CN106709319B - Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method - Google Patents

Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method Download PDF

Info

Publication number
CN106709319B
CN106709319B CN201611153459.0A CN201611153459A CN106709319B CN 106709319 B CN106709319 B CN 106709319B CN 201611153459 A CN201611153459 A CN 201611153459A CN 106709319 B CN106709319 B CN 106709319B
Authority
CN
China
Prior art keywords
data
encrypted data
authority
user
dimension code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611153459.0A
Other languages
Chinese (zh)
Other versions
CN106709319A (en
Inventor
韩宝军
周劼
王京
沈波
张新涛
徐跃忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Century Century Polytron Technologies Inc
Original Assignee
Beijing Century Century Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Century Century Polytron Technologies Inc filed Critical Beijing Century Century Polytron Technologies Inc
Priority to CN201611153459.0A priority Critical patent/CN106709319B/en
Publication of CN106709319A publication Critical patent/CN106709319A/en
Application granted granted Critical
Publication of CN106709319B publication Critical patent/CN106709319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a two-dimension code coding and decoding application authority control system and a grading authorization method, wherein the method comprises the following steps: acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table; acquiring user authority, searching a data authority distribution table, and acquiring encrypted data authorized by the user authority in the encrypted data; and decrypting the target encrypted data to obtain decrypted target data. The device comprises: the device comprises a two-dimensional code identification module, a data acquisition module and a data decryption module. By identifying the two-dimension code information and acquiring the data authority distribution table and the target encrypted data, the two-dimension code can be decoded locally, and the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.

Description

Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a two-dimensional code coding and decoding application authority control system and a hierarchical authorization method.
Background
The two-dimensional code as a new data storage mode records data symbol information by using black and white alternate patterns of a certain specific geometric figure distributed on a plane according to a certain rule, ingeniously utilizes the concepts of '0' and '1' bit streams forming the internal logic basis of a computer in code compilation, uses a plurality of geometric shapes corresponding to a binary system to represent character numerical value information, automatically reads the information by an image input device or a photoelectric scanning device to realize automatic information processing, and has a certain verification function.
In order to achieve the purpose of controlling and outputting data for different users, computers or devices, the existing two-dimensional code information processing method needs to distribute output data according to control requirements in the process of analyzing the two-dimensional code so as to ensure that different users can obtain different data after interpreting the two-dimensional code. For different users, after hierarchical authorization is carried out, data needs to be read according to the authority. In the existing method, the decoding of the two-dimensional code is completed in a non-network environment, namely, the decoding function is completed locally on the equipment, so that the authority discrimination and control can not be performed remotely by using a network; therefore, the authority authentication in the offline state cannot be completed.
In the process of implementing the embodiment of the present invention, the inventor finds that the existing method decodes the two-dimensional code locally, and the authority distribution function is located at the server side, so that the authority authentication of the two-dimensional code cannot be performed in an offline state.
Disclosure of Invention
The embodiment of the invention provides a two-dimension code encoding and decoding application authority control system and a hierarchical authorization method, and solves the problem that the two-dimension code cannot be authenticated in an off-line state because the two-dimension code is locally decoded and the authority distribution function is located at a server end in the existing method.
In a first aspect, an embodiment of the present invention provides a two-dimensional code encoding and decoding hierarchical authorization method, including:
acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
acquiring user authority, searching the data authority distribution table, and acquiring target encrypted data authorized by the user authority in the encrypted data;
and decrypting the target encrypted data to obtain decrypted target data.
Preferably, different rights in the data rights allocation table correspond to different encrypted data.
Preferably, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Preferably, before the obtaining the two-dimension code information and identifying the two-dimension code information to obtain the encrypted data and the data authority distribution table, the method further includes:
and acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain the two-dimensional code information.
Preferably, the acquiring the user right further includes:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
In a second aspect, an embodiment of the present invention further provides a two-dimensional code encoding and decoding application permission control system, including:
the two-dimension code identification module is used for acquiring two-dimension code information, identifying the two-dimension code information and obtaining encrypted data and a data authority distribution table;
the data acquisition module is used for acquiring user permission, searching the data permission distribution table and obtaining target encrypted data authorized by the user permission in the encrypted data;
and the data decryption module is used for decrypting the target encrypted data to obtain decrypted target data.
Preferably, different rights in the data rights allocation table correspond to different encrypted data.
Preferably, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Preferably, the apparatus further comprises:
and the two-dimension code acquisition module is used for acquiring a two-dimension code image, identifying the two-dimension code image and obtaining the two-dimension code information.
Preferably, the data obtaining module is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
According to the technical scheme, the embodiment of the invention identifies the two-dimension code information to obtain the encrypted data and the data authority distribution table, so that the two-dimension code can be decoded locally, and the data authority distribution table can be obtained locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a two-dimensional code encoding and decoding hierarchical authorization method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a two-dimensional code encoding and decoding application permission control system according to an embodiment of the present invention.
Detailed Description
The following further describes embodiments of the invention with reference to the drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Fig. 1 shows a schematic flow chart of a two-dimensional code encoding and decoding hierarchical authorization method provided by this embodiment, including:
s101, acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
specifically, in the stage of generating a two-dimensional code for data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account, forms a data authority distribution table, and encrypts the different data by using different passwords. And the first terminal stores the encrypted data and the data authority distribution table in a two-dimensional code. And the second terminal acquires the two-dimension code information, identifies the two-dimension code information and obtains encrypted data and a data authority distribution table.
The first terminal stores data in the two-dimensional code and generates a two-dimensional code picture; the second terminal is a terminal for identifying the two-dimensional code information.
The two-dimension code information is a two-dimension code which stores encrypted data and a data authority distribution table.
The encrypted data is data subjected to encryption processing and comprises a plurality of parts of data, and each part of data corresponds to a user authority.
S102, obtaining user authority, searching the data authority distribution table, and obtaining target encrypted data authorized by the user authority in the encrypted data;
specifically, the second terminal obtains the user right, and queries in the data right distribution table to obtain the target encrypted data authorized by the user right in the encrypted data.
For example, the user right includes four levels, which are level 1, level 2, level 3 and level 4, and the encrypted data includes four portions, which are encrypted data a, encrypted data B, encrypted data C and encrypted data D, respectively, so that the user right level 1 in the data right distribution table corresponds to the encrypted data a, the user right level 2 corresponds to the encrypted data B, the user right level 3 corresponds to the encrypted data C, and the user right level 4 corresponds to the encrypted data D. When the user authority of a certain user is level 3, the user scans the two-dimensional code picture, and the target encrypted data which can be obtained is encrypted data C.
S103, decrypting the target encrypted data to obtain decrypted target data.
Specifically, the second terminal decrypts the target encrypted data to obtain decrypted target data, and then displays the target data in the second terminal.
For example, the user right includes four levels, which are level 1, level 2, level 3 and level 4, and the encrypted data includes four portions, which are encrypted data a, encrypted data B, encrypted data C and encrypted data D, respectively, so that the user right level 1 in the data right distribution table corresponds to the encrypted data a, the user right level 2 corresponds to the encrypted data B, the user right level 3 corresponds to the encrypted data C, and the user right level 4 corresponds to the encrypted data D. When the user authority of a certain user is level 3, the user scans the two-dimensional code picture, and the target encrypted data which can be obtained is encrypted data C. And the second terminal decrypts the encrypted data C to obtain decrypted data C, wherein the data C is the target data.
In the embodiment, the encrypted data and the data authority distribution table are acquired by identifying the two-dimension code information, so that not only can the two-dimension code be decoded locally, but also the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Further, on the basis of the above method embodiment, different permissions in the data permission allocation table correspond to different encrypted data.
Different authorities are set to correspond to different encrypted data, so that the corresponding encrypted data can be quickly acquired after the user authority is conveniently acquired subsequently.
Further, on the basis of the above method embodiment, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Specifically, the user right with the higher level may view the encrypted data corresponding to the user right with the lower level.
For example, the user M with the highest level of user authority can acquire all information on the two-dimensional code, and the user N with the lower level of user authority can only acquire individual information on the two-dimensional code.
Through setting up the user authority of different ranks, be convenient for carry out hierarchical management to the data, simultaneously through letting higher level's user can look over subordinate user's data, can be convenient for personnel's work management.
Further, on the basis of the above embodiment of the method, before S101, the method further includes:
s100, acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain two-dimensional code information.
Specifically, the second terminal acquires a two-dimensional code image, and identifies the two-dimensional code image through a two-dimensional code identification application program to obtain the two-dimensional code information.
The two-dimensional code image can be acquired through the camera, or the two-dimensional code image sent by other terminals can be acquired, or other modes of acquiring the two-dimensional code image can be acquired.
The two-dimension code information is obtained by acquiring the two-dimension code image, and the user can acquire the two-dimension code image in multiple modes, so that the two-dimension code information is more convenient to acquire.
Further, on the basis of the foregoing method embodiment, the acquiring the user right in S102 further includes:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
Specifically, the second terminal acquires a current user account, processes the user account according to a preset rule, and obtains the user authority corresponding to the user account.
The preset rule may be preset, for example: the last digit of the account number corresponds to the user authority.
Fig. 2 shows a schematic structural diagram of a two-dimensional code encoding and decoding application authority control system provided in this embodiment, where the apparatus includes: two-dimensional code identification module 21, data acquisition module 22 and data decryption module 23, wherein:
the two-dimension code identification module 21 is configured to obtain two-dimension code information, identify the two-dimension code information, and obtain encrypted data and a data authority distribution table;
the data obtaining module 22 is configured to obtain a user right, search the data right distribution table, and obtain target encrypted data authorized by the user right in the encrypted data;
the data decryption module 23 is configured to decrypt the target encrypted data to obtain decrypted target data.
Specifically, the two-dimension code recognition module 21 obtains two-dimension code information, and recognizes the two-dimension code information to obtain encrypted data and a data authority distribution table; the data obtaining module 22 obtains the user right, searches the data right distribution table, and obtains the target encrypted data authorized by the user right in the encrypted data; the data decryption module 23 decrypts the target encrypted data to obtain decrypted target data.
In the embodiment, the encrypted data and the data authority distribution table are acquired by identifying the two-dimension code information, so that not only can the two-dimension code be decoded locally, but also the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Further, on the basis of the above device embodiment, different permissions in the data permission distribution table correspond to different encrypted data.
Further, on the basis of the above device embodiment, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Further, on the basis of the above embodiment of the apparatus, the apparatus further comprises:
the two-dimensional code obtaining module 20 is configured to obtain a two-dimensional code image, and identify the two-dimensional code image to obtain the two-dimensional code information.
Further, on the basis of the above device embodiment, the data obtaining module 22 is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
The two-dimensional code encoding and decoding application authority control system described in this embodiment may be used to implement the above method embodiments, and the principle and technical effect are similar, which are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
It should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A two-dimensional code coding and decoding application authority control system is characterized by comprising:
the two-dimension code identification module is used for acquiring two-dimension code information, identifying the two-dimension code information and obtaining encrypted data and a data authority distribution table;
the data acquisition module is used for acquiring user permission, searching the data permission distribution table and obtaining target encrypted data authorized by the user permission in the encrypted data;
the data decryption module is used for decrypting the target encrypted data to obtain decrypted target data;
the system is specifically configured to:
in the stage of generating a two-dimensional code on data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account to form a data authority distribution table, and encrypts the different data by adopting different passwords; the first terminal stores the encrypted data and the data authority distribution table in two-dimensional code information;
correspondingly, the two-dimensional code recognition module is specifically configured to:
and acquiring the two-dimension code information through a second terminal, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table.
2. The system of claim 1, wherein different permissions in the data permission allocation table correspond to different encrypted data.
3. The system of claim 2, wherein the target encrypted data comprises encrypted data corresponding to a target permission, and the target permission is a permission that is not greater than the user permission.
4. The system of claim 1, further comprising:
and the two-dimension code acquisition module is used for acquiring a two-dimension code image, identifying the two-dimension code image and obtaining the two-dimension code information.
5. The system according to any one of claims 1 to 4, wherein the data obtaining module is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
6. A two-dimensional code encoding and decoding hierarchical authorization method is characterized by comprising the following steps:
acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
acquiring user authority, searching the data authority distribution table, and acquiring target encrypted data authorized by the user authority in the encrypted data;
decrypting the target encrypted data to obtain decrypted target data;
before the steps of obtaining the two-dimension code information, identifying the two-dimension code information and obtaining the encrypted data and the data authority distribution table, the method further comprises:
in the stage of generating a two-dimensional code on data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account to form a data authority distribution table, and encrypts the different data by adopting different passwords; the first terminal stores the encrypted data and the data authority distribution table in two-dimensional code information;
correspondingly, the obtaining of the two-dimension code information and the identifying of the two-dimension code information to obtain the encrypted data and the data authority distribution table include:
and acquiring the two-dimension code information through a second terminal, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table.
7. The method of claim 6, wherein different permissions in the data permission allocation table correspond to different encrypted data.
8. The method of claim 7, wherein the target encrypted data comprises encrypted data corresponding to a target permission, and wherein the target permission is a permission that is not greater than the user permission.
9. The method of claim 6, wherein before the obtaining the two-dimensional code information and identifying the two-dimensional code information to obtain the encrypted data and the data right distribution table, the method further comprises:
and acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain the two-dimensional code information.
10. The method according to any one of claims 6-9, wherein the obtaining of the user right further comprises:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
CN201611153459.0A 2016-12-14 2016-12-14 Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method Active CN106709319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611153459.0A CN106709319B (en) 2016-12-14 2016-12-14 Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611153459.0A CN106709319B (en) 2016-12-14 2016-12-14 Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method

Publications (2)

Publication Number Publication Date
CN106709319A CN106709319A (en) 2017-05-24
CN106709319B true CN106709319B (en) 2020-01-07

Family

ID=58937124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611153459.0A Active CN106709319B (en) 2016-12-14 2016-12-14 Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method

Country Status (1)

Country Link
CN (1) CN106709319B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462699A (en) * 2018-02-09 2018-08-28 苏州酷豆物联科技有限公司 Based on the encrypted Quick Response Code generation of sequential and verification method and system
CN109241220A (en) * 2018-08-21 2019-01-18 安徽讯飞智能科技有限公司 A method of geographical location information is obtained by scanning doorplate
CN109948760B (en) * 2019-03-28 2022-05-17 尤尼泰克(嘉兴)信息技术有限公司 Information presentation method and device based on two-dimensional code
CN109978094A (en) * 2019-03-28 2019-07-05 尤尼泰克(嘉兴)信息技术有限公司 A kind of information graduation rendering method and device based on two dimensional code
CN110570313A (en) * 2019-09-27 2019-12-13 深圳市网心科技有限公司 data transaction method, data transaction device and system based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174286A (en) * 2006-10-31 2008-05-07 佛山市顺德区顺达电脑厂有限公司 Method for controlling computer use authority by radio frequency recognizing volume label
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN104794377A (en) * 2014-06-05 2015-07-22 合肥星服信息科技有限责任公司 Right control method for desktop system without database based on quick response code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424492B (en) * 2013-09-02 2017-12-05 阿里巴巴集团控股有限公司 A kind of data processing method and device based on Quick Response Code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174286A (en) * 2006-10-31 2008-05-07 佛山市顺德区顺达电脑厂有限公司 Method for controlling computer use authority by radio frequency recognizing volume label
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN104794377A (en) * 2014-06-05 2015-07-22 合肥星服信息科技有限责任公司 Right control method for desktop system without database based on quick response code

Also Published As

Publication number Publication date
CN106709319A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN106709319B (en) Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method
US10469253B2 (en) Methods and apparatus for migrating keys
EP3241129B1 (en) User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system
CN103906054B (en) Method and system for authorization of software function modules of internet of things
CN107948152B (en) Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment
CN101014944A (en) Method and apparatus for digital rights management
JP6123353B2 (en) Document authority management system, terminal device, document authority management method, and program
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN102724552A (en) Image coding method, image decoding method and device
JP6930053B2 (en) Data encryption method and system using device authentication key
CN109039997B (en) Secret key obtaining method, device and system
WO2019077198A1 (en) Media content privacy control
KR20170038542A (en) Security certification apparatus using biometric information and security certification method
CN110598421B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN104573475A (en) Method and system for authenticating transcoding service program
CN103457723B (en) A kind of encryption method and the encryption device based on it
US20180314807A1 (en) File permission control method
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
CN111625802A (en) Projector authorization use method
CN104580262A (en) Safety method applicable to wireless internet of things
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN109413449B (en) Video encryption and decryption method and system
CN114092488A (en) Image processing method, image processing device, electronic equipment and storage medium
Zhang et al. Compressive sensing
KR102469380B1 (en) Method and system for de-identifying and restoring personal information of image data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 100176 unit 502, 5 / F, block B, building 11, yard 8, Liangshuihe 2nd Street, economic and Technological Development Zone, Daxing District, Beijing

Patentee after: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd.

Address before: 100020, No. 25, middle third ring road, Chaoyang District, Beijing, 13, 1315-1319

Patentee before: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder