CN110111461A - A kind of pass identified off-line method and apparatus based on two dimensional code - Google Patents

A kind of pass identified off-line method and apparatus based on two dimensional code Download PDF

Info

Publication number
CN110111461A
CN110111461A CN201910359986.4A CN201910359986A CN110111461A CN 110111461 A CN110111461 A CN 110111461A CN 201910359986 A CN201910359986 A CN 201910359986A CN 110111461 A CN110111461 A CN 110111461A
Authority
CN
China
Prior art keywords
pass
information
data
dimensional code
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910359986.4A
Other languages
Chinese (zh)
Other versions
CN110111461B (en
Inventor
刘少磊
沈怡
祝哲海
罗年庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unitec (jiaxing) Information Technology Co Ltd
Original Assignee
Unitec (jiaxing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unitec (jiaxing) Information Technology Co Ltd filed Critical Unitec (jiaxing) Information Technology Co Ltd
Priority to CN201910359986.4A priority Critical patent/CN110111461B/en
Publication of CN110111461A publication Critical patent/CN110111461A/en
Application granted granted Critical
Publication of CN110111461B publication Critical patent/CN110111461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass

Abstract

The present invention relates to field of data recognition, especially planar bar code technology.The present invention proposes a kind of pass identified off-line method based on two dimensional code, comprising: step 1: obtaining the encryption data of two dimensional code;The encryption information includes the first encryption information and the second encryption information;Step 2: the first encryption data of decryption obtains biological information, carries out biometric authentication to holder;Step 3: the second encryption data of decryption obtains pass data;Step 4: the signature in comparison pass data and pass identification equipment;Step 5: pass data and comparing result is presented.The present invention solves the technical problem that the bio-identification under no network environment of the existing technology is difficult or bio-identification cost is excessively high, realizes offline bio-identification, improves recognition efficiency and safety.

Description

A kind of pass identified off-line method and apparatus based on two dimensional code
Technical field
The present invention relates to software approach fields, especially planar bar code technology.
Background technique
Two dimensional code especially needs to carry out efficiently article in hi-tech industry, storage transport service, wholesale and retail industry etc. The industry of beacon information is widely used.Currently, the verifying of the pass can be generally divided into two kinds: for the pass of meeting class, Existing scheme is to pass through the scanning meeting pass, transfers server data, then carry out recognition of face, the program compares dependent on clothes Business device equipment, the network equipment, and card production course is more complicated, needs to add magnetic treatment to the pass;It is existing for the pass of vehicle Having scheme is that generally human eye checks the pass, then carries out database data comparison by scanning license plate, finally determines the passage Whether vehicle, which has permission, passes through.The program equally exists the case where needing network and server, the program in real scene simultaneously It cannot be guaranteed that the stability veritified, and cost is relatively high.
Summary of the invention
The present invention is bio-identification difficulty and the bio-identification cost mistake solved under no network environment of the existing technology High technical problem provides a kind of pass identified off-line method and apparatus based on two dimensional code, realizes that the offline testimony of a witness is veritified, protects Witness's privacy is shielded and sustain, recognition efficiency and safety are improved.
A kind of pass identified off-line method based on two dimensional code, comprising:
Step 1: obtaining the encryption data of two dimensional code;The encryption information includes the first encryption information and the second encryption letter Breath;
Step 2: the first encryption data of decryption obtains biological information, carries out biometric authentication to holder;
Step 3: the second encryption data of decryption obtains pass data;
Step 4: the signature in comparison pass data and pass identification equipment;
Step 5: pass data and comparing result is presented.
It preferably, further include two dimensional code preparation process, the preparation process includes:
Preparation process 1: the pass information and holder biological information of the pass are acquired;
Preparation process 2: the pass information of the acquisition and holder biological information are encoded to the two dimensional code;
Preparation process 3: the two dimensional code and the pass are integrated.
Preferably, the pass information is the first pass information and the second pass information;First pass Information is the pass data that directly present in step 5, and second pass information is the passage presented after authenticated process Demonstrate,prove data.
Preferably, first pass information includes name, unit information, validity period, information of vehicles, the pass number; Second pass information is the communication information, and ID card information, sensitive information, the communication information includes phone, mailbox, firmly Location;The biological information is face characteristic information, sound speciality information, fingerprint feature information, iris feature information, gait feature Information takes down notes characteristic information.
Preferably, the pass data of the presentation of the step 5 include that data and image presentation data are presented in text;It is described Step 1 further include: the data based on acquisition obtain image according to the image synthesis program being stored in identification equipment and number is presented According to;
Data are presented in described image are as follows: picture, PDF, webpage.
Preferably, the preparation process 3 further includes ciphering process and compression process, and the ciphering process is asymmetric adds It is close, symmetric cryptography;The compression process uses binary compression algorithms.
Preferably, the encryption data includes adding with first in the identification equipment for the encryption data for obtaining the pass Close the second ciphering signature to match of signing.
Preferably, when scanning the encryption data of the two dimensional code using identification equipment, if the first ciphering signature and second adds Close signatures match then decrypts the encryption data;Otherwise, to identification process in.
Preferably, the step 5 are as follows:
Step 5.1: the first pass information is presented,
Step 5.2: the first authentication information of input;
Step 5.3: if first authentication information is matched with the second authentication information in two dimensional code, it is current to be presented second Demonstrate,prove information;Otherwise, to the second pass information of presentation in.
Preferably, if the step 2 includes: the biology of biological information and acquisition that decryption first encryption data obtains Information matches, then biometric authentication passes through, and continues to decrypt the second encryption data acquisition pass data, otherwise, stops to identify Process.
The preparation process further includes remarks two dimensional code remarks data procedures, and remarks orientation includes: four, upper and lower, left and right Orientation;Remarks orientation method of determination are as follows: one or more orientation is selected to draw one or more remarks subdatas;Described one One or more remarks subregions are arranged in a orientation.
A kind of pass identified off-line equipment based on two dimensional code, comprising:
Resolution unit, for obtaining two dimensional code and parsing the first encryption data and the second encryption data of the two dimensional code;
Decryption unit, for decrypting first encryption data, acquisition biological data decrypts second encryption data, Obtain pass data;
Compare display unit, for comparing the signature in pass data and pass identification equipment, pass number is presented According to;
Biometric information verification unit, biomedical information acquisition and verifying for information holder, the verifying dimension compare solution The biological information of close acquisition and the biological information of acquisition.
Preferably, the input resolution unit includes analysis program, image synthesis program.
Preferably, the decryption unit includes symmetrical code key, and/or, asymmetric code key.
Preferably, the pass data of the presentation include the first pass data and present after needing authentication information to match The second pass data.
Preferably, the identification equipment is plate, cell phone, equipment for customizing;Or, the application software based on cell phone Or small routine.
Preferably, biometric information verification unit are as follows: face characteristic information acquires equipment, vocal print or sound characteristic information collection Equipment, palmmprint or fingerprint feature information acquire equipment, iris feature information collecting device, and gait feature information acquires equipment, pen Remember that characteristic information acquires equipment.
Pass identified off-line method and apparatus provided by the invention based on two dimensional code, realizes the offline biology of holder Identification, biometric information verification by the basis of carry out the decryption of pass information, protect holder privacy, improve recognition efficiency And safety.The present invention stores all biological information to be compared into the two dimensional code of the pass, transfers number without relying on network According to realization data decentralization avoids the unstability of output transmission, improves biological information and identifies verifying speed.
Detailed description of the invention
Fig. 1 is the pass identified off-line method and apparatus based on two dimensional code that embodiment one provides
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to the scope of the present invention.
Embodiment one
The present embodiment provides a kind of pass identified off-line method and apparatus based on two dimensional code, as shown in Figure 1, process packet It includes:
1. inputting pass information
Firstly the need of the information signing and issuing the unit acquisition pass and needing, above- mentioned information can be with are as follows: name, certificate number, effectively Phase, information of vehicles etc..In addition, the individual of the opposite privacy of some related personnel can also be acquired in addition to the information on the pass Information.The partial information will not be shown on the pass, but when using decoding software, identifying procedure be arranged, if passing through The identifying procedure then shows that this is related to the personal information of privacy, if not stopping to show the letter by the identifying procedure Breath.Such as unit telephone number.While can protect sensitive information, convenient acquisition of information is provided to related personnel.It is described Identifying procedure can be, the included grade of identification equipment, the identifying code of input, the identifying procedures such as signature.
When acquiring biological information, photo and or fingerprint characteristic value and or iris feature including acquiring counterpart personnel Value.
2. acquisition information, which combines, signs and issues unit signature, and generates two dimensional code
It is above-mentioned sign and issue unit signature can be with are as follows: the form of above-mentioned signing messages can be company, entity or individual etc. Name.
It is also possible to other characteristic symbols such as company Logo.
Above-mentioned two dimensional code is a kind of two dimensional code of high capacity, includes at least 320, can support the total amount of information, i.e., Pass information can all be encoded as binary data, and store into two dimensional code.The generating process of two dimensional code is a kind of independence The generation program of exploitation combines a variety of encryptions and compress technique, and tactical rule complicated difficult is to crack.Above-mentioned a variety of encryption technologies It can be asymmetric encryption, symmetric cryptography etc..Above-mentioned compress technique is mainly binary compression algorithms.Two dimensional code is can not be pseudo- It makes, can not distort, it is ensured that the safety of data.Since all data have been stored in two dimensional code, so and being not required to Server is wanted to support data to store, cost is greatly saved.The information in original data library will be by two dimensional code institute one by one It undertakes, realizes the decentralization of data.
Two dimensional code is presented in conjunction with the pass
Two dimensional code can bind directly the pass, and directly two dimensional code is encoded on the pass.It can certainly will be two-dimentional Code is attached on the pass in such a way that label is pasted.
Two dimensional code can also be used directly, the transmitting carrier as information.That is a two dimensional code is exactly one logical Row card.It is used so you can directly deposit in two dimensional code in the mobile device of oneself as a picture.When you need to give Others shows or others is when wish to obtain your pass, and other side is allowed directly scan your two dimensional code acquisition of parsing Information in code, it was demonstrated that your right of access.Which has safe guarantee, and can prevent the loss of the papery pass, Solve the problems, such as that the pass is inconvenient to carry in life usually.
Decryption obtains biological characteristic, carries out biological veritification
The biological characteristic of typing participant in two dimensional code, using the biological characteristic interface carried in decoding software, to Meeting personnel are veritified again.
It is veritified if it is face, the face in decoding software is just called to veritify interface.By the face for comparing participant With the face characteristic value in two dimensional code.
It is veritified if it is fingerprint, the fingerprint in decoding software is just called to veritify interface.Pass through collection in worksite participant's Fingerprint is simultaneously compared with the fingerprint characteristic value in two dimensional code.
It is veritified if it is iris, the iris in decoding software is just called to veritify interface.Pass through collection in worksite participant's Iris is simultaneously compared with the iris feature value in two dimensional code.
The operation is relatively time-consuming, but can further prove the passage right of participant.If certainly can be really The information for the first two steps recognized is errorless, then can confirm the right of the personnel in principle.In order to accelerate personnel or the vehicle of bayonet Mobility, biological characteristic can be used as the spare certificate scheme of final step.
After biology veritification passes through, passes through decoding software and obtain pass information in two dimensional code
When participant needs to sign and issue unit or relevant person in charge using decoding software when perhaps vehicle passes through bayonet, The pass for the carrying two dimensional code that parsing participant holds either can prove the individual two dimensional code of permission, and obtain it All information in code.
The mode of presentation will be the pass original part A of a electronic edition and data B of other participants.It is responsible for People can pass through the authenticity of its pass of human eye contrast.It such as has a question, responsible person can require participant to show other cards Part, it was demonstrated that the data B in electronic bits of data.Information contrast is errorless i.e. it is believed that the pass is authentic and valid.
