CN110111461B - Two-dimensional code-based pass offline identification method and device - Google Patents

Two-dimensional code-based pass offline identification method and device Download PDF

Info

Publication number
CN110111461B
CN110111461B CN201910359986.4A CN201910359986A CN110111461B CN 110111461 B CN110111461 B CN 110111461B CN 201910359986 A CN201910359986 A CN 201910359986A CN 110111461 B CN110111461 B CN 110111461B
Authority
CN
China
Prior art keywords
pass
information
data
dimensional code
biological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910359986.4A
Other languages
Chinese (zh)
Other versions
CN110111461A (en
Inventor
刘少磊
沈怡
祝哲海
罗年庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Uni2k Taixing Information Technology Co ltd
Original Assignee
Uni2k Taixing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Uni2k Taixing Information Technology Co ltd filed Critical Uni2k Taixing Information Technology Co ltd
Priority to CN201910359986.4A priority Critical patent/CN110111461B/en
Publication of CN110111461A publication Critical patent/CN110111461A/en
Application granted granted Critical
Publication of CN110111461B publication Critical patent/CN110111461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass

Abstract

The invention relates to the field of data identification, in particular to a two-dimensional code technology. The invention provides a two-dimensional code-based off-line identification method for a pass, which comprises the following steps: step 1: acquiring encrypted data of the two-dimensional code; the encryption information comprises first encryption information and second encryption information; step 2: decrypting the first encrypted data to obtain biological information, and performing biological verification on the licensee; and step 3: decrypting the second encrypted data to obtain pass data; and 4, step 4: comparing the pass data with the signature in the pass identification device; and 5: and presenting the pass data and the comparison result. The invention solves the technical problems of difficult biological identification or overhigh biological identification cost in the network-free environment in the prior art, realizes off-line biological identification and improves the identification efficiency and the safety.

