CN105718816B - The method of two dimensional code support system raising Information Security - Google Patents

The method of two dimensional code support system raising Information Security Download PDF

Info

Publication number
CN105718816B
CN105718816B CN201610046711.1A CN201610046711A CN105718816B CN 105718816 B CN105718816 B CN 105718816B CN 201610046711 A CN201610046711 A CN 201610046711A CN 105718816 B CN105718816 B CN 105718816B
Authority
CN
China
Prior art keywords
data
dimensional code
hash value
support system
authentication codes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610046711.1A
Other languages
Chinese (zh)
Other versions
CN105718816A (en
Inventor
于百会
袁鹏
朱桢
张海波
王铨灵
彭聪
毕丽翠
刘琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongxin Software Co.,Ltd.
Original Assignee
Sichuan Honghui Yunshang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Honghui Yunshang Technology Co Ltd filed Critical Sichuan Honghui Yunshang Technology Co Ltd
Priority to CN201610046711.1A priority Critical patent/CN105718816B/en
Publication of CN105718816A publication Critical patent/CN105718816A/en
Application granted granted Critical
Publication of CN105718816B publication Critical patent/CN105718816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses a kind of methods that two dimensional code support system improves Information Security, and data encryption step: S101: in data transfer, the authentication codes of the random unique string for generating a sufficient length and a sufficient length are corresponded with data;S102: md5 encryption is carried out to the unique string, generates one 32 hash values;S103: hash value and this group of data are stored in database correspondingly.Data encapsulation step: S201: user calls the interface provided and Transfer Parameters hash value and the authentication codes;S202: in decoding process, system, which first checks whether, meets preposition verification condition, and after preposition verification, system obtains data according to the corresponding relationship of hash value and the hash value and data that are pre-stored in database.Two dimensional code support system improves the safety of data from two angles: (1) encrypting to transmitting data, generate the higher two dimensional code of safety;(2) during auxiliary decoder, encapsulation of data improves the safety of data.

Description

The method of two dimensional code support system raising Information Security
Technical field
The present invention relates to a kind of methods that two dimensional code support system improves Information Security.
Background technique
Two dimensional code application is very universal, with the fast development of mobile Internet and smart phone, two dimensional code by Gradually evolve into a kind of efficient information propagation medium, because of its ease for use and transmissibility, become product marketing, payment, The strong auxiliary tool such as product traceability, electronic bill.The operation system of wisdom commercial podium can be related in many levels The use (including generation, parsing, management) of two dimensional code, however at present can be there is no independent two dimensional code support platform It completes two dimensional code to generate, on the basis of parsing, management and statistical function, provides business interface to all kinds of operation systems, system Extent for multiplexing is low.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide one kind can be improved module reuse, unified management The independent two dimensional code support system of two dimensional code, and improve its Information Security.
The purpose of the present invention is achieved through the following technical solutions: two dimensional code support system improves Information Security Method, including a data encryption step and a data encapsulation step:
The data encryption step includes following sub-step:
S101: in data transfer, the random unique string for generating a sufficient length and sufficient length Authentication codes, the unique string and the authentication codes are corresponded with data;
S102: md5 encryption is carried out to the unique string, generates one 32 hash values;
S103: hash value and this group of data are stored in database correspondingly;
The data encapsulation step includes following sub-step:
S201: user calls the interface provided and Transfer Parameters hash value and the authentication codes;
S202: in decoding process, system first checks whether the preposition verification condition that meets, and preposition verification is by then jumping to step Rapid S203;
S203: after preposition verification, system is according to pair of hash value and the hash value and data that are pre-stored in database Answer Relation acquisition data.
In step S202, system is checked whether according to the authentication codes meets preposition verification condition.
The authentication codes are in the case where optional preposition verification, for empty or arbitrary string.
The beneficial effects of the present invention are:
1) independent two dimensional code support system is provided, two dimensional code can be managed collectively, generation, the parsing of two dimensional code are provided Interface calls for operation system, improves module reuse.
2) on the one hand transmitting data are encrypted, generates the higher two dimensional code of safety;In another aspect decoding process, Encapsulation of data improves the safety of data.
3) authentication codes with the one-to-one sufficient length of data are generated in data encryption process, which can It is set as preposition verification when decoding, subsequent decoding just can be carried out by preposition verification, further enhance Information Security.
Detailed description of the invention
Fig. 1 is data encryption flow diagram of the present invention;
Fig. 2 is that data of the present invention encapsulate flow diagram.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to It is as described below.
The method that two dimensional code support system improves Information Security, including a data encryption step and a data encapsulation Step:
As shown in Figure 1, the data encryption step includes following sub-step:
S101: in data transfer, the random unique string for generating a sufficient length and sufficient length Authentication codes, the unique string and the authentication codes are corresponded with data;
S102: md5 encryption is carried out to the unique string, generates one 32 hash values;
S103: hash value and this group of data are stored in database correspondingly;
As shown in Fig. 2, the data encapsulation step includes following sub-step:
S201: user calls the interface provided and Transfer Parameters hash value and the authentication codes, and the authentication codes exist In the case where optional preposition verification, for empty or arbitrary string;
S202: in decoding process, system, which is first checked whether according to the authentication codes, meets preposition verification condition, preposition school It tests through the S203 that then gos to step;
S203: after preposition verification, system is according to pair of hash value and the hash value and data that are pre-stored in database Answer Relation acquisition data.
The above is only a preferred embodiment of the present invention, it should be understood that the present invention is not limited to described herein Form should not be regarded as an exclusion of other examples, and can be used for other combinations, modifications, and environments, and can be at this In the text contemplated scope, modifications can be made through the above teachings or related fields of technology or knowledge.And those skilled in the art institute into Capable modifications and changes do not depart from the spirit and scope of the present invention, then all should be in the protection scope of appended claims of the present invention It is interior.