Further include the steps that authenticated rear presentation during presenting, if it is hidden to show that this is related to by the identifying procedure The information such as private personal information, if not stopping to show the information by the identifying procedure.The identifying procedure can be, Identify the included grade of equipment, the identifying code of input, the identifying procedures such as signature.
The signing messages in signature and two dimensional code in comparison software
Containing identical in two dimensional code in decoding software, or at the information of correlativity.Above-mentioned correlativity be from Wherein the signing messages of a side can be converted or be calculated the signing messages with another party always by certain rule.
The operation of signature comparison, it is ensured that while the safety of decoding software, accomplished tying up for software and two dimensional code It is fixed, accomplish the double-deck guarantee.If there is criminal wants steal information or spurious information, then he must steal generation While code, oneself cracks decoding software.This is practically impossible to for technological layer, in cost and huge, Avoid the illegal act of criminal.
The present embodiment further includes a kind of pass identified off-line equipment based on two dimensional code, comprising:
Resolution unit, for obtaining two dimensional code and parsing the first encryption data and the second encryption data of the two dimensional code;
Decryption unit, for decrypting first encryption data, acquisition biological data decrypts second encryption data, Obtain pass data;
Compare display unit, for comparing the signature in pass data and pass identification equipment, pass number is presented According to;
Biometric information verification unit, biomedical information acquisition and verifying for information holder, the verifying dimension compare solution The biological information of close acquisition and the biological information of acquisition.
Preferably, the input resolution unit includes analysis program, image synthesis program.
Preferably, the decryption unit includes symmetrical code key, and/or, asymmetric code key.
Preferably, the pass data of the presentation include the first pass data and present after needing authentication information to match The second pass data.
Preferably, the identification equipment is plate, cell phone, equipment for customizing;Or, the application software based on cell phone Or small routine.
Preferably, biometric information verification unit are as follows: face characteristic information acquisition equipment, sound characteristic information collecting device, Fingerprint feature information acquires equipment, iris feature information collecting device, and gait feature information acquires equipment.
In order to realize that the information of the pass is veritified, the present invention stores the pass using a kind of non-technical disclosed two dimensional code Information.The two dimensional code can store a large amount of data, and the information of needs is directly placed into two dimensional code.Two dimensional code will be used as information The carrier of data can also be used as the guarantee of data encryption.The two dimensional code that the present invention uses is formed by stacking by multi-enciphering, so The difficulty that it is cracked is bigger.The two dimensional code can guarantee the safety of data, discharge the pressure of server of the system.
For data safety, decrypting process needs the decoding program using us.The carrier of decryption program can be equipment, It is also possible to software app.The decoding program can decrypt the data obtained in two dimensional code.Data acquisition will no longer be required to network And the support of database.So the setting may be implemented to obtain information under off-line state.This programme is no longer dependent on region network Network while reducing the requirement of use environment, has saved the network cost in use.Mode offline simultaneously, also solves The common fault of network server, high concurrent problem.
During veritification, the present invention is provided with three layers of verification mode,
First layer: using the information in two dimensional code, the information on the pass is compared.Or the certificate of comparison related personnel. Comparison is consistent, i.e., it is believed that information is effective.
The second layer: being put into biological information in two dimensional code, carries out the offline testimony of a witness to related personnel using decoding software It veritifies.
Third layer: in order to ensure decryption software and two dimensional code meet specification, the present invention is set in decryption software and two dimensional code There is the unit of Issuance of laissez-passer to sign.Signature comparison is consistent, illustrates two dimensional code and decryption software is official products.
Three layers of veritification mode of the design may insure that the pass is authentic and valid.
For network request comparison database, above-mentioned veritification mode is more stable, not will receive network speed It influences.It is more efficient on veritifying speed and faster.
All data have all been put into two dimensional code by the present invention, it is no longer necessary at the classification for building database and local data Reason, also not needing maintenance data and data device server reduces system cost.It is without local data base, i.e., standby without data Part, user does not have to concern privacy leakage.
In conclusion the data medium acquisition methods for the two dimensional code that the embodiment of the present invention provides, have below beneficial to effect Fruit:
(1) pass information verification method of the invention can verify the pass true and false in off-line case, strengthen it To the adaptability of environment;The veritification mode three times of the pass can improve verifying while guaranteeing pass information security Efficiency;
(2) pass information verification method of the invention, realize data decentralization storage, reduce system at This, solves the problems, such as network concurrent;
(3) two dimensional code can be directly used to solve flat while protecting data safety as the pass in the present invention Often pass problem easy to be lost inconvenient to carry in life.
Particular embodiments described above, to the purpose of the present invention, technical scheme and beneficial effects have been carried out further in detail Describe in detail it is bright, it should be understood that above is only a specific embodiment of the present invention, the protection model being not intended to limit the present invention It encloses, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention Protection scope within.

Claims (17)

1. a kind of pass identified off-line method based on two dimensional code characterized by comprising
Step 1: obtaining the encryption data of two dimensional code;The encryption information includes the first encryption information and the second encryption information;
Step 2: the first encryption data of decryption obtains biological information, carries out biometric authentication to holder;
Step 3: the second encryption data of decryption obtains pass data;
Step 4: the signature in comparison pass data and pass identification equipment;
Step 5: pass data and comparing result is presented.
2. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that further include two dimension Code preparation process, the preparation process include:
Preparation process 1: the pass information and holder biological information of the pass are acquired;
Preparation process 2: the pass information of the acquisition and holder biological information are encoded to the two dimensional code;
Preparation process 3: the two dimensional code and the pass are integrated.
3. a kind of pass identified off-line method based on two dimensional code as claimed in claim 2, which is characterized in that the pass Information is the first pass information and the second pass information;First pass information is logical for what is directly presented in step 5 Row card data, second pass information are the pass data that present after authenticated process.
4. a kind of pass identified off-line method based on two dimensional code as claimed in claim 3, which is characterized in that described first is logical Row card information includes name, unit information, validity period, information of vehicles, the pass number;Second pass information is communication letter Breath, ID card information, sensitive information, the communication information includes phone, mailbox, address;The biological information is face characteristic Information, vocal print or sound speciality information, palmmprint or fingerprint feature information, iris feature information, gait feature information take down notes feature Information.
5. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that the step 5 The pass data of presentation include that text is presented data and image data are presented;The step 1 further include: the number based on acquisition According to according to the image synthesis program acquisition image presentation data being stored in identification equipment;
Data are presented in described image are as follows: picture, PDF, webpage.
6. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that the preparation step Rapid 3 further include ciphering process and compression process, and the ciphering process is asymmetric encryption, symmetric cryptography;The compression process is adopted Use binary compression algorithms.
7. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that the encryption number It is signed according to the second encryption for including and matching for the first ciphering signature in the identification equipment for the encryption data for obtaining the pass Name.
8. a kind of pass identified off-line method based on two dimensional code as claimed in claim 7, which is characterized in that set using identification When the standby encryption data for scanning the two dimensional code, if the first ciphering signature is matched with the second ciphering signature, the encryption is decrypted Data;Otherwise, to identification process in.
9. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that the step 5 Are as follows:
Step 5.1: the first pass information is presented;
Step 5.2: the first authentication information of input;
Step 5.3: if first authentication information is matched with the second authentication information in two dimensional code, second pass letter is presented Breath;Otherwise, to the second pass information of presentation in.
10. a kind of pass identified off-line method based on two dimensional code as described in claim 1, which is characterized in that the step 2 If including: to decrypt the biological information that first encryption data obtains to match with the biological information of acquisition, biometric authentication passes through, Continue to decrypt the second encryption data acquisition pass data, otherwise, suspension identification process.
11. a kind of pass identified off-line method based on two dimensional code as claimed in claim 2, which is characterized in that the preparation Step further includes remarks two dimensional code remarks data procedures, and remarks orientation includes: four, upper and lower, left and right orientation;The remarks side Position method of determination are as follows: one or more orientation is selected to draw one or more remarks subdatas;One orientation is arranged one Or multiple remarks subregions.
12. a kind of pass identified off-line equipment based on two dimensional code characterized by comprising
Resolution unit, for obtaining two dimensional code and parsing the first encryption data and the second encryption data of the two dimensional code;
Decryption unit obtains biological data, decrypts second encryption data, obtain for decrypting first encryption data Pass data;
Compare display unit, for comparing the signature in pass data and pass identification equipment, pass data are presented;
Biometric information verification unit, biomedical information acquisition and verifying for information holder, the verifying dimension compare decryption and obtain The biological information of the biological information and acquisition that obtain.
13. a kind of pass identified off-line equipment based on two dimensional code as claimed in claim 11, which is characterized in that the parsing Unit includes analysis program, image synthesis program.
14. a kind of pass identified off-line equipment based on two dimensional code as claimed in claim 11, which is characterized in that the decryption Unit includes symmetrical code key, and/or, asymmetric code key.
15. a kind of pass identified off-line equipment based on two dimensional code as claimed in claim 11, which is characterized in that the presentation Pass data include the first pass data and authentication information needed to match after the second pass data for presenting.
16. a kind of pass identified off-line equipment based on two dimensional code as claimed in claim 11, which is characterized in that the identification Equipment is plate, cell phone, equipment for customizing;Or, application software or small routine based on cell phone.
17. a kind of pass identified off-line equipment based on two dimensional code as claimed in claim 11, which is characterized in that biological information Authentication unit are as follows: face characteristic information acquires equipment, vocal print or sound characteristic information collecting device, palmmprint or fingerprint feature information Equipment, iris feature information collecting device are acquired, gait feature information acquires equipment, and notes characteristic information acquires equipment.
CN201910359986.4A 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device Active CN110111461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910359986.4A CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910359986.4A CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Publications (2)

Publication Number Publication Date
CN110111461A true CN110111461A (en) 2019-08-09
CN110111461B CN110111461B (en) 2022-11-01

Family

ID=67487781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910359986.4A Active CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Country Status (1)

Country Link
CN (1) CN110111461B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113023094A (en) * 2021-02-05 2021-06-25 孙安谱 Multilayer password intelligent sound control anti-disclosure packaging technology
CN116341582A (en) * 2023-05-30 2023-06-27 北京智麟科技有限公司 Electronic traffic data management method and system based on two-dimension code

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276311A (en) * 1989-03-01 1994-01-04 Hartmut Hennige Method and device for simplifying the use of a plurality of credit cards, or the like
CN1482569A (en) * 2002-09-13 2004-03-17 北京捷辰科技发展有限公司 Off-line two-dimension bar code biological identification false-proof method
CN101388066A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method for implementing two-dimensional code certification
CN102663549A (en) * 2012-03-29 2012-09-12 华南农业大学 Entrance ticket management system with high security and entrance ticket management method thereof
KR20130012182A (en) * 2011-06-23 2013-02-01 (주)엘이디스튜디오 System and method for providing qr code coupon usingthe internet
CN103646455A (en) * 2013-12-24 2014-03-19 杨密凯 Intelligent lock device and usage method thereof as well as configuration method for electronic keys
CN104794515A (en) * 2015-03-26 2015-07-22 立德高科(北京)数码科技有限责任公司 Code pattern capable of distinguishing display content and generation and reading methods thereof
CN104933793A (en) * 2015-06-11 2015-09-23 宁波飞拓电器有限公司 Two-dimension code electronic key implementation method based on digital signature
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN106056717A (en) * 2016-06-16 2016-10-26 广州地理研究所 System and method for scanning and verifying codes in offline manner
CN106971434A (en) * 2016-01-13 2017-07-21 袁磊 The electronic lock system authenticated online by wireless network terminal
CN107180255A (en) * 2017-06-09 2017-09-19 江苏物码信息技术有限公司 A kind of examination based on Quick Response Code enters field system
CN107358283A (en) * 2017-06-19 2017-11-17 上海斐讯数据通信技术有限公司 A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN107808207A (en) * 2017-09-01 2018-03-16 北京佳阳科技有限公司 Intelligence ticket booking method, electronic equipment and server, intelligent clearance method and apparatus
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108229195A (en) * 2018-01-29 2018-06-29 高江涛 A kind of Quick Response Code various dimensions conglomerate information displaying method and platform
CN108665041A (en) * 2018-05-09 2018-10-16 深圳市码云可变数据科技有限公司 Quick Response Code generates and recognition methods, device, computer equipment and storage medium
CN208730586U (en) * 2018-08-15 2019-04-12 北京鼎科远图科技有限公司 A kind of Anti-counterfeiting seal system

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276311A (en) * 1989-03-01 1994-01-04 Hartmut Hennige Method and device for simplifying the use of a plurality of credit cards, or the like
CN1482569A (en) * 2002-09-13 2004-03-17 北京捷辰科技发展有限公司 Off-line two-dimension bar code biological identification false-proof method
CN101388066A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method for implementing two-dimensional code certification
KR20130012182A (en) * 2011-06-23 2013-02-01 (주)엘이디스튜디오 System and method for providing qr code coupon usingthe internet
CN102663549A (en) * 2012-03-29 2012-09-12 华南农业大学 Entrance ticket management system with high security and entrance ticket management method thereof
CN103646455A (en) * 2013-12-24 2014-03-19 杨密凯 Intelligent lock device and usage method thereof as well as configuration method for electronic keys
CN104794515A (en) * 2015-03-26 2015-07-22 立德高科(北京)数码科技有限责任公司 Code pattern capable of distinguishing display content and generation and reading methods thereof
CN104933793A (en) * 2015-06-11 2015-09-23 宁波飞拓电器有限公司 Two-dimension code electronic key implementation method based on digital signature
CN106971434A (en) * 2016-01-13 2017-07-21 袁磊 The electronic lock system authenticated online by wireless network terminal
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN106056717A (en) * 2016-06-16 2016-10-26 广州地理研究所 System and method for scanning and verifying codes in offline manner
CN107180255A (en) * 2017-06-09 2017-09-19 江苏物码信息技术有限公司 A kind of examination based on Quick Response Code enters field system
CN107358283A (en) * 2017-06-19 2017-11-17 上海斐讯数据通信技术有限公司 A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN107808207A (en) * 2017-09-01 2018-03-16 北京佳阳科技有限公司 Intelligence ticket booking method, electronic equipment and server, intelligent clearance method and apparatus
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108229195A (en) * 2018-01-29 2018-06-29 高江涛 A kind of Quick Response Code various dimensions conglomerate information displaying method and platform
CN108665041A (en) * 2018-05-09 2018-10-16 深圳市码云可变数据科技有限公司 Quick Response Code generates and recognition methods, device, computer equipment and storage medium
CN208730586U (en) * 2018-08-15 2019-04-12 北京鼎科远图科技有限公司 A kind of Anti-counterfeiting seal system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113023094A (en) * 2021-02-05 2021-06-25 孙安谱 Multilayer password intelligent sound control anti-disclosure packaging technology
CN116341582A (en) * 2023-05-30 2023-06-27 北京智麟科技有限公司 Electronic traffic data management method and system based on two-dimension code
CN116341582B (en) * 2023-05-30 2023-09-19 北京智麟科技有限公司 Electronic traffic data management method and system based on two-dimension code

Also Published As

Publication number Publication date
CN110111461B (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN110674523B (en) Method for confirming electronic contract signer by combining digital signature with handwritten signature
CN107209821B (en) Method and authentication method for being digitally signed to electronic document
US7024562B1 (en) Method for carrying out secure digital signature and a system therefor
US6775775B1 (en) Method of physical individual authentication and system using the same
Naumann et al. Privacy features of European eID card specifications
JPWO2003069489A1 (en) Identification method
US11303433B2 (en) Method and device for generating HD wallet name card and method and device for generating HD wallet trusted address
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
JP2015088080A (en) Authentication system, authentication method, and program
CN107229879A (en) Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN112507300A (en) Electronic signature system based on eID and electronic signature verification method
CN110020540A (en) A kind of certificate recognition methods and equipment based on two dimensional code
CN110111461A (en) A kind of pass identified off-line method and apparatus based on two dimensional code
CN104715537A (en) Encryption and decryption method based on digital tags
CN104835039A (en) Data label generation method
CN105490814B (en) A kind of ticketing service real name identification method and system based on three-dimension code
CN205015906U (en) Anti -fake verification system of electron certificate
CN109992984A (en) A kind of file identification method and equipment based on two dimensional code
CN108063882A (en) There is the high photographing instrument system of authentication, data encryption and detaching-proof protection
CN108769011A (en) A kind of electronic signature equipment, auth method and system
JP6690686B2 (en) Account opening system, account opening method, and program
CN208190680U (en) A kind of electronic signature equipment and authentication system
CN110096864A (en) A kind of admission card for entrance examination identified off-line method and apparatus based on two dimensional code
CN207051904U (en) A kind of hand-written screen system for supporting authentication and data encryption feature
CN107332672A (en) A kind of high photographing instrument system for supporting authentication and data encryption feature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant