CN107766909B - The method and system of anti-tamper processing is carried out to two-dimension code pattern - Google Patents

The method and system of anti-tamper processing is carried out to two-dimension code pattern Download PDF

Info

Publication number
CN107766909B
CN107766909B CN201711058620.0A CN201711058620A CN107766909B CN 107766909 B CN107766909 B CN 107766909B CN 201711058620 A CN201711058620 A CN 201711058620A CN 107766909 B CN107766909 B CN 107766909B
Authority
CN
China
Prior art keywords
dimension code
code pattern
binary number
permutation graph
replacement areas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711058620.0A
Other languages
Chinese (zh)
Other versions
CN107766909A (en
Inventor
周晓明
张泽华
叶斌
廖愉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen All Things Together Intelligent Technology Co Ltd
Original Assignee
Xiamen All Things Together Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen All Things Together Intelligent Technology Co Ltd filed Critical Xiamen All Things Together Intelligent Technology Co Ltd
Priority to CN201711058620.0A priority Critical patent/CN107766909B/en
Publication of CN107766909A publication Critical patent/CN107766909A/en
Application granted granted Critical
Publication of CN107766909B publication Critical patent/CN107766909B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of methods carrying out anti-tamper processing to two-dimension code pattern comprising:Analysis of two-dimensional code figure calculates analysis result using Digital Signature Algorithm, and converts calculated result to binary number;The binary number is converted into permutation graph, the black block wherein in the permutation graph indicates that binary number " 1 ", white blocks indicate binary number " 0 ";And the permutation graph is placed in one or more replacement areas of the two-dimension code pattern.The invention also discloses a kind of systems carrying out anti-tamper processing to two-dimension code pattern.

Description

The method and system of anti-tamper processing is carried out to two-dimension code pattern
Technical field
The present invention relates to Quick Response Code (QR code, quick response code) technical field, and more particularly to one Kind carries out two-dimension code pattern the method and system of anti-tamper processing.
Background technology
In recent years, Quick Response Code receives businessman and user due to the advantages such as its is simple, easy-to-use, information capacity is big, reliability is high Favor, and be widely used in the numerous areas such as internet, mobile application, information preservation, logistics management.In Quick Response Code It has been widely used instantly, due to all more important information such as network information, subscriber datas in worldwide It is carried on wherein, and the swindle event under network environment emerges one after another, information security becomes more important.Therefore, there is an urgent need for can With the technology for identifying, preventing Quick Response Code to be tampered.
Invention content
The present invention proposes a kind of method and system carrying out anti-tamper processing to two-dimension code pattern, can be so as to identification original two Whether dimension code has been tampered with, and prevents Quick Response Code to be tampered to realize.
In one aspect, it is proposed that a method of anti-tamper processing is carried out to two-dimension code pattern comprising:Analysis of two-dimensional Code figure, calculates analysis result using Digital Signature Algorithm, and convert calculated result to binary number;By this two into Number processed is converted to permutation graph, and the black block wherein in the permutation graph indicates that binary number " 1 ", white blocks indicate binary number "0";And the permutation graph is placed in one or more replacement areas of the two-dimension code pattern.
In certain embodiments, the pattern primitive prime number of the graphic element quantity Yu the two-dimension code pattern of the permutation graph The upper limit of the ratio of amount is the serious forgiveness of the two-dimension code pattern.
In certain embodiments, which is carried out increasing at least one in check bit processing and disorder processing A processing, then the binary number is converted to the permutation graph by treated.
In certain embodiments, replacement areas first address and displacement zone are recorded in the specific position of the two-dimension code pattern At least one of domain recognition scheme, the wherein specific position be not Chong Die with one or more replacement areas.
On the other hand, it is proposed that a kind of system that anti-tamper processing is carried out to two-dimension code pattern, including processor and Memory is stored with coding processing unit in the memory, the coding processing unit:Analysis of two-dimensional code figure is signed using number Name algorithm calculates analysis result, and converts calculated result to binary number;The binary number is converted into permutation graph Shape, the black block wherein in the permutation graph indicate that binary number " 1 ", white blocks indicate binary number " 0 ";And by the displacement Figure is placed in one or more replacement areas of the two-dimension code pattern.
In certain embodiments, the pattern primitive prime number of the graphic element quantity Yu the two-dimension code pattern of the permutation graph The upper limit of the ratio of amount is the serious forgiveness of the two-dimension code pattern.
In certain embodiments, which carries out the binary number to increase check bit processing and scramble At least one of processing processing, then the binary number is converted to the permutation graph by treated.
In certain embodiments, which records replacement areas in the specific position of the two-dimension code pattern At least one of first address and replacement areas recognition scheme, the wherein specific position not with one or more replacement areas weights It is folded.
In a further embodiment, further include codec processing unit, which obtains from the specific position The replacement areas first address is at least one with the recognition scheme kind, and according to the replacement areas first address of acquirement and the recognition At least one of scheme reads the permutation graph.
In a further embodiment, which carries out the binary number of the permutation graph read anti- At least one of disorder processing and verification reduction treatment processing, to obtain validating documents information.
On the other hand, it is proposed that a kind of computer readable storage medium is stored thereon with one or more computer journeys Sequence, one or more computer programs are subsequently can by computer when device executes and realize following steps:
Analysis of two-dimensional code figure calculates analysis result using Digital Signature Algorithm, and converts calculated result to Binary number;
The binary number is converted into permutation graph, the black block wherein in the permutation graph indicates binary number " 1 ", in vain Color lump indicates binary number " 0 ";And
The permutation graph is placed in one or more replacement areas of the two-dimension code pattern.
In a further embodiment, the pattern primitive prime number of the graphic element quantity Yu the two-dimension code pattern of the permutation graph The upper limit of the ratio of amount is the serious forgiveness of the two-dimension code pattern.
In a further embodiment, the step of which being converted to the two-dimension code pattern include:To this two into Number processed increase check bit processing and at least one of disorder processing, then will treated that the binary number is converted to this sets Change figure.
In a further embodiment, which it is following to be subsequently can by computer also realization when device executes Step:At least one in the specific position record replacement areas first address and replacement areas recognition scheme of the two-dimension code pattern A, wherein the specific position is not Chong Die with one or more replacement areas.
In a further embodiment, which it is following to be subsequently can by computer also realization when device executes Step:At least one of the replacement areas first address and the recognition scheme, and being somebody's turn to do according to acquirement are obtained from the specific position One in replacement areas first address and the recognition scheme is read the permutation graph.
In a further embodiment, which it is following to be subsequently can by computer also realization when device executes Step:At least one of anti-disorder processing and verification reduction treatment place are carried out to the binary number of the permutation graph read Reason, to obtain validating documents information.
The present invention, then will coding by being re-encoded to the figure of the Quick Response Code on the basis of ordinary QR code As a result it is placed in the figure of the Quick Response Code, to carry out local displacement to former two-dimension code pattern.Two-dimension code pattern through displacement can The result for being distinguished using tools such as special-purpose softwares (such as cell phone application) and parsing, and parsing can be used as verification foundation, use The primitiveness of former Quick Response Code is verified, whether is had been tampered with so as to the former Quick Response Code of identification, two dimension is prevented to realize Code is tampered.
Description of the drawings
Including attached drawing to provide a further understanding of embodiments and attached drawing is incorporated into this specification and is constituted this Part of specification.Attached drawing illustrates embodiment and together with the description principle for explaining the present invention.It will readily recognize that To many expected advantages of other embodiments and embodiment, because described in detail below by quoting, they become by preferably Understand.The element of attached drawing is not necessarily mutually proportionally.Same reference numeral refers to corresponding like.
Fig. 1 is the flow chart of two-dimension code pattern processing method according to an embodiment of the invention;
Fig. 2 is the flow chart of two-dimension code pattern processing method according to another embodiment of the invention;And
Fig. 3 is the schematic diagram of two-dimension code pattern processing system according to an embodiment of the invention.
Specific implementation mode
In the following detailed description, refer to the attached drawing, the attached drawing form a part for detailed description, and by wherein can be real The illustrative specific embodiment of the present invention is trampled to show.It is patrolled it should be understood that other embodiment can be utilized or can be made It collects and changes, without departing from the scope of the present invention.Therefore described in detail below to be used in limiting sense, and this The range of invention is defined by the following claims.
Fig. 1 shows the flow chart of two-dimension code pattern processing method according to an embodiment of the invention.Such as Fig. 1 institutes Show, which includes the following steps:
S10:A two-dimension code pattern is analyzed, analysis result is calculated using Digital Signature Algorithm, and is tied calculating Fruit is converted to a binary number.
The two-dimension code pattern is the ordinary QR code figure being generated in advance.In one embodiment, which is MD5 algorithms, which includes (to the two-dimension code pattern) recognition and parsing, therefore the step specifically includes:Recognition and parsing The two-dimension code pattern, calculates analysis result using MD5 algorithms that (analysis result is calculated original as MD5 at this time Data), and convert calculated result to the binary number.In other embodiments, the Digital Signature Algorithm can be sha-1, Other Digital Signature Algorithms such as RIPEMD, Haval.It should be understood that for the different initial data inputted, MD5 algorithms Different MD5 values can be exported, therefore it exports result with uniqueness;If conversely, having obtained the MD5 of some initial data Value, can learn another initial data according to this by calculating the MD5 values of another initial data and comparing two MD5 values Primitiveness.
S20:Binary number is converted into a permutation graph, the black block in permutation graph indicates binary number " 1 ", in vain Color lump indicates binary number " 0 ".
The coding style of the permutation graph is consistent with the coding style of the two-dimension code pattern, black block therein indicate two into Number " 1 " processed, white blocks indicate that binary number " 0 ", the two form the primary graphic element of the permutation graph.In one embodiment, Can the processing such as increase check bit, scramble first be carried out to the binary number, then binary number is converted to the permutation graph by treated Shape.
S30:Permutation graph is placed in the replacement areas of two-dimension code pattern.
It should be noted that in order to ensure that former two-dimension code pattern can normally be read after being placed in permutation graph, it should The upper limit of the ratio of the graphic element quantity of permutation graph and the graphic element quantity of the two-dimension code pattern is the two-dimension code pattern Serious forgiveness.It should be understood that in the replacement areas for being placed into permutation graph, although the figure of original encoding is replaced figure It replaces and has not existed, i.e., form the destruction encoded to former two-dimension code pattern after the former two-dimension code pattern of permutation graph merging, But due to serious forgiveness of the Quick Response Code coding with highest 30%, when the accounting of the graphic element quantity of permutation graph is no more than When serious forgiveness, former two-dimension code pattern coding still can normally be read.
In one embodiment, the replacement areas being placed in can randomly choose, and replacement areas can have one or more.Having In the embodiment of body, which can be one piece of continuous region.In addition, multiple replacement areas can also be polylith not Continuous region, at this time the graphic element quantity of all replacement areas and graphic element quantity equal to the permutation graph it is total Amount, the accounting of total amount should not be more than serious forgiveness.At this point, the graphic element of the permutation graph in merging replacement areas is in each displacement It can be arranged according to row sequence or row sequence in region.
Fig. 2 shows the flow charts of two-dimension code pattern processing method according to another embodiment of the invention.Such as Fig. 2 institutes Show, the two-dimension code pattern processing method is further comprising the steps of other than the step S10~S30 identical as previous embodiment:
S40:The first address and recognition scheme of replacement areas are recorded in the specific position of two-dimension code pattern, the specific position is not It is Chong Die with replacement areas.
The accurate location of replacement areas is successfully navigated to when in order to enable recognition and obtains the information such as recognition sequence, The two-dimension code pattern specific position record replacement areas first address and recognition scheme, using as replacement areas address and The index of reading method.For example, for different replacement areas, the arrangement mode of graphic element in replacement areas, replacement areas It is the combination of the different factors such as Coutinuous store or discontinuous storage, different recognition schemes can be formed, and with an index numerical value It indicates, and to index numerical space can be planned as needed.
In recognition, it special-purpose software (such as cell phone application) can be used to obtain reading from the specific position of two-dimension code pattern and set The index for changing region obtains the recognition first address and recognition scheme of permutation graph according to the index, to obtain permutation graph Encoded content.
Fig. 3 shows the schematic diagram of two-dimension code pattern processing system according to an embodiment of the invention.Such as Fig. 3 institutes Show, two-dimension code pattern processing system 100 includes coding processing unit 110, codec processing unit 120 and verification processing unit 130.
In one embodiment, two-dimension code pattern processing system 100 is a kind of computing device (such as server, computer and shifting Dynamic intelligent terminal), including processor and memory.The processor is a kind of IC chip (such as microprocessor (central processing unit, CPU)), for executing the computer program stored in the memory.Coded treatment Unit 110, codec processing unit 120 and verification processing unit 130 are stored in the form of a computer program in the memory.? In other embodiment, two-dimension code pattern processing system 100 can be that a kind of computer-readable storage medium (such as CD, dodges Deposit (flash memory) and read-only memory (ROM, read-only memory)), coding processing unit 110, decoding process Unit 120 and verification processing unit 130 are stored in the form of software modules in the storage medium.In addition, the processor can be with It is digital signal processor (digital signal processor, DSP), application-specific integrated circuit (application Specific integrated circuit, ASIC), ready-made programmable gate array (field-programmable gate Array, FPGA) or other programmable logic device.
Coding processing unit 110 analyzes a two-dimension code pattern, is calculated analysis result using Digital Signature Algorithm, And convert calculated result to a binary number;Binary number is converted into a permutation graph, the black in permutation graph Block indicates that binary number " 1 ", white blocks indicate binary number " 0 ";And permutation graph is placed in the displacement zone of two-dimension code pattern In domain.
The two-dimension code pattern is the ordinary QR code figure being generated in advance.In one embodiment, which is MD5 algorithms, the analysis include (to the two-dimension code pattern) recognition and parsing.In other embodiments, the Digital Signature Algorithm Can be other Digital Signature Algorithms such as sha-1, RIPEMD, Haval.
The coding style of the permutation graph is consistent with the coding style of the two-dimension code pattern, black block therein indicate two into Number " 1 " processed, white blocks indicate that binary number " 0 ", the two form the primary graphic element of the permutation graph.In one embodiment, Coding processing unit 110 first can carry out the processing such as increase check bit, scramble to the binary number, then will treated binary number Be converted to the permutation graph.
It should be noted that in order to ensure that former two-dimension code pattern can normally be read after being placed in permutation graph, it should The upper limit of the ratio of the graphic element quantity of permutation graph and the graphic element quantity of the two-dimension code pattern is the two-dimension code pattern Serious forgiveness.
The accurate location of replacement areas is successfully navigated to when in one embodiment, in order to enable recognition and obtains knowledge Reading sequence etc. information, coding processing unit 110 can the specific position of the two-dimension code pattern record replacement areas first address and Recognition scheme, using the index of address and reading method as replacement areas, the wherein specific position is not Chong Die with replacement areas.
Codec processing unit 120 obtains the first address and recognition scheme of the replacement areas from the specific position, and reads according to this Take the permutation graph.In one embodiment, codec processing unit 120 carries out the binary number of the permutation graph read anti- Disorder processing and verification reduction treatment, to obtain validating documents information (such as MD5 values of the original coding of two-dimension code pattern).
Verification processing unit 130 is verified according to the validating documents information, to judge the primitiveness of the two-dimension code pattern. In one embodiment, the MD5 values of the original coding of (through displacement) two-dimension code pattern acquired by the codec processing unit 120 with Use the coding for the former two-dimension code pattern of (without the displacement) for corresponding to the two-dimension code pattern that ordinary QR code arithmetic analysis goes out MD5 values it is consistent when, verification processing unit 130 judges that the encoded content of the original two-dimension code pattern is initial value, otherwise verification processing Unit 130 judges that the encoded content of the original two-dimension code pattern has been tampered with.
The present invention, then will coding by being re-encoded to the figure of the Quick Response Code on the basis of ordinary QR code As a result it is placed in the figure of the Quick Response Code, to carry out local displacement to former two-dimension code pattern.Two-dimension code pattern through displacement can The result for being distinguished using tools such as special-purpose softwares (such as cell phone application) and parsing, and parsing can be used as verification foundation, use The primitiveness of former Quick Response Code is verified, whether is had been tampered with so as to the former Quick Response Code of identification, two dimension is prevented to realize Code is tampered.
Obviously, those skilled in the art can make to the present invention without departing from the spirit and scope of the present invention Embodiment various modifications and change.In this manner, if these modifications and changes be in the present invention claim and its In the range of equivalent form, then the present invention, which also aims to, covers these modifications and changes.Word " comprising " is not excluded for not wanting in right The presence for the other element or steps listed in asking.The simple thing that certain measures are recorded in mutually different dependent claims Do not indicate that the combination of these measures is consequently not used for making a profit in fact.Any reference numeral in claim should not be regarded as limited to Range.

Claims (13)

1. a kind of method carrying out anti-tamper processing to two-dimension code pattern, which is characterized in that including:
Analysis of two-dimensional code figure calculates analysis result using Digital Signature Algorithm, and convert calculated result to two into Number processed;
The binary number is converted into permutation graph, the black block wherein in the permutation graph indicates binary number " 1 ", white blocks Indicate binary number " 0 ";And
The permutation graph is placed in one or more replacement areas of the two-dimension code pattern;
At least one of replacement areas first address and replacement areas recognition scheme are recorded in the specific position of the two-dimension code pattern, Wherein the specific position is not Chong Die with one or more replacement areas.
2. according to the method described in claim 1, it is characterized in that, the graphic element quantity of the permutation graph and the Quick Response Code figure The upper limit of the ratio of the graphic element quantity of shape is the serious forgiveness of the two-dimension code pattern.
3. according to the method described in claim 1, it is characterized in that, the step of binary number is converted to the two-dimension code pattern Including:
Increase check bit processing and at least one of disorder processing to the binary number, then will treated the binary system Number is converted to the permutation graph.
4. a kind of system carrying out anti-tamper processing to two-dimension code pattern, including processor and memory, stored in the memory There is coding processing unit, which is characterized in that the coding processing unit:
Analysis of two-dimensional code figure calculates analysis result using Digital Signature Algorithm, and converts calculated result to one or two System number;
The binary number is converted into permutation graph, the black block wherein in the permutation graph indicates binary number " 1 ", white blocks Indicate binary number " 0 ";And
The permutation graph is placed in one or more replacement areas of the two-dimension code pattern;
At least one of replacement areas first address and replacement areas recognition scheme are recorded in the specific position of the two-dimension code pattern, Wherein the specific position is not Chong Die with one or more replacement areas.
5. system according to claim 4, which is characterized in that the graphic element quantity of the permutation graph and the Quick Response Code figure The upper limit of the ratio of the graphic element quantity of shape is the serious forgiveness of the two-dimension code pattern.
6. system according to claim 4, which is characterized in that the coding processing unit:
Increase check bit processing and the processing of at least one of disorder processing to the binary number, then will treated this two System number is converted to the permutation graph.
7. system according to claim 4, which is characterized in that be also stored with codec processing unit in the memory, the solution Code processing unit:
At least one of the replacement areas first address and the recognition scheme are obtained from the specific position, and is set according to this of acquirement One changed in region first address and the recognition scheme reads the permutation graph.
8. system according to claim 7, which is characterized in that the codec processing unit:
At least one of anti-disorder processing and verification reduction treatment place are carried out to the binary number of the permutation graph read Reason, to obtain validating documents information.
9. a kind of computer readable storage medium is stored thereon with one or more computer programs, which is characterized in that this is one or more A computer program is subsequently can by computer when device executes and realizes following steps:
Analysis of two-dimensional code figure calculates analysis result using Digital Signature Algorithm, and convert calculated result to two into Number processed;
The binary number is converted into permutation graph, the black block wherein in the permutation graph indicates binary number " 1 ", white blocks Indicate binary number " 0 ";And
The permutation graph is placed in one or more replacement areas of the two-dimension code pattern;
At least one of replacement areas first address and replacement areas recognition scheme are recorded in the specific position of the two-dimension code pattern, Wherein the specific position is not Chong Die with one or more replacement areas.
10. computer readable storage medium according to claim 9, which is characterized in that the graphic element of the permutation graph The upper limit of the ratio of the graphic element quantity of quantity and the two-dimension code pattern is the serious forgiveness of the two-dimension code pattern.
11. computer readable storage medium according to claim 9, which is characterized in that the binary number is converted to this The step of two-dimension code pattern includes:
Increase check bit processing and at least one of disorder processing to the binary number, then will treated the binary system Number is converted to the permutation graph.
12. computer readable storage medium according to claim 9, which is characterized in that one or more computer programs It is subsequently can by computer when device executes and also realizes following steps:
At least one of the replacement areas first address and the recognition scheme are obtained from the specific position, and is set according to this of acquirement One changed in region first address and the recognition scheme reads the permutation graph.
13. computer readable storage medium according to claim 12, which is characterized in that one or more computer programs It is subsequently can by computer when device executes and also realizes following steps:
At least one of anti-disorder processing and verification reduction treatment place are carried out to the binary number of the permutation graph read Reason, to obtain validating documents information.
CN201711058620.0A 2017-11-01 2017-11-01 The method and system of anti-tamper processing is carried out to two-dimension code pattern Active CN107766909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711058620.0A CN107766909B (en) 2017-11-01 2017-11-01 The method and system of anti-tamper processing is carried out to two-dimension code pattern

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711058620.0A CN107766909B (en) 2017-11-01 2017-11-01 The method and system of anti-tamper processing is carried out to two-dimension code pattern

Publications (2)

Publication Number Publication Date
CN107766909A CN107766909A (en) 2018-03-06
CN107766909B true CN107766909B (en) 2018-11-06

Family

ID=61272156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711058620.0A Active CN107766909B (en) 2017-11-01 2017-11-01 The method and system of anti-tamper processing is carried out to two-dimension code pattern

Country Status (1)

Country Link
CN (1) CN107766909B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325573B (en) * 2018-09-25 2021-10-01 北京奇艺世纪科技有限公司 Two-dimensional code generation method, two-dimensional code reading method and two-dimensional code reading device
CN113204755B (en) * 2021-04-20 2022-10-14 重庆工业职业技术学院 Data capture method for block chain big data security
CN117061128B (en) * 2023-10-11 2023-12-22 北京天润基业科技发展股份有限公司 Verification method and device for data replacement, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377837A (en) * 2007-08-29 2009-03-04 北京方维银通科技有限公司 Method for generating and checking electronic check two-dimension code credence
CN105706118A (en) * 2013-10-30 2016-06-22 凸版Tdk标签株式会社 2D-code generation method, 2D-code generation device, 2D-code reading method, 2D-code reading device, 2D code, and program
CN106599964A (en) * 2016-11-24 2017-04-26 中国银联股份有限公司 Two-dimensional code generation and verification method and device
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198344B (en) * 2013-03-01 2015-09-09 重庆市远大印务有限公司 Tax control secure two-dimensional code coding, decoding processing method
CN104778491B (en) * 2014-10-13 2017-11-07 刘整 For the image code of information processing and generation with parsing its apparatus and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377837A (en) * 2007-08-29 2009-03-04 北京方维银通科技有限公司 Method for generating and checking electronic check two-dimension code credence
CN105706118A (en) * 2013-10-30 2016-06-22 凸版Tdk标签株式会社 2D-code generation method, 2D-code generation device, 2D-code reading method, 2D-code reading device, 2D code, and program
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code
CN106599964A (en) * 2016-11-24 2017-04-26 中国银联股份有限公司 Two-dimensional code generation and verification method and device

Also Published As

Publication number Publication date
CN107766909A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN107766909B (en) The method and system of anti-tamper processing is carried out to two-dimension code pattern
CN103400174B (en) The coded method of a kind of Quick Response Code, coding/decoding method and system
CN111539502B (en) Anti-counterfeiting two-dimensional code generation method and device, server and storage medium
CN111095255B (en) Method for storing data, electronic data storage system and telecommunication system
CN110457873B (en) Watermark embedding and detecting method and device
CN111201753B (en) Method for tamper-proof storage of data, electronic data storage system and telecommunication system
WO2021169502A1 (en) A pixel image as well as its processing method and application system
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
CN112383554A (en) Interface flow abnormity detection method and device, terminal equipment and storage medium
CN115205866A (en) Block chain-based scientific and technological paper big data plagiarism detection method and system
CN110322385B (en) Watermark embedding and extracting method and device and electronic equipment
CN111265860B (en) Game archiving processing method and device, terminal equipment and readable storage medium
CN116127106A (en) Block chain-based intelligent storage method and system for Internet image big data
CN107085727B (en) Method and device for determining image boundary function
CN115423063B (en) Anti-copying shading anti-counterfeiting method and device based on micro-point code
CN105786415A (en) File printing encryption method and device
CN110990665B (en) Data processing method, device, system, electronic equipment and storage medium
CN113204476A (en) User behavior data security detection method
CN112800055A (en) Data truth verification method, system, device and medium based on bloom filter
CN108922567B (en) Method and device for limiting reading times of hidden data of optical disc
CN113497781B (en) Phishing website identification method and device and computer readable storage medium
CN113448806B (en) Database cluster anomaly detection method and device, terminal device and storage medium
EP3529749B1 (en) Graphic protective element authenticity check system
CN107862363B (en) The method and apparatus that anti-copying processing is carried out to Quick Response Code
CN115114588A (en) Intelligent education academic achievement discussion anti-plagiarism method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: The method and system of tamper proof processing for two dimensional code graphics

Effective date of registration: 20210412

Granted publication date: 20181106

Pledgee: Xiamen Branch of PICC

Pledgor: XIAMEN ATTIOT INTELLIGENT TECHNOLOGY Co.,Ltd.

Registration number: Y2021980002525

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20220803

Granted publication date: 20181106

Pledgee: Xiamen Branch of PICC

Pledgor: XIAMEN ATTIOT INTELLIGENT TECHNOLOGY CO.,LTD.

Registration number: Y2021980002525

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method and system for anti-tampering processing of two-dimensional code graphics

Effective date of registration: 20220922

Granted publication date: 20181106

Pledgee: China Everbright Bank Limited by Share Ltd. Xiamen branch

Pledgor: XIAMEN ATTIOT INTELLIGENT TECHNOLOGY CO.,LTD.

Registration number: Y2022980016101