Claims (3)

1. the method for two dimensional code support system raising Information Security, which is characterized in that including a data encryption step and one A data encapsulation step:
The data encryption step includes following sub-step:
S101: in data transfer, generating a unique string and an authentication codes at random, the unique string and The authentication codes are corresponded with data;
S102: md5 encryption is carried out to the unique string, generates one 32 hash values;
S103: hash value and the data are stored in database correspondingly;
The data encapsulation step includes following sub-step:
S201: user calls the interface provided and Transfer Parameters hash value and the authentication codes;
S202: in decoding process, system first checks whether the preposition verification condition that meets, and preposition verification is by then going to step S203;
S203: after preposition verification, system is closed according to hash value and the hash value being pre-stored in database are corresponding with data System obtains data.
2. the method that two dimensional code support system according to claim 1 improves Information Security, which is characterized in that step In S202, system is checked whether according to the authentication codes meets preposition verification condition.
3. the method that two dimensional code support system according to claim 1 improves Information Security, which is characterized in that described to recognize Code is demonstrate,proved in the case where optional preposition verification, for empty or arbitrary string.
CN201610046711.1A 2016-01-25 2016-01-25 The method of two dimensional code support system raising Information Security Active CN105718816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610046711.1A CN105718816B (en) 2016-01-25 2016-01-25 The method of two dimensional code support system raising Information Security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610046711.1A CN105718816B (en) 2016-01-25 2016-01-25 The method of two dimensional code support system raising Information Security

Publications (2)

Publication Number Publication Date
CN105718816A CN105718816A (en) 2016-06-29
CN105718816B true CN105718816B (en) 2019-01-18

Family

ID=56153924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610046711.1A Active CN105718816B (en) 2016-01-25 2016-01-25 The method of two dimensional code support system raising Information Security

Country Status (1)

Country Link
CN (1) CN105718816B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116186743B (en) * 2023-04-24 2023-07-28 北京华阅嘉诚科技发展有限公司 Data authorization method, system, equipment and storage medium based on two-dimension code

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576919A (en) * 2009-06-19 2009-11-11 用友软件股份有限公司 Mark generating method and device
CN102571343A (en) * 2010-12-21 2012-07-11 智胜国际科技股份有限公司 Encryption method of digital data, decryption method of encrypted digital data, storage device, production system of storage device and production method thereof
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device
CN103198344A (en) * 2013-03-01 2013-07-10 重庆市远大印务有限公司 Tax-control safety two-dimensional code encoding and decoding processing method
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN103927357A (en) * 2014-04-15 2014-07-16 上海新炬网络技术有限公司 Data encryption and retrieval method for database
CN104834999A (en) * 2015-04-24 2015-08-12 中国农业大学 Cloud technology-based commodity traceability and consumption flow statistical analysis method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576919A (en) * 2009-06-19 2009-11-11 用友软件股份有限公司 Mark generating method and device
CN102571343A (en) * 2010-12-21 2012-07-11 智胜国际科技股份有限公司 Encryption method of digital data, decryption method of encrypted digital data, storage device, production system of storage device and production method thereof
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device
CN103198344A (en) * 2013-03-01 2013-07-10 重庆市远大印务有限公司 Tax-control safety two-dimensional code encoding and decoding processing method
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN103927357A (en) * 2014-04-15 2014-07-16 上海新炬网络技术有限公司 Data encryption and retrieval method for database
CN104834999A (en) * 2015-04-24 2015-08-12 中国农业大学 Cloud technology-based commodity traceability and consumption flow statistical analysis method and system

Also Published As

Publication number Publication date
CN105718816A (en) 2016-06-29

Similar Documents

Publication Publication Date Title
CN108124480B (en) Software authorization method, system and equipment
CN105993010A (en) Methods and apparatus to provide extended object notation data
CN104079581A (en) Identity authentication method and device
CN103856640A (en) Method and system for processing user resource information
CN104657842A (en) Intelligent logistics signing method and system
CN103235906A (en) Method and device for encrypting and decrypting application program
CN105359155B (en) Use compression failure password attack
CN104050431A (en) Self-signing method and self-signing device for RFID chips
CN103107888B (en) The identity identifying method that the dynamic multi-attribute of facing moving terminal is multi-level
Piao et al. Structural and functional analyses of proguard obfuscation tool
CN104301875A (en) Short message processing method and device
CN104574652A (en) Method for increasing and deducting pollution discharge data of IC card and IC card
CN104281272A (en) Password input processing method and device
CN106254304B (en) Method and system for facilitating secure communications
CN105718816B (en) The method of two dimensional code support system raising Information Security
US10740665B2 (en) Visual authentication key for matrix barcode
CN104579673B (en) Interactive authentication method between RFID card and card reader
CN105162592A (en) Method and system for authenticating wearable device
WO2016048054A3 (en) Method, apparatus and system for secure data communication
CN106341384B (en) Method for facilitating secure communications
CN109525550B (en) Data message processing method, device and system
CN104184594B (en) Document coalition signature method and system
CN104318461A (en) Anti-counterfeiting code generation and verification method based on cipher machine and USBKey
KR101709086B1 (en) security method and system thereof based context for Internet of Things environment
CN104038497A (en) Electronic identity authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211213

Address after: 610000 No. 35, mianxing East Road, high tech Zone, Mianyang City, Sichuan Province

Patentee after: Sichuan Hongxin Software Co.,Ltd.

Address before: 621000 No. 35 Mian'an Road, Fucheng District, Mianyang City, Sichuan Province (Software Industry Park of Science and Technology City)

Patentee before: SICHUAN HONGHUI YUNSHANG TECHNOLOGY Co.,Ltd.