Description

Two-dimensional code-based pass offline identification method and device
Technical Field
The invention relates to the field of software methods, in particular to a two-dimensional code technology.
Background
The two-dimensional code is widely used in industries needing to quickly mark information on articles, such as high-tech industries, storage and transportation industries, wholesale and retail industries and the like. Currently, the authentication of a pass can be generally divided into two types: for the pass of the conference class, the prior proposal is to scan the pass of the conference, call the server data and then carry out face recognition, the proposal depends on server equipment and network equipment, the card making process is complicated, and the pass needs to be magnetized; for the pass of the vehicle, the prior scheme is that the pass is generally checked by human eyes, then database data comparison is carried out by scanning a license plate, and finally whether the passing vehicle has the authority to pass or not is determined. The scheme also has the condition of needing a network and a server, the stability of verification cannot be ensured in a real scene, and the cost is higher.
Disclosure of Invention
The invention provides a two-dimensional code-based pass offline identification method and device for solving the technical problems of difficulty in biometric identification and overhigh biometric identification cost in a network-free environment in the prior art, and aims to realize offline verification of a passer, protect privacy of a licensee and improve identification efficiency and safety.
A two-dimensional code-based pass offline identification method comprises the following steps:
step 1: acquiring encrypted data of the two-dimensional code; the encryption information comprises first encryption information and second encryption information;
and 2, step: decrypting the first encrypted data to obtain biological information, and performing biological verification on the licensee;
and 3, step 3: decrypting the second encrypted data to obtain pass data;
and 4, step 4: comparing the pass data with the signature in the pass identification device;
and 5: and presenting the pass data and the comparison result.
Preferably, the method further comprises a two-dimensional code preparation process, wherein the preparation process comprises:
preparation step 1: collecting pass information of the pass and biological information of a licensee;
preparation step 2: encoding the acquired pass information and the biological information of the licensee to the two-dimensional code;
a preparation step 3: and integrating the two-dimensional code with the pass.
Preferably, the pass information is first pass information and second pass information; the first pass information is pass data directly presented in the step 5, and the second pass information is pass data presented after the authentication process.
Preferably, the first pass information comprises a name, unit information, a validity period, vehicle information and a pass number; the second pass information is communication information, identity card information and sensitive information, and the communication information comprises a telephone, a mailbox and an address; the biological information is face characteristic information, voice characteristic information, fingerprint characteristic information, iris characteristic information, gait characteristic information and note characteristic information.
Preferably, the pass data presented in step 5 includes text presentation data and image presentation data; the step 1 further comprises: obtaining image presentation data according to an image synthesis program stored in the recognition device based on the obtained data;
the image presentation data is: pictures, PDF, web pages.
Preferably, the preparation step 3 further comprises an encryption process and a compression process, wherein the encryption process is asymmetric encryption and symmetric encryption; the compression process employs a binary compression algorithm.
Preferably, the encrypted data includes a second encrypted signature that matches the first encrypted signature within the identification device used to obtain the encrypted data of the pass.
Preferably, when the identification device is used for scanning the encrypted data of the two-dimensional code, if the first encrypted signature is matched with the second encrypted signature, the encrypted data is decrypted; otherwise, the identification process is ended.
Preferably, the step 5 is:
step 5.1: the first pass information is presented with the first pass information,
step 5.2: inputting first authentication information;
step 5.3: if the first authentication information is matched with second authentication information in the two-dimensional code, second pass information is presented; otherwise, the second pass information is displayed.
Preferably, the step 2 comprises: and if the biological information obtained by decrypting the first encrypted data is matched with the acquired biological information, the biological verification is passed, the second encrypted data is continuously decrypted to obtain pass data, and if not, the identification process is stopped.
The preparation step further comprises a remark two-dimensional code remark data process, and the remark orientation comprises the following steps: four directions of up, down, left and right; the remark orientation determination mode is as follows: selecting one or more orientations to draw one or more remark subdata; the one orientation sets one or more memo sub-regions.
A passport off-line recognition device based on two-dimensional code includes:
the analysis unit is used for acquiring the two-dimensional code and analyzing the first encrypted data and the second encrypted data of the two-dimensional code;
a decryption unit for decrypting the first encrypted data to obtain biometric data, and decrypting the second encrypted data to obtain pass data;
a comparison presenting unit for comparing the pass data with the signature in the pass identification device and presenting the pass data;
and the biological information verification unit is used for acquiring and verifying the biological information of the information bearer, and the verification dimension compares and decrypts the acquired biological information and the acquired biological information.
Preferably, the input analysis unit includes an analysis program and an image synthesis program.
Preferably, the decryption unit comprises a symmetric key, and/or an asymmetric key.
Preferably, the presented pass data includes first pass data and second pass data presented after the authentication information is matched.
Preferably, the identification device is a tablet, a mobile phone or a custom device; or based on the application software or applet of the mobile handset.
Preferably, the biometric information verification unit is: the system comprises a face characteristic information acquisition device, a voiceprint or voice characteristic information acquisition device, a palm print or fingerprint characteristic information acquisition device, an iris characteristic information acquisition device, a gait characteristic information acquisition device and a note characteristic information acquisition device.
The two-dimensional code-based passport offline identification method and the two-dimensional code-based passport offline identification equipment realize offline biological identification of a passport holder, decrypt passport information on the basis of passing biological information verification, protect privacy of the passport holder, and improve identification efficiency and safety. According to the invention, all the biological information to be compared is stored in the two-dimensional code of the pass, data is not required to be called by depending on a network, data decentralization is realized, instability caused by data transmission is avoided, and the identification and verification speed of the biological information is improved.
Drawings
Fig. 1 shows an embodiment of a two-dimensional code-based method and device for offline identification of a pass
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the scope of the present invention.
Example one
The embodiment provides a two-dimensional code-based method and device for offline identification of a pass, as shown in fig. 1, the process includes:
1. entering pass information
Firstly, a signing and issuing unit is required to acquire information required by a pass, and the information can be as follows: name, certificate number, expiration date, vehicle information, etc. In addition, in addition to information on the pass, some personal information of relative privacy of the relevant person may be collected. The part of the information will not be displayed on the pass, but when decoding software is used, an authentication flow is set, if the authentication flow is passed, the privacy-related personal information is displayed, and if the authentication flow is not passed, the display of the information is suspended. Such as an organization contacting a telephone. The method and the device can protect sensitive information and provide convenient information acquisition for related personnel. The authentication process may be an authentication process of identifying the level of the device itself, inputting a verification code, a signature, and the like.
When the biological information is collected, the method comprises the step of collecting a picture of the corresponding person, or a fingerprint characteristic value and/or an iris characteristic value.
2. Collecting information, combining signing and issuing unit signature, and generating two-dimensional code
The signature of the issuing unit may be: the signature information may be in the form of a name of a company, a unit, or an individual.
Other characteristic symbols such as company Logo may also be used.
The two-dimensional code is a high-capacity two-dimensional code, at least comprises 320 bits, and can support the total amount of information, namely the pass information can be encoded into binary data and stored in the two-dimensional code. The generation process of the two-dimensional code is an independently developed generation program, various encryption and compression technologies are combined, and the structure rule is complex and difficult to crack. The various encryption techniques described above may be asymmetric encryption, symmetric encryption, and the like. The compression techniques described above are primarily binary compression algorithms. The two-dimensional code is not counterfeitable and is not falsified, and the safety of data can be guaranteed. All data are stored in the two-dimensional code, so that a server is not needed for supporting data storage, and the cost is greatly saved. The information of the original database is born by one two-dimensional code, and the decentralization of the data is realized.
Presenting two-dimensional code and pass in combination
The two-dimensional code can directly combine the pass, directly with the two-dimensional code to on the pass. Of course, the two-dimensional code can also be attached to the pass by means of label adhesion.
The two-dimensional code can also be directly used as a carrier for information transmission. That is, a two-dimensional code is a pass. Therefore, you can directly store the two-dimensional code as a picture in own mobile equipment for use. When you need to show for others or others want to acquire your pass, the other party directly scans and analyzes your two-dimensional code to acquire the information in the code, and the passing authority of your person is proved. The mode has safe assurance promptly, can prevent losing of paper pass again, has also solved the inconvenient problem of pass carrying in the usual life.
Decrypting to obtain biological characteristics, and performing biological verification
And the biological characteristics of the participants are recorded in the two-dimensional code, and the participants are checked again by using a biological characteristic interface carried in the decoding software.
And if the face is checked, calling a face checking interface in the decoding software. The face of the conference participants is compared with the face characteristic value in the two-dimensional code.
If the fingerprint is verified, a fingerprint verification interface in the decoding software is called. The fingerprints of the participants are collected on site and compared with the fingerprint characteristic values in the two-dimensional code.
If the iris verification is performed, an iris verification interface in the decoding software is called. The irises of the participants are acquired on site and compared with the iris characteristic value in the two-dimensional code.
This operation is relatively time consuming, but may further prove the passage rights of the conference participants. Of course, if the information of the previous two steps can be confirmed to be correct, the right of the person can be confirmed in principle. To speed up the mobility of the persons or vehicles at the gate, biometrics may be used as a back-up authentication scheme for the last step.
After the biological verification passes, obtaining the pass information in the two-dimensional code through decoding software
When a participant or a vehicle passes through a gate, a signing and issuing unit or a related person in charge needs to use decoding software to analyze a pass carrying a two-dimensional code or a single two-dimensional code which can prove authority and is held by the participant, and obtain all information in the code.
The presentation mode is an electronic pass original A and other data B of the conference participants. The responsible person can compare the authenticity of his pass by the human eye. If there is a question, the person in charge can ask the meeting participants to present other certificates to prove the material B in the electronic material. The pass can be considered to be true and effective if the data is compared without errors.
The presentation process further includes a step of presentation after authentication, and if the authentication flow is passed, information such as the personal information related to privacy is displayed, and if the authentication flow is not passed, the display of the information is suspended. The authentication process may be an authentication process of identifying the level of the device itself, inputting a verification code, a signature, and the like.
Comparing the signature in the software with the signature information in the two-dimensional code
The decoding software contains the same information as the two-dimensional code or the information in the correlation relationship. The correlation is that signature information of one party can be converted or calculated by a certain rule to obtain signature information of the other party.
The operation of signature comparison can ensure the safety of decoding software, and simultaneously, the binding of the software and the two-dimensional code is realized, thereby realizing double-layer guarantee. If a lawbreaker wants to steal information or forge information, he must steal the generated code and crack the decoding software by himself. This is almost impossible at the technical level and also enormous in cost, avoiding illegal actions by lawbreakers.
This embodiment still includes a pass off-line identification equipment based on two-dimensional code, includes:
the analysis unit is used for acquiring the two-dimensional code and analyzing the first encrypted data and the second encrypted data of the two-dimensional code;
the decryption unit is used for decrypting the first encrypted data to obtain biological data, decrypting the second encrypted data to obtain pass data;
a comparison presenting unit for comparing the pass data with the signature in the pass identification device and presenting the pass data;
and the biological information verification unit is used for acquiring and verifying the biological information of the information bearer, and the verification dimension compares and decrypts the acquired biological information and the acquired biological information.
Preferably, the input analysis unit includes an analysis program and an image synthesis program.
Preferably, the decryption unit comprises a symmetric key, and/or an asymmetric key.
Preferably, the presented pass data includes first pass data and second pass data presented after the information needing authentication is matched.
Preferably, the identification device is a tablet, a mobile phone or a custom device; or based on the application software or applet of the mobile handset.
Preferably, the biometric information verification unit is: the system comprises a face characteristic information acquisition device, a sound characteristic information acquisition device, a fingerprint characteristic information acquisition device, an iris characteristic information acquisition device and a gait characteristic information acquisition device.
In order to implement the information verification of the pass, the invention uses a non-technical public two-dimensional code to store the pass information. The two-dimensional code can store a large amount of data, and required information is directly put into the two-dimensional code. The two-dimensional code is used as a carrier of information data and can also be used as a guarantee for data encryption. The two-dimensional code used by the invention is formed by multiple encryption and superposition, so that the difficulty of cracking is higher. The two-dimensional code can ensure the safety of data and release the pressure of a system server.
For data security, the decryption process needs to use our decoding procedure. The carrier of the decryption program may be a device or may be a software app. The decoding program can decrypt and obtain the data in the two-dimensional code. Data acquisition will no longer require network and database support. This arrangement enables information to be acquired in an offline state. The scheme does not depend on a regional network any more, reduces the requirement of the use environment and saves the network cost in use. Meanwhile, the problem of common faults and high concurrency of the network server is solved in an off-line mode.
In the process of verification, the invention sets a three-layer verification mode,
a first layer: and comparing the information on the pass by using the information in the two-dimensional code. Or against the credentials of the associated person. And if the comparison is consistent, the information can be considered to be effective.
A second layer: and (4) placing biological characteristic information in the two-dimensional code, and performing offline personal authentication verification on related personnel by using decoding software.
And a third layer: in order to ensure that the decryption software and the two-dimensional code meet the standard, the unit signature for signing and issuing the pass is arranged in the decryption software and the two-dimensional code. The signatures are compared consistently, and the two-dimensional code and the decryption software are official products.
The three-layer verification mode of the design can ensure that the pass is real and effective.
Compared with a network request comparison database, the verification method is more stable and cannot be influenced by the network speed. The method is also faster and more efficient in verification speed.
The invention puts all data into the two-dimensional code, does not need to build a database and classify the local data, does not need to maintain the data and the data server, and reduces the system cost. And a local database, namely data backup, is not needed, so that a user does not need to worry about privacy disclosure.
In summary, the method for acquiring the data carrier of the two-dimensional code provided by the embodiment of the invention has the following beneficial effects:
(1) The method for verifying the pass information can verify the authenticity of the pass under the offline condition, and enhances the adaptability of the pass to the environment; the three-time pass verification mode can ensure the safety of pass information and improve the verification efficiency;
(2) The pass information verification method realizes decentralized storage of data, reduces the system cost and solves the problem of network concurrency;
(3) The invention can directly use the two-dimension code as the pass, and solves the problem that the pass is inconvenient to carry and easy to lose in ordinary life while protecting the data security.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. A two-dimensional code-based pass offline identification method is characterized by comprising the following steps:
step 1: acquiring encrypted data of the two-dimensional code; the encrypted data comprises first encrypted data and second encrypted data;
step 2: decrypting the first encrypted data to obtain biological information, and performing biological verification on the licensee;
and step 3: decrypting the second encrypted data to obtain pass data;
and 4, step 4: comparing the pass data with the signature in the pass identification device;
and 5: presenting the pass data and the comparison result;
further comprising a two-dimensional code preparation process, the preparation process comprising:
preparation step 1: collecting pass information of the pass and biological information of a licensee;
preparation step 2: encoding the acquired pass information and the biological information of the licensee to the two-dimensional code, wherein the two-dimensional code also comprises a signature of an issuing unit;
a preparation step 3: integrating the two-dimension code with a pass;
all information of the pass is coded into binary data and stored in the two-dimensional code, and the generation process of the two-dimensional code is an independently developed generation program and combines various encryption and compression technologies;
the pass information is first pass information and second pass information; the first pass information is pass data directly presented in the step 5, and the second pass information is pass data presented after an authentication process;
the encrypted data includes a second encrypted signature that matches the first encrypted signature within the identification device used to obtain the encrypted data of the pass;
when the encrypted data of the two-dimensional code is scanned by adopting identification equipment, if the first encrypted signature is matched with the second encrypted signature, the encrypted data is decrypted; otherwise, stopping the identification process;
the step 5 is as follows:
step 5.1: presenting first pass information;
step 5.2: inputting first authentication information;
step 5.3: if the first authentication information is matched with second authentication information in the two-dimensional code, second pass information is presented; otherwise, the second pass information is stopped to be presented;
the step 2 comprises the following steps: if the biological information obtained by decrypting the first encrypted data is matched with the acquired biological information, the biological verification is passed, the second encrypted data is continuously decrypted to obtain pass data, and if not, the identification process is stopped;
the preparation step further comprises a remark two-dimensional code remark data process, and the remark orientation comprises the following steps: four directions of up, down, left and right; the remark orientation determination mode is as follows: selecting one or more orientations to draw one or more remark data; one or more remark sub-regions are arranged in the upper, lower, left and right directions;
the off-line pass identification method is provided with three layers of verification modes:
a first layer: comparing information on the pass or certificates of related personnel by using the information in the two-dimensional code, and determining that the information is effective if the comparison is consistent;
a second layer: biological characteristic information is put into the two-dimensional code, and offline personal authentication verification is performed on related personnel by using decoding software;
and a third layer: in order to ensure that the decryption software and the two-dimensional code meet the standard, unit signatures for signing and issuing pass are arranged in the decryption software and the two-dimensional code, the signatures are compared to be consistent, and the two-dimensional code and the decryption software are official products;
the operation of signature comparison ensures the safety of decoding software, and simultaneously binds the software and the two-dimensional code, thereby realizing double-layer guarantee;
the pass data presented in the step 5 comprises character presentation data and image presentation data; the step 1 further comprises obtaining image presentation data according to an image synthesis program stored in the recognition device based on the obtained data; the image presentation data is: pictures, PDFs or web pages;
the first pass information comprises a name, unit information, a validity period, vehicle information and a pass number; the second pass information is communication information, identity card information and sensitive information;
the communication information comprises a telephone, a mailbox and an address; the biological information is face characteristic information, voiceprint or voice characteristic information, palm print or fingerprint characteristic information, iris characteristic information, gait characteristic information and note characteristic information;
the preparation step 3 further comprises an encryption process and a compression process, wherein the encryption process is asymmetric encryption and/or symmetric encryption; the compression process adopts a binary compression algorithm;
all data are put into the two-dimensional code, a database and the classification processing of local data are not needed to be built, the data acquisition does not need the support of a network and the database, and the information acquisition under the offline state is realized.
2. An offline passport identification apparatus to which the method of claim 1 is applied, comprising:
the analysis unit is used for acquiring the two-dimensional code and analyzing the first encrypted data and the second encrypted data of the two-dimensional code;
the decryption unit is used for decrypting the first encrypted data to obtain biological data, decrypting the second encrypted data to obtain pass data;
a comparison presenting unit for comparing the pass data with the signature in the pass identification device and presenting the pass data; the biological information verification unit is used for acquiring and verifying biological information of the information bearer, wherein the verification is the biological information obtained by comparing and decrypting and the acquired biological information;
the presented pass data comprise first pass data and second pass data which are presented after the authentication information is matched.
3. The two-dimensional code-based offline identification device for the pass according to claim 2, wherein said parsing unit comprises a parsing program and an image synthesizing program.
4. The two-dimensional code-based offline identification device for the pass according to claim 2, wherein the decryption unit comprises a symmetric key and/or an asymmetric key.
5. The two-dimensional code-based pass offline identification device according to claim 2, wherein said identification device is a tablet, a mobile phone or a custom device.
6. The two-dimensional code-based offline identification device for passports according to claim 2, wherein the biometric information verification unit is: the device comprises a face characteristic information acquisition device, a voiceprint or voice characteristic information acquisition device, a palm print or fingerprint characteristic information acquisition device, an iris characteristic information acquisition device, a gait characteristic information acquisition device and a note characteristic information acquisition device.
CN201910359986.4A 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device Active CN110111461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910359986.4A CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910359986.4A CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Publications (2)

Publication Number Publication Date
CN110111461A CN110111461A (en) 2019-08-09
CN110111461B true CN110111461B (en) 2022-11-01

Family

ID=67487781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910359986.4A Active CN110111461B (en) 2019-04-30 2019-04-30 Two-dimensional code-based pass offline identification method and device

Country Status (1)

Country Link
CN (1) CN110111461B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113023094B (en) * 2021-02-05 2022-09-30 孙安谱 Multilayer password intelligent sound control anti-disclosure packaging technology
CN116341582B (en) * 2023-05-30 2023-09-19 北京智麟科技有限公司 Electronic traffic data management method and system based on two-dimension code

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482569A (en) * 2002-09-13 2004-03-17 北京捷辰科技发展有限公司 Off-line two-dimension bar code biological identification false-proof method
CN101388066A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method for implementing two-dimensional code certification
CN102663549A (en) * 2012-03-29 2012-09-12 华南农业大学 Entrance ticket management system with high security and entrance ticket management method thereof
KR20130012182A (en) * 2011-06-23 2013-02-01 (주)엘이디스튜디오 System and method for providing qr code coupon usingthe internet
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108665041A (en) * 2018-05-09 2018-10-16 深圳市码云可变数据科技有限公司 Quick Response Code generates and recognition methods, device, computer equipment and storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3906349A1 (en) * 1989-03-01 1990-09-13 Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
CN103646455B (en) * 2013-12-24 2016-01-20 杨密凯 The compound method of a kind of Intelligent lock device and using method thereof, electron key
CN104794515A (en) * 2015-03-26 2015-07-22 立德高科(北京)数码科技有限责任公司 Code pattern capable of distinguishing display content and generation and reading methods thereof
CN104933793B (en) * 2015-06-11 2017-08-18 宁波飞拓电器有限公司 A kind of two-dimensional code electronic key implementation method based on digital signature
CN106971434A (en) * 2016-01-13 2017-07-21 袁磊 The electronic lock system authenticated online by wireless network terminal
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN106056717A (en) * 2016-06-16 2016-10-26 广州地理研究所 System and method for scanning and verifying codes in offline manner
CN107180255A (en) * 2017-06-09 2017-09-19 江苏物码信息技术有限公司 A kind of examination based on Quick Response Code enters field system
CN107358283A (en) * 2017-06-19 2017-11-17 上海斐讯数据通信技术有限公司 A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN107808207A (en) * 2017-09-01 2018-03-16 北京佳阳科技有限公司 Intelligence ticket booking method, electronic equipment and server, intelligent clearance method and apparatus
CN107992768B (en) * 2017-11-29 2021-11-16 努比亚技术有限公司 Information protection method, terminal equipment and storage medium
CN108229195B (en) * 2018-01-29 2021-10-19 高江涛 Two-dimensional code multi-dimensional multi-industry information display method and platform
CN208730586U (en) * 2018-08-15 2019-04-12 北京鼎科远图科技有限公司 A kind of Anti-counterfeiting seal system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482569A (en) * 2002-09-13 2004-03-17 北京捷辰科技发展有限公司 Off-line two-dimension bar code biological identification false-proof method
CN101388066A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method for implementing two-dimensional code certification
KR20130012182A (en) * 2011-06-23 2013-02-01 (주)엘이디스튜디오 System and method for providing qr code coupon usingthe internet
CN102663549A (en) * 2012-03-29 2012-09-12 华南农业大学 Entrance ticket management system with high security and entrance ticket management method thereof
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN108038529A (en) * 2017-12-08 2018-05-15 北京中星仝创科技有限公司 A kind of circular two-dimensional code generation with image and the method read
CN108665041A (en) * 2018-05-09 2018-10-16 深圳市码云可变数据科技有限公司 Quick Response Code generates and recognition methods, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110111461A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
US11310058B2 (en) Methods for digitally signing an electronic file and authentication method
US7024562B1 (en) Method for carrying out secure digital signature and a system therefor
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
US6775775B1 (en) Method of physical individual authentication and system using the same
US4993068A (en) Unforgeable personal identification system
KR101226651B1 (en) User authentication method based on the utilization of biometric identification techniques and related architecture
US6185316B1 (en) Self-authentication apparatus and method
US20030012374A1 (en) Electronic signing of documents
JPWO2003069489A1 (en) Identification method
CN108830502A (en) A kind of seal system
JP2006209697A (en) Individual authentication system, and authentication device and individual authentication method used for the individual authentication system
CN101789067A (en) Electronic document signature protecting method and system
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
CN110111461B (en) Two-dimensional code-based pass offline identification method and device
JPH1188321A (en) Digital signature generation server
CN104715537A (en) Encryption and decryption method based on digital tags
CN104835039A (en) Data label generation method
EP1280098A1 (en) Electronic signing of documents
CN101127592A (en) A biological template registration method and system
JP6151627B2 (en) Biometric authentication system, biometric authentication method, and computer program
Kannavara et al. Topics in biometric human-machine interaction security
Rudrakshi et al. A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem
Gąsiorowski Managing security in electronic banking–legal and organisational aspects
WO2018091289A1 (en) Method of issuing an identity document
Pfitzmann Biometrics–how to put to use and how not at all?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant