CN107657294B - Method and system for improving security of two-dimension code on publication - Google Patents

Method and system for improving security of two-dimension code on publication Download PDF

Info

Publication number
CN107657294B
CN107657294B CN201710866319.6A CN201710866319A CN107657294B CN 107657294 B CN107657294 B CN 107657294B CN 201710866319 A CN201710866319 A CN 201710866319A CN 107657294 B CN107657294 B CN 107657294B
Authority
CN
China
Prior art keywords
identifier
publication
code number
code
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710866319.6A
Other languages
Chinese (zh)
Other versions
CN107657294A (en
Inventor
刘永坚
白立华
施其明
刘益
肖行辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ligong Digital Communications Engineering Co ltd
Original Assignee
Wuhan Ligong Digital Communications Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ligong Digital Communications Engineering Co ltd filed Critical Wuhan Ligong Digital Communications Engineering Co ltd
Priority to CN201710866319.6A priority Critical patent/CN107657294B/en
Publication of CN107657294A publication Critical patent/CN107657294A/en
Application granted granted Critical
Publication of CN107657294B publication Critical patent/CN107657294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for improving the security of two-dimension codes on publications, which comprises the following steps: verifying the identity information of a publication press of the publication, and generating a two-dimensional code corresponding to the publication after the verification is passed, wherein the two-dimensional code stores the code number of the two-dimensional code; distributing corresponding identifiers for the online extension contents corresponding to the publications; establishing an identifier database, storing the code numbers and the identifiers into the identifier database, and correlating the code numbers and the identifiers in the identifier database; when receiving the code number sent by the reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking the identifier corresponding to the inquired inquiry code number as a result identifier; and verifying the authenticity of the on-line extended content corresponding to the result identifier, and sending the result identifier to the reader after the verification is passed. The invention ensures the safety of the online extended content of the publication by adding the intermediate verification process.

Description

Method and system for improving security of two-dimension code on publication
Technical Field
The invention relates to the technical field of two-dimension codes, in particular to a method and a system for improving the safety of two-dimension codes on publications.
Background
With the wide development of the two-dimension code technology and the requirement of paper publications on-line extended contents, many publishers print two-dimension codes on the publications, and readers can quickly browse the on-line extended contents corresponding to the publications only by reading the two-dimension codes on the publications through two-dimension code reading equipment.
The two-dimensional code technology has the advantages of being capable of solving the problems that the traditional paper publications cannot meet the requirements of instantaneous change of information and people browse quickly, and the unique 'entrance' characteristic of the two-dimensional code technology can be used for connecting various media quickly and accurately to play a synergistic effect among the media. In recent years, the application mode of the two-dimensional code in the traditional publishing field is continuously mature, and the two-dimensional code becomes an important medium for promoting the conversion of the traditional plane media into a novel multimedia platform. Traditional publishing companies have begun to attempt to extend book content using linked text, pictures, video, animation, etc., leading to online and offline services.
However, while the two-dimensional code brings convenience to our life, potential safety hazards of the two-dimensional code are gradually highlighted, such as phishing websites, mobile phone viruses, malicious programs and the like are spread everywhere through the two-dimensional code. In particular, since security of the two-dimensional code on the publication is important as an authority for guiding public opinion, such as a media publisher, it is necessary to improve security of the two-dimensional code on the publication.
Disclosure of Invention
In view of the above problems in the prior art, the present application provides a method for improving security of a two-dimensional code on a publication, including:
verifying identity information of a publication press of a publication, and generating a two-dimensional code corresponding to the publication after the verification is passed, wherein the two-dimensional code stores a code number of the two-dimensional code;
distributing corresponding identifiers for the online extension contents corresponding to the publications;
establishing an identifier database, storing the code number and the identifier in the identifier database, wherein the code number and the identifier are associated with each other in the identifier database;
when receiving a code number sent by a reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking an identifier corresponding to the inquired inquiry code number as a result identifier;
and verifying the authenticity of the online extended content corresponding to the result identifier, and sending the result identifier to the reader after the verification is passed.
Optionally, the identifier is a website link of the online extension content corresponding to the publication.
Optionally, after the step of verifying the authenticity of the online extension content corresponding to the result identifier, the method further includes: and when the verification fails, sending alarm information and repairing the on-line extended content corresponding to the result identifier.
Optionally, the method further comprises: and when the publisher of the publication does not maintain the on-line extended content corresponding to the publication any more, deleting the code number of the two-dimensional code corresponding to the publication and the identifier of the on-line extended content corresponding to the publication in the identifier data.
Optionally, before the step of verifying identity information of a publisher of the publication, the method further comprises: receiving its own identity information submitted by the publisher of the publication.
Accordingly, to solve the above problems, the present invention further provides a system for improving security of a two-dimensional code on a publication, comprising:
the system comprises a publishing company information verification module, a publishing company information verification module and a verification module, wherein the publishing company information verification module is used for verifying identity information of a publishing company of a publication and generating a two-dimensional code corresponding to the publication after verification is passed, and the two-dimensional code stores a code number of the two-dimensional code;
the identifier distribution module is used for distributing corresponding identifiers for the online extension contents corresponding to the publications;
a database management module for establishing an identifier database in which the code number and the identifier are associated with each other, and storing the code number and the identifier in the identifier database;
the query module is used for taking the code number sent by the reader as a query code number when receiving the code number sent by the reader, querying the identifier database according to the query code number, and taking an identifier corresponding to the queried query code number as a result identifier;
and the extended content verification module is used for verifying the authenticity of the online extended content corresponding to the result identifier and sending the result identifier to the reader after the verification is passed.
Optionally, the identifier is a website link of the online extension content corresponding to the publication.
Optionally, the extended content verification module is further configured to: and when the verification fails, sending alarm information and repairing the on-line extended content corresponding to the result identifier.
Optionally, the system further comprises: and the logout module is used for deleting the code number of the two-dimensional code corresponding to the publication and the identifier of the online extended content corresponding to the publication in the identifier data when the publisher of the publication does not maintain the online extended content corresponding to the publication any more.
Optionally, the system further comprises: and the receiving module is used for receiving the identity information of the receiving module, which is submitted by the publisher of the publication.
The method comprises the steps of verifying identity information of a publication press, and generating a two-dimensional code corresponding to the publication after the verification is passed; distributing corresponding identifiers for the online extension contents corresponding to the publications; establishing an identifier database, and storing the code number and the identifier into the identifier database; when receiving the code number sent by the reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking the identifier corresponding to the inquired inquiry code number as a result identifier; and verifying the authenticity of the on-line extended content corresponding to the result identifier, and sending the result identifier to the reader after the verification is passed. Thereby effectively improving the safety of the two-dimension code on the publication.
Drawings
Fig. 1 is a flowchart of a method for improving security of a two-dimensional code on a publication according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a system for improving security of a two-dimensional code on a publication according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
First embodiment
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for improving security of a two-dimensional code on a publication according to a first embodiment of the present invention, which includes the following specific steps:
s101, verifying the identity information of the publication press, and generating a two-dimensional code corresponding to the publication after the verification is passed.
It should be noted that, in step 101, after receiving the identity information of the publication itself submitted by the publisher of the publication, the third-party platform verifies the identity information of the publisher, and only after the identity information of the publisher passes verification, the third-party platform distributes the corresponding two-dimensional code to the publication, so that the reliability of the source of the two-dimensional code is ensured from the source of the two-dimensional code.
Compared with the website link for directly storing the online extension content in the existing two-dimensional code on the publication, the two-dimensional code generated in the embodiment does not directly store the website link for directly storing the online extension content, but stores a unique code number corresponding to the two-dimensional code, and the reader reads the two-dimensional code to obtain the code number stored in the two-dimensional code and then needs to request the online extension content corresponding to the publication from the third-party platform according to the code number.
And S102, distributing corresponding identifiers for the online extension contents corresponding to the publications.
It should be noted that the identifier is used to be associated with the online extension content of the publication, so that the online extension content of the publication corresponding to the identifier can be obtained by the identifier. And considering that different online extension contents all correspond to a unique website link, the website link of the online extension content corresponding to the publication is used as the identifier in this embodiment.
S103, establishing an identifier database, and storing the code number and the identifier into the identifier database.
In the identifier database, the code number of the two-dimensional code corresponding to the publication and the identifier of the online extension content corresponding to the publication are associated with each other. That is, the identifier of the online extension content corresponding to the publication can be queried in the identifier database through the code number of the two-dimensional code. And combining the description in step 102, it can be further known that the website link of the online extended content corresponding to the publication is directly queried through the code number of the two-dimensional code.
In summary, the two-dimensional code corresponds to the publication, and the code number of the two-dimensional code is associated with the website link of the online extension content of the publication. Therefore, the publication is associated with the on-line extended content of the publication by the code number of the two-dimensional code.
S104, when receiving the code number sent by the reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking the identifier corresponding to the inquired inquiry code number as a result identifier.
It should be noted that, in step 104, after the reader scans the two-dimensional code on the publication and sends the code number of the two-dimensional code to the third-party platform, the third-party platform uses the code number sent by the reader as the query code number, queries the identifier database according to the query code number, and uses the identifier corresponding to the query code number as the result identifier, where the result identifier is the website link of the online extension content of the publication.
And S105, verifying the authenticity of the on-line extended content corresponding to the result identifier, and sending the result identifier to a reader after the verification is passed.
It should be noted that, in step 105, before the website link of the online extension content of the publication is sent to the reader, the authenticity of the web content corresponding to the website link is verified, and when the verification is passed, it indicates that the web content is correct, and at this time, the website link may be sent to the reader, so that the security of the website link acquired by the reader is ensured. And when the authenticity verification of the webpage content does not pass, alarm information can be sent out and the webpage content corresponding to the website link can be repaired.
In addition, when the publisher of the publication does not maintain the online extension content corresponding to the publication, the code number of the two-dimensional code corresponding to the publication and the identifier of the online extension content corresponding to the publication in the identifier data need to be deleted. Namely, the relevance between the publication and the on-line extended content of the publication is cancelled, the two-dimension code is released at the same time, and the released two-dimension code can be relevant to other publications and the on-line extended content corresponding to the publication, so that the multiplexing of the two-dimension code is realized.
In the embodiment, the identity information of the publishing company of the publication is verified, and the two-dimensional code corresponding to the publication is generated after the verification is passed; distributing corresponding identifiers for the online extension contents corresponding to the publications; establishing an identifier database, and storing the code number and the identifier into the identifier database; when receiving the code number sent by the reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking the identifier corresponding to the inquired inquiry code number as a result identifier; and verifying the authenticity of the on-line extended content corresponding to the result identifier, and sending the result identifier to the reader after the verification is passed. Thereby effectively improving the safety of the two-dimension code on the publication.
Second embodiment
Referring to fig. 2, fig. 2 is a schematic structural diagram of a system 200 for improving security of a two-dimensional code on a publication according to a second embodiment of the present invention, and the specific structure includes:
the publisher information verification module 201 is used for verifying the identity information of the publisher of the publication and generating a two-dimensional code corresponding to the publication after the verification is passed;
an identifier assigning module 202, configured to assign a corresponding identifier to the online extension content corresponding to the publication;
the database management module 203 is used for establishing an identifier database, storing the code numbers and the identifiers into the identifier database, and correlating the code numbers and the identifiers in the identifier database;
the query module 204 is configured to, when receiving a code number sent by a reader, take the code number sent by the reader as a query code number, query the identifier database according to the query code number, and take an identifier corresponding to the queried query code number as a result identifier;
and the extended content verification module 205 is configured to verify the authenticity of the online extended content corresponding to the result identifier, and send the result identifier to the reader after the verification is passed.
Further, the extended content verification module 205 is further configured to: and when the verification fails, sending alarm information and repairing the on-line extended content corresponding to the result identifier. The system 200 for improving the security of the two-dimension code on the publication further comprises: a logout module 206 and a receiving module 207, wherein the logout module 206 is configured to delete the code number of the two-dimensional code corresponding to the publication and the identifier of the online extended content corresponding to the publication in the identifier data when the publisher of the publication no longer maintains the online extended content corresponding to the publication. A receiving module 207, configured to receive identity information of a publisher of the publication, which is submitted by the publisher of the publication.
The system 200 for improving the security of the two-dimension code on the publication can realize the functions that need to be realized by the system in the method for improving the security of the two-dimension code on the publication, and therefore, the details are not repeated herein.
In the embodiment, the identity information of the publishing company of the publication is verified, and the two-dimensional code corresponding to the publication is generated after the verification is passed; distributing corresponding identifiers for the online extension contents corresponding to the publications; establishing an identifier database, and storing the code number and the identifier into the identifier database; when receiving the code number sent by the reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking the identifier corresponding to the inquired inquiry code number as a result identifier; and verifying the authenticity of the on-line extended content corresponding to the result identifier, and sending the result identifier to the reader after the verification is passed. Thereby effectively improving the safety of the two-dimension code on the publication.
Furthermore, those skilled in the art will appreciate that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A method for improving security of two-dimensional codes on publications, comprising:
verifying identity information of a publication press of a publication, and generating a two-dimensional code corresponding to the publication after the verification is passed, wherein the two-dimensional code stores a code number of the two-dimensional code;
distributing corresponding identifiers for the online extension contents corresponding to the publications;
establishing an identifier database, storing the code number and the identifier in the identifier database, wherein the code number and the identifier are associated with each other in the identifier database;
when receiving a code number sent by a reader, taking the code number sent by the reader as an inquiry code number, inquiring the identifier database according to the inquiry code number, and taking an identifier corresponding to the inquired inquiry code number as a result identifier;
verifying the authenticity of the on-line extended content corresponding to the result identifier, sending the result identifier to the reader after the verification is passed, and sending alarm information and repairing the on-line extended content corresponding to the result identifier when the verification is not passed;
and when the publisher of the publication does not maintain the on-line extended content corresponding to the publication any more, deleting the code number of the two-dimensional code corresponding to the publication and the identifier of the on-line extended content corresponding to the publication in the identifier data.
2. The method for improving security of a two-dimensional code on a publication according to claim 1, wherein the identifier is a web site link of the online extension content corresponding to the publication.
3. The method for improving security of a two-dimensional code on a publication as recited in claim 1, wherein the step of verifying the identity information of the publisher of the publication is preceded by the method further comprising:
receiving its own identity information submitted by the publisher of the publication.
4. A system for improving security of two-dimensional codes on publications, comprising:
the system comprises a publishing company information verification module, a publishing company information verification module and a verification module, wherein the publishing company information verification module is used for verifying identity information of a publishing company of a publication and generating a two-dimensional code corresponding to the publication after verification is passed, and the two-dimensional code stores a code number of the two-dimensional code;
the identifier distribution module is used for distributing corresponding identifiers for the online extension contents corresponding to the publications;
a database management module for establishing an identifier database in which the code number and the identifier are associated with each other, and storing the code number and the identifier in the identifier database;
the query module is used for taking the code number sent by the reader as a query code number when receiving the code number sent by the reader, querying the identifier database according to the query code number, and taking an identifier corresponding to the queried query code number as a result identifier;
the extended content verification module is used for verifying the authenticity of the online extended content corresponding to the result identifier and sending the result identifier to the reader after the verification is passed;
the extended content verification module is further to: when the verification fails, sending alarm information and repairing the on-line extended content corresponding to the result identifier;
and the logout module is used for deleting the code number of the two-dimensional code corresponding to the publication and the identifier of the online extended content corresponding to the publication in the identifier data when the publisher of the publication does not maintain the online extended content corresponding to the publication any more.
5. The system for improving security of a two-dimensional code on a publication as recited in claim 4, wherein the identifier is a web site link to the online extension corresponding to the publication.
6. The system for enhancing security of two-dimensional codes on publications as recited in claim 4, wherein said system further comprises:
and the receiving module is used for receiving the identity information of the receiving module, which is submitted by the publisher of the publication.
CN201710866319.6A 2017-09-22 2017-09-22 Method and system for improving security of two-dimension code on publication Active CN107657294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710866319.6A CN107657294B (en) 2017-09-22 2017-09-22 Method and system for improving security of two-dimension code on publication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710866319.6A CN107657294B (en) 2017-09-22 2017-09-22 Method and system for improving security of two-dimension code on publication

Publications (2)

Publication Number Publication Date
CN107657294A CN107657294A (en) 2018-02-02
CN107657294B true CN107657294B (en) 2021-01-01

Family

ID=61129933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710866319.6A Active CN107657294B (en) 2017-09-22 2017-09-22 Method and system for improving security of two-dimension code on publication

Country Status (1)

Country Link
CN (1) CN107657294B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113283969B (en) * 2021-06-15 2023-11-07 北京市商汤科技开发有限公司 Display method, device, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9288060B1 (en) * 2013-11-06 2016-03-15 Dell Software Inc. System and method for decentralized authentication of supplicant devices
CN106022399A (en) * 2016-05-06 2016-10-12 庞震伟 Two-dimensional code, two-dimensional code label, two-dimensional code application system formation method and two-dimensional code use method
CN106127489A (en) * 2016-06-14 2016-11-16 天津大学 A kind of books and publications
CN106295757A (en) * 2016-07-29 2017-01-04 纷美(北京)贸易有限公司 Quick Response Code multiplexing method and device, scan method and device, compound Quick Response Code

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8261972B2 (en) * 2010-10-11 2012-09-11 Andrew Ziegler Stand alone product, promotional product sample, container, or packaging comprised of interactive quick response (QR code, MS tag) or other scan-able interactive code linked to one or more internet uniform resource locators (URLs) for instantly delivering wide band digital content, promotions and infotainment brand engagement features between consumers and marketers
CN102915480A (en) * 2012-09-25 2013-02-06 华东师范大学 System and method for managing electronic publication resources by two-dimensional barcode
US20140230075A1 (en) * 2013-02-08 2014-08-14 Xerox Corporation Physical and electronic book reconciliation
CN105491086B (en) * 2014-09-16 2019-01-29 北大方正集团有限公司 Paper media's two dimensional code control method and paper media's server
CN105956098B (en) * 2016-05-03 2019-04-12 华中师范大学 A kind of correlating method and system of paper printed matter and e-sourcing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9288060B1 (en) * 2013-11-06 2016-03-15 Dell Software Inc. System and method for decentralized authentication of supplicant devices
CN106022399A (en) * 2016-05-06 2016-10-12 庞震伟 Two-dimensional code, two-dimensional code label, two-dimensional code application system formation method and two-dimensional code use method
CN106127489A (en) * 2016-06-14 2016-11-16 天津大学 A kind of books and publications
CN106295757A (en) * 2016-07-29 2017-01-04 纷美(北京)贸易有限公司 Quick Response Code multiplexing method and device, scan method and device, compound Quick Response Code

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"传统出版社基于二维码技术的数字化应用初探";周松 等;《出版发行研究》;20161215(第2016年第12期);第49页 *
"我国教辅图书中的二维码应用研究";杨平;《中国优秀硕士学位论文全文数据库(信息科技辑)》;20151215(第2015年第12期);第I142-1页正文第53-54页 *
构建"书网合一"O2O模式的新型教辅——基于二维码与微视频融合的"华师微视";王健 等;《出版参考》;20141020(第2014年第30期);第6-8页 *

Also Published As

Publication number Publication date
CN107657294A (en) 2018-02-02

Similar Documents

Publication Publication Date Title
CN110535660B (en) Evidence obtaining service system based on block chain
US10602202B1 (en) System and techniques for digital data lineage verification
CN111126950A (en) Service processing method, device and equipment based on block chain
CN105635126A (en) Malicious URL access protection method, client side, security server and system
CN109005142B (en) Website security detection method, device, system, computer equipment and storage medium
CN112434348B (en) Data verification processing method, device and equipment
CN105723373A (en) Method for encoding an access to a computer resource
CN108154048B (en) Asset information processing method and device
CN102833276A (en) Webpage login system based on token
CN104091140A (en) Information processing method and electronic device
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN106156345B (en) Item file deposits card method, deposits card equipment and terminal device
CN103561000B (en) A kind of carry out the method for multimedia authentication, device and browser
CN111770072B (en) Method and device for accessing function page through single sign-on
US9665732B2 (en) Secure Download from internet marketplace
JP2012243318A (en) Method for enhancing security in interaction using tag
CN115632798A (en) Electronic certificate authentication tracing method, system and related equipment based on intelligent contract
CN107657294B (en) Method and system for improving security of two-dimension code on publication
CN112100689B (en) Trusted data processing method, device and equipment
CN104426834A (en) Webpage requesting method, client, server and system
CN106888200B (en) Identification association method, information sending method and device
CN102833214A (en) Webpage login system and method based on credential
CN109857748B (en) Contract data processing method and device and electronic equipment
US10079856B2 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
KR102153843B1 (en) Method and apparatus for publishing work in network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant