturer CA system files an application, and the CA system provides signature private key and corresponding with it digital certificate for it, and signature private key leaves in the USB KEY physical equipment and offers the manufacturer.
(2) manufacturer to 2 D code information digital signature generation module input cleartext information expressly; And select suitable rivest, shamir, adelman; Encrypting module adopts the signature private key that is stored among the USB KEY that cleartext information is signed, and forms the digital signature of cleartext information.
(3) two-dimension code figure generation module is according to manufacturer's information, cleartext information plaintext (also can select the ciphertext of encrypted private key), the digital signature of cleartext information, signature algorithm identifier; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking.
(4) after the user takes two-dimension code, two-dimension code is correctly distinguished, extracted information wherein through two-dimension code figure recognition module.
(5) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.
Claims (5)
1. credible two-dimension code scheme based on PKI and digital signature; At least be made up of CA, the generation of cleartext information digital signature, cleartext information encryption, the generation of two-dimension code figure, the recognition of two-dimension code figure, cleartext information deciphering and seven modules of cleartext information digital signature authentication, its characteristic is made up of following step at least:
(1) the CA system is that manufacturer's everyone or mechanism of right (content of explaining of two-dimension code with) generates signature private key, encryption key and corresponding with it digital certificate; Private key leaves in the USB KEY physical equipment and offers the manufacturer; Relevant information with digital certificate stores X.500 LIST SERVER into simultaneously, supplies user (individual or mechanism that two-dimension code is verified) or other third party's inquiry;
(2) manufacturer is to 2 D code information digital signature generation module input cleartext information; And select suitable Digital Signature Algorithm; Signature blocks adopts the signature private key that is stored among the USB KEY that cleartext information is signed; Form the digital signature of cleartext information, and export to two-dimension code figure generation module;
(3) if desired cleartext information is encrypted, then the manufacturer imports cleartext information to encrypting module, selects suitable rivest, shamir, adelman, and encrypting module adopts encryption key that cleartext information is encrypted, and generates cipher-text information;
(4) two-dimension code figure generation module is according to manufacturer's information, AES sign and signature algorithm identifier or wherein arbitrary combination, cleartext information or ciphertext, the digital signature of cleartext information; And user-selected two-dimension code generates parameter; Generate the two-dimension code figure; The manufacturer offers the user with the mode of printing or electronics with the two-dimension code figure, supplies its checking;
(5) manufacturer's information, AES sign and signature algorithm identifier three or any combination wherein also can appear at the mode of plaintext text near the two-dimension code, and two-dimension code checking user extracts these information through the OCR mode;
(6) after the user takes two-dimension code; Through two-dimension code figure recognition module two-dimension code is correctly distinguished; If include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein near the cleartext information the two-dimension code; Also need carry out OCR identification, extract information wherein, and it is outputed to the 2 D code information authentication module it;
(7) 2 D code information signature verification module is extracted manufacturer's information, cleartext information expressly (if storage is ciphertext from recognition information; Also need decipher it), the digital signature and the signature algorithm identifier of cleartext information; And according to manufacturer's information from local, X.500 LIST SERVER or other certificate storing mechanism are obtained manufacturer's digital certificate, then the cleartext information digital signature is verified, if checking is passed through; Then this two-dimension code is not distorted; Be believable, otherwise it was distorted, insincere.
2. method according to claim 1, information with expressly or the stored in form of ciphertext in two-dimension code.
3. method according to claim 1 can include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein in the two-dimension code.
4. in the plaintext text around the method according to claim 1, two-dimension code, can include manufacturer's information, AES sign and signature algorithm identifier three or arbitrary combination wherein, two-dimension code checking user obtains these information through the OCR mode.
5. method according to claim 1, the user is to extracting cleartext information, and the digital signature in the two-dimension code is verified, thereby confirms whether two-dimension code was distorted, if two-dimension code is not distorted, was believable, otherwise insincere.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102142864A CN102779263A (en) | 2012-06-19 | 2012-06-19 | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102142864A CN102779263A (en) | 2012-06-19 | 2012-06-19 | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102779263A true CN102779263A (en) | 2012-11-14 |
Family
ID=47124173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102142864A Pending CN102779263A (en) | 2012-06-19 | 2012-06-19 | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102779263A (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN103605950A (en) * | 2013-11-25 | 2014-02-26 | 广西大学 | Method and system for hiding signature in credible two-dimensional code |
CN103839097A (en) * | 2014-03-20 | 2014-06-04 | 武汉信安珞珈科技有限公司 | Method and device for generating two-dimension code based on digital signature |
CN104050574A (en) * | 2014-06-18 | 2014-09-17 | 广州市婴曼怡贸易有限公司 | Anti-fake method and system |
CN104462877A (en) * | 2013-09-25 | 2015-03-25 | 北大方正集团有限公司 | Digital resource acquisition method and system under copyright protection |
CN104579683A (en) * | 2014-12-31 | 2015-04-29 | 上海格尔软件股份有限公司 | Electronic diploma certificate based on PKI, certificate issuing method and certificate verifying method |
CN104680202A (en) * | 2013-12-03 | 2015-06-03 | 航天信息股份有限公司 | Methods for generating and verifying two-dimension code of invoice |
CN104715274A (en) * | 2013-12-16 | 2015-06-17 | 邵贵平 | Safe two-dimensional bar code |
CN104794516A (en) * | 2015-04-22 | 2015-07-22 | 立德高科(北京)数码科技有限责任公司 | Position-changeable combined anti-counterfeit label, combined anti-counterfeit label generation method and combined anti-counterfeit label generation device |
CN104796379A (en) * | 2014-01-16 | 2015-07-22 | 中国电信股份有限公司 | Two-dimensional code authentication method, two-dimensional code authentication platform and two-dimensional code authentication system |
CN105187357A (en) * | 2014-06-04 | 2015-12-23 | 北京大学深圳研究生院 | Two-dimension code verification method and system |
CN105554908A (en) * | 2015-12-31 | 2016-05-04 | 福建联迪商用设备有限公司 | Method, master device, slave device and system for achieving code scanning automatic bluetooth connection |
WO2017016318A1 (en) * | 2014-11-05 | 2017-02-02 | 祝国龙 | Credible label generation and verification method and system based on asymmetric cryptographic algorithm |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
CN106559219A (en) * | 2015-09-29 | 2017-04-05 | 卓望数码技术(深圳)有限公司 | A kind of digital signature method and system and its intelligent terminal and operation system |
CN107315969A (en) * | 2017-07-26 | 2017-11-03 | 广东电网有限责任公司佛山供电局 | A kind of job instruction access system based on Quick Response Code |
WO2018152184A1 (en) * | 2017-02-14 | 2018-08-23 | Alibaba Group Holding Limited | Two-dimensional code generation method and device, and two-dimensional code recognition method and device |
CN109409472A (en) * | 2018-08-24 | 2019-03-01 | 阿里巴巴集团控股有限公司 | Two-dimensional code generation method, data processing method, device and server |
CN111260528A (en) * | 2020-02-07 | 2020-06-09 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN111340477A (en) * | 2020-02-07 | 2020-06-26 | 支付宝实验室(新加坡)有限公司 | Service processing method and device, electronic equipment and storage medium |
CN111539496A (en) * | 2020-04-20 | 2020-08-14 | 山东确信信息产业股份有限公司 | Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system |
CN111985941A (en) * | 2020-05-07 | 2020-11-24 | 张逸清 | Article anti-counterfeiting authentication method |
CN112422494A (en) * | 2020-08-06 | 2021-02-26 | 上海幻电信息科技有限公司 | Data transmission method, data security verification method and data transmission system |
CN112801672A (en) * | 2021-01-27 | 2021-05-14 | 浙江天演维真网络科技股份有限公司 | Agricultural product traceability two-dimensional code signature method based on group signature |
CN113239368A (en) * | 2021-04-02 | 2021-08-10 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
CN115396096A (en) * | 2022-08-29 | 2022-11-25 | 北京航空航天大学 | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm |
CN116489426A (en) * | 2023-05-06 | 2023-07-25 | 中国计量科学研究院 | Trusted video generation and verification system and method |
-
2012
- 2012-06-19 CN CN2012102142864A patent/CN102779263A/en active Pending
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN103236929B (en) * | 2013-04-26 | 2016-09-14 | 天地融科技股份有限公司 | A kind of information processing method and deciphering device |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN104462877B (en) * | 2013-09-25 | 2018-09-04 | 北大方正集团有限公司 | A kind of digital resource acquisition method under copyright protection and system |
CN104462877A (en) * | 2013-09-25 | 2015-03-25 | 北大方正集团有限公司 | Digital resource acquisition method and system under copyright protection |
CN103605950A (en) * | 2013-11-25 | 2014-02-26 | 广西大学 | Method and system for hiding signature in credible two-dimensional code |
CN103605950B (en) * | 2013-11-25 | 2016-06-29 | 广西大学 | Method and system for hiding signature in credible two-dimensional code |
CN104680202A (en) * | 2013-12-03 | 2015-06-03 | 航天信息股份有限公司 | Methods for generating and verifying two-dimension code of invoice |
CN104715274B (en) * | 2013-12-16 | 2018-02-13 | 邵贵平 | A kind of safe two-dimensional bar code |
CN104715274A (en) * | 2013-12-16 | 2015-06-17 | 邵贵平 | Safe two-dimensional bar code |
CN104796379A (en) * | 2014-01-16 | 2015-07-22 | 中国电信股份有限公司 | Two-dimensional code authentication method, two-dimensional code authentication platform and two-dimensional code authentication system |
CN103839097A (en) * | 2014-03-20 | 2014-06-04 | 武汉信安珞珈科技有限公司 | Method and device for generating two-dimension code based on digital signature |
CN105187357A (en) * | 2014-06-04 | 2015-12-23 | 北京大学深圳研究生院 | Two-dimension code verification method and system |
CN104050574A (en) * | 2014-06-18 | 2014-09-17 | 广州市婴曼怡贸易有限公司 | Anti-fake method and system |
CN104050574B (en) * | 2014-06-18 | 2018-04-27 | 广州澳滋亚进出口贸易有限公司 | A kind of method for anti-counterfeit and its anti-counterfeiting system |
WO2017016318A1 (en) * | 2014-11-05 | 2017-02-02 | 祝国龙 | Credible label generation and verification method and system based on asymmetric cryptographic algorithm |
CN104579683A (en) * | 2014-12-31 | 2015-04-29 | 上海格尔软件股份有限公司 | Electronic diploma certificate based on PKI, certificate issuing method and certificate verifying method |
CN104794516A (en) * | 2015-04-22 | 2015-07-22 | 立德高科(北京)数码科技有限责任公司 | Position-changeable combined anti-counterfeit label, combined anti-counterfeit label generation method and combined anti-counterfeit label generation device |
CN104794516B (en) * | 2015-04-22 | 2019-02-01 | 深圳市纷享科技有限公司 | Combined anti-fake mark, generation method and the generating means of position type variable |
CN106559219B (en) * | 2015-09-29 | 2019-05-10 | 卓望数码技术(深圳)有限公司 | A kind of digital signature method and system and its intelligent terminal and operation system |
CN106559219A (en) * | 2015-09-29 | 2017-04-05 | 卓望数码技术(深圳)有限公司 | A kind of digital signature method and system and its intelligent terminal and operation system |
CN105554908A (en) * | 2015-12-31 | 2016-05-04 | 福建联迪商用设备有限公司 | Method, master device, slave device and system for achieving code scanning automatic bluetooth connection |
WO2018086515A1 (en) * | 2016-11-08 | 2018-05-17 | 王栋 | Verification construction method and device capable of offline verification of safety information tag |
CN106452756B (en) * | 2016-11-08 | 2018-03-30 | 王栋 | Can the safe Quick Response Code construction verification method of off-line verification and device |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
AU2018220925B2 (en) * | 2017-02-14 | 2020-07-09 | Advanced New Technologies Co., Ltd. | Two-dimensional code generation method and device, and two-dimensional code recognition method and device |
KR102208895B1 (en) | 2017-02-14 | 2021-01-29 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | 2D code generation method and device, and 2D code recognition method and device |
KR20190113840A (en) * | 2017-02-14 | 2019-10-08 | 알리바바 그룹 홀딩 리미티드 | 2D code generation method and device, and 2D code recognition method and device |
WO2018152184A1 (en) * | 2017-02-14 | 2018-08-23 | Alibaba Group Holding Limited | Two-dimensional code generation method and device, and two-dimensional code recognition method and device |
US10693663B2 (en) | 2017-02-14 | 2020-06-23 | Alibaba Group Holding Limited | Two dimensional code generation and recognition |
CN107315969A (en) * | 2017-07-26 | 2017-11-03 | 广东电网有限责任公司佛山供电局 | A kind of job instruction access system based on Quick Response Code |
CN109409472A (en) * | 2018-08-24 | 2019-03-01 | 阿里巴巴集团控股有限公司 | Two-dimensional code generation method, data processing method, device and server |
CN109409472B (en) * | 2018-08-24 | 2022-11-22 | 创新先进技术有限公司 | Two-dimensional code generation method, data processing device and server |
US10992481B2 (en) | 2018-08-24 | 2021-04-27 | Advanced New Technologies Co., Ltd. | Two-dimensional code generation method, apparatus, data processing method, apparatus, and server |
CN111340477A (en) * | 2020-02-07 | 2020-06-26 | 支付宝实验室(新加坡)有限公司 | Service processing method and device, electronic equipment and storage medium |
CN111260528A (en) * | 2020-02-07 | 2020-06-09 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN111260528B (en) * | 2020-02-07 | 2021-09-28 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN111539496A (en) * | 2020-04-20 | 2020-08-14 | 山东确信信息产业股份有限公司 | Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system |
CN111985941A (en) * | 2020-05-07 | 2020-11-24 | 张逸清 | Article anti-counterfeiting authentication method |
CN112422494A (en) * | 2020-08-06 | 2021-02-26 | 上海幻电信息科技有限公司 | Data transmission method, data security verification method and data transmission system |
CN112801672A (en) * | 2021-01-27 | 2021-05-14 | 浙江天演维真网络科技股份有限公司 | Agricultural product traceability two-dimensional code signature method based on group signature |
CN112801672B (en) * | 2021-01-27 | 2024-02-13 | 浙江天演维真网络科技股份有限公司 | Agricultural product traceability two-dimensional code signature method based on group signature |
CN113239368A (en) * | 2021-04-02 | 2021-08-10 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
CN115396096A (en) * | 2022-08-29 | 2022-11-25 | 北京航空航天大学 | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm |
CN116489426A (en) * | 2023-05-06 | 2023-07-25 | 中国计量科学研究院 | Trusted video generation and verification system and method |
CN116489426B (en) * | 2023-05-06 | 2024-02-06 | 中国计量科学研究院 | Trusted video generation and verification system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102779263A (en) | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature | |
CN102750510A (en) | Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm | |
CN102799990A (en) | Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure) | |
CN102799989A (en) | Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes | |
CN102932148B (en) | Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification | |
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
CN103440444B (en) | The signing method of electronic contract | |
CN105229965B (en) | Equipment identification system and equipment authenticating method | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
US10147092B2 (en) | System and method for signing and authenticating secure transactions through a communications network | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
Ahamed et al. | A secure QR code system for sharing personal confidential information | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
Purnomo et al. | Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure | |
KR20140108749A (en) | Apparatus for generating privacy-protecting document authentication information and method of privacy-protecting document authentication using the same | |
CN110414193A (en) | A kind of safe encryption method and system of the close PDF document E-seal of state | |
JP2015213288A (en) | Optical code, information transmission method, and authentication method | |
CN103810457A (en) | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code | |
EP3128696B1 (en) | Entity authentication method and device | |
KR101561170B1 (en) | A Safe Identification Card Method With Convergence of Fingerprint verification and Encrypted QR | |
JP2009272671A (en) | Secret authentication system | |
CN111667039A (en) | Two-dimensional code anti-counterfeiting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121114 |