CN110210270B - Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system - Google Patents

Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system Download PDF

Info

Publication number
CN110210270B
CN110210270B CN201910451541.9A CN201910451541A CN110210270B CN 110210270 B CN110210270 B CN 110210270B CN 201910451541 A CN201910451541 A CN 201910451541A CN 110210270 B CN110210270 B CN 110210270B
Authority
CN
China
Prior art keywords
service
data
information
code
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910451541.9A
Other languages
Chinese (zh)
Other versions
CN110210270A (en
Inventor
孔令达
刘书勇
翟峰
梁晓兵
赵兵
刘鹰
吕英杰
祝恩国
邹和平
张密
付义伦
王楠
周琪
李保丰
曹永峰
岑炜
许斌
徐萌
袁泉
冯云
卢艳
冯占成
李丽丽
张庚
任博
杨全萍
韩文博
乔文俞
朱子旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN201910451541.9A priority Critical patent/CN110210270B/en
Publication of CN110210270A publication Critical patent/CN110210270A/en
Application granted granted Critical
Publication of CN110210270B publication Critical patent/CN110210270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06075Constructional details the marking containing means for error correction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention discloses a two-dimensional code information security reinforcement method and a system, which can be used for encoding according to a set encoding rule, determining two-dimensional code information according to an encoding format of the set two-dimensional code information and utilizing a CRC (cyclic redundancy check) code to prevent tampering; the encryption algorithm is represented by the algorithm identification, so that the data size is small, and the information is rich; according to the two-dimensional code information security reinforcement scheme, plaintext information is encrypted, so that the plaintext information cannot be simply identified, and the risk effect of leakage is avoided; in addition, the two-dimensional code information security reinforcement scheme can flexibly configure the encryption method according to the application scene, and the implementation difficulty is low. The invention also provides a two-dimensional code image analysis method and a two-dimensional code image analysis system, so as to analyze the two-dimensional code image obtained by the two-dimensional code security reinforcement method. The two technical schemes of the invention adopt universal generating and reading software to generate and read the two-dimensional code, thereby reducing the deployment difficulty and ensuring the information security.

Description

Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
Technical Field
The invention relates to the technical field of data information security, in particular to a two-dimensional code information security reinforcement method and system and a two-dimensional code image analysis method and system.
Background
Two-dimensional codes have been invented since the 80 s of the 20 th century as economical and practical automatic identification techniques, and are widely applied to identification, storage, electronic data exchange and the like. The wide application of the two-dimensional code industry also allows some lawless persons to find opportunities. Events such as falsification of a forged two-dimensional code or the like attached to a payment terminal device from malicious advertising to financial fraud are also endless.
Therefore, how to perform unified specification management from the source and the encoding and decoding mechanism, and to advance two-dimensional code specification application and security application becomes a problem to be solved.
Disclosure of Invention
The invention provides a two-dimensional code information security reinforcement method and system and a two-dimensional code image analysis method and system, which are used for solving the problem of how to safely process two-dimensional code information.
In order to solve the above problem, according to an aspect of the present invention, there is provided a two-dimensional code information security reinforcement method, the method comprising:
Determining a service code according to a specific service category and a coding rule of the service code;
determining the corresponding coding type of each plaintext information according to the security level of the plaintext information;
determining the data content of the data block corresponding to each plaintext information according to the coding type, and combining according to the format of 'the number of the data blocks plus the data content of each data block' to obtain service data;
calculating the service codes and the service data by adopting a cyclic redundancy check algorithm to obtain check codes;
and combining the service code, the service data and the check code to acquire two-dimensional code information for manufacturing a two-dimensional code image.
Preferably, wherein the coding type includes: plaintext coding type, class a encryption coding type and class B encryption coding type.
Preferably, wherein
The data content of each data block is encoded in the following format: type-Length-Value encoding format;
when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
Preferably, the binary code obtained after binary code conversion of the data is used as the corresponding algorithm identifier of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H;
and encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
According to another aspect of the present invention, there is provided a two-dimensional code image parsing method, which is characterized in that the method includes:
identifying a two-dimensional code image manufactured according to the two-dimensional code information to acquire an application code;
analyzing the application code according to the format of 'service code + service data + check code' to obtain an analyzed service code, analyzed service data and an analyzed check code;
calculating the analyzed service codes and the analyzed service data by adopting a cyclic redundancy check algorithm, and comparing a calculation result with the analyzed check codes;
And when the comparison result of the calculation result and the analyzed check code indicates that the check is passed, analyzing the analyzed service data to obtain plaintext information.
Preferably, the parsing the parsed service data to obtain plaintext information includes:
analyzing the analyzed service data to obtain the number of the analyzed data blocks and the data content of each analyzed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
determining the corresponding coding Type of each data block according to the Type value in the data content of each parsed data block;
extracting a Value in the data content of each data block;
and determining the plaintext information according to the corresponding coding type and the corresponding Value of each data block.
Preferably, the determining plaintext information according to the corresponding coding type and the corresponding Value of each data block includes:
when the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely algorithm identification of the used encryption algorithm, algorithm additional information and corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information;
The binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; the algorithm identifies a complement of 00H of less than 3 bytes.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
According to still another aspect of the present invention, there is provided a two-dimensional code information security reinforcement system, which is characterized in that the system includes:
the service code determining module is used for determining the service code according to the specific service category and the coding rule of the service code;
the coding type determining module is used for determining the coding type corresponding to each plaintext information according to the security level of the plaintext information;
the service data acquisition module is used for determining the data content of the data block corresponding to each plaintext information according to the coding type, and combining according to the format of the number of the data blocks and the data content of each data block so as to acquire service data;
The check code acquisition module is used for calculating the service codes and the service data by adopting a cyclic redundancy check algorithm so as to acquire check codes;
and the two-dimension code information acquisition module is used for combining the service codes, the service data and the check codes to acquire two-dimension code information for manufacturing two-dimension code images.
Preferably, wherein the coding type includes: plaintext coding type, class a encryption coding type and class B encryption coding type.
Preferably, wherein
The data content of each data block is encoded in the following format: type-Length-Value encoding format;
when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
Preferably, wherein
Binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H;
And encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
According to still another aspect of the present invention, there is provided a two-dimensional code image analysis system, the system comprising:
the application code acquisition module is used for identifying the two-dimensional code image manufactured according to the two-dimensional code information so as to acquire an application code;
the analysis module is used for analyzing the application code according to the format of 'service code + service data + check code' so as to obtain an analyzed service code, analyzed service data and an analyzed check code;
the judging module is used for calculating the analyzed service codes and the analyzed service data by adopting a cyclic redundancy check algorithm and comparing the calculation result with the analyzed check codes;
And the plaintext information acquisition module is used for analyzing the analyzed service data to acquire plaintext information when the comparison result of the calculation result and the analyzed check code indicates that the check is passed.
Preferably, the plaintext information obtaining module parses the parsed service data to obtain plaintext information, and includes:
the data content acquisition unit is used for analyzing the analyzed service data to acquire the number of the analyzed data blocks and the data content of each analyzed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
the coding Type determining unit is used for determining the coding Type corresponding to each data block according to the Type value in the data content of each parsed data block;
a data extraction unit for extracting a Value in the data content of each data block;
and the plaintext information acquisition unit is used for determining the plaintext information according to the corresponding coding type and the corresponding Value of each data block.
Preferably, the plaintext information obtaining unit determines plaintext information according to a corresponding encoding type and a corresponding Value for each data block, and includes:
When the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely algorithm identification of the used encryption algorithm, algorithm additional information and corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information;
the binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; the algorithm identifies a complement of 00H of less than 3 bytes.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
The invention provides a two-dimension code information security reinforcement method and a system, which can be used for encoding according to a set encoding rule, determining two-dimension code information according to an encoding format of the set two-dimension code information and utilizing a CRC (cyclic redundancy check) code to prevent tampering; the encryption algorithm is represented by the algorithm identification, so that the data size is small, and the information is rich; according to the two-dimensional code information security reinforcement scheme, plaintext information is encrypted, so that the plaintext information cannot be simply identified, and the risk effect of leakage is avoided; in addition, the two-dimensional code information security reinforcement scheme can flexibly configure the encryption method according to the application scene, and the implementation difficulty is low.
The invention also provides a two-dimensional code image analysis method and a two-dimensional code image analysis system, so as to analyze the two-dimensional code image obtained by the two-dimensional code security reinforcement method.
The two technical schemes of the invention adopt universal generating and reading software to generate and read the two-dimensional code, thereby reducing the deployment difficulty and ensuring the information security.
Drawings
Exemplary embodiments of the present invention may be more completely understood in consideration of the following drawings:
fig. 1 is a flowchart of a two-dimensional code information security reinforcement method 100 according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of encoding of a service code according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of data content of a data block corresponding to a plaintext encoding type according to an embodiment of the present invention; and
FIG. 4 is a schematic diagram of data content of a data block corresponding to a class A encryption type according to an embodiment of the present invention; and
FIG. 5 is a schematic diagram of data content of a data block corresponding to a type B encryption encoding according to an embodiment of the present invention; and
fig. 6 is a flowchart of two-dimensional code generation according to an embodiment of the present invention;
fig. 7 is a comparison diagram of a two-dimensional code image obtained using original data and a two-dimensional code image obtained according to an embodiment of the present invention;
Fig. 8 is a schematic structural diagram of a two-dimensional code information security reinforcement system 800 according to an embodiment of the present invention;
fig. 9 is a flowchart of a two-dimensional code image parsing method 900 according to an embodiment of the present invention;
fig. 10 is a flowchart for reading a two-dimensional code to obtain plaintext information according to an embodiment of the present invention; and
fig. 11 is a schematic diagram illustrating a structure of a two-dimensional code image analysis system 1100 according to an embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the examples described herein, which are provided to fully and completely disclose the present invention and fully convey the scope of the invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, like elements/components are referred to by like reference numerals.
Unless otherwise indicated, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. In addition, it will be understood that terms defined in commonly used dictionaries should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 is a flowchart of a two-dimensional code information security reinforcement method 100 according to an embodiment of the present invention. As shown in fig. 1, the two-dimensional code information security reinforcement method provided by the embodiment of the invention can be used for encoding according to a set encoding rule, determining two-dimensional code information according to an encoding format of the set two-dimensional code information, and utilizing a CRC check code to prevent tampering; the encryption algorithm is represented by the algorithm identification, so that the data size is small, and the information is rich; according to the two-dimensional code information security reinforcement scheme, plaintext information is encrypted, so that the plaintext information cannot be simply identified, and the risk effect of leakage is avoided; in addition, the two-dimensional code information security reinforcement scheme can flexibly configure the encryption method according to the application scene, and the implementation difficulty is low. The two-dimensional code information security reinforcement method of the embodiment of the invention can be applied to various scenes of two-dimensional code application, such as payment information, electricity information, asset information and the like.
The two-dimensional code information security reinforcement method 100 of the embodiment of the present invention starts at step 101, and determines a service code according to a specific service category and a coding rule of the service code at step 101.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
In the embodiment of the invention, the two-dimensional code information comprises a service code area, a service data area and a check code area 3, and the coding length of each part is shown in table 1.
TABLE 1 coding region Length
Service code area Service data area Check code area
Length (Unit: bytes) 3 Variable 2
Fig. 2 is a schematic diagram of coding of a service code according to an embodiment of the present invention. As shown in fig. 2, in the embodiment of the present invention, the service code area is fixed with a length of 3 bytes, wherein the first byte is a "large service number", the second byte is a "small service number", and the last byte is a reserved bit for expansion use of each service unit.
The highest bit of the small service number indicates whether the service belongs to the asset class; wherein 0 represents an asset class; 1 represents a non-asset class.
In step 102, a coding type corresponding to each plaintext information is determined according to a security level of the plaintext information.
Preferably, wherein the coding type includes: plaintext coding type, class a encryption coding type and class B encryption coding type.
In the embodiment of the invention, the coding type is determined according to the security level of the plaintext information, for example, if the security level of the plaintext information is general, the coding type may be selected as the plaintext coding type; if the security level of the plaintext information is medium, the plaintext information can be selected as a type A encryption coding type; if the security level of the plaintext information is advanced, a type B encryption encoding type may be selected.
Of course, the security level of the specific plaintext information may be set to various levels, so that it corresponds to multiple encoding types, and may be set as desired, and is not limited to the encoding types mentioned in the embodiments of the present invention.
In step 103, the data content of the data block corresponding to each plaintext information is determined according to the coding type, and the data content of each data block is combined according to the format of "number of data blocks+data content of each data block" to obtain service data.
Preferably, wherein
The data content of each data block is encoded in the following format: type-Length-Value encoding format;
when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
Preferably, the binary code obtained after binary code conversion of the data is used as the corresponding algorithm identifier of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H;
And encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
In the embodiment of the present invention, the service data area is composed of "the number of data blocks (i.e., the number of plaintext information)" and a plurality of data blocks, and a group of plaintext information corresponds to one data block. The number of data blocks occupies 1 byte (16-ary representation). The data content of each data block is encoded in the following format: the data content of each data block is divided into a plaintext coding Type, a class A encryption coding Type and a class B encryption coding Type according to the coding Type in the Type-Length-Value coding format.
Fig. 3 is a schematic diagram of data contents of a data block corresponding to a plaintext coding type according to an embodiment of the present invention. As shown in fig. 3, when the encoding type is a plaintext encoding type, the Value in the data content of the data block (i.e., the plaintext Wen Ou) corresponding to the plaintext information is the plaintext information.
Fig. 4 is a schematic diagram of data contents of a data block corresponding to a type a encryption coding according to an embodiment of the present invention. As shown in fig. 4, when the encoding type is a type a encryption encoding type, the encoding format of the Value in the data content of the data block (i.e., the type a encryption area) corresponding to the plaintext information is "algorithm identification of the encryption algorithm used by the data block+algorithm additional information+corresponding ciphertext information".
Fig. 5 is a schematic diagram of data contents of a data block corresponding to a B-type encryption coding type according to an embodiment of the present invention. As shown in fig. 5, when the encoding type is a B-type encryption encoding type, the encoding format of the Value in the data content of the data block corresponding to the plaintext information is "algorithm identification of the encryption algorithm used by the data block+algorithm additional information+corresponding ciphertext information".
When the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block (namely, the type B encryption area) corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
In the embodiment of the present invention, the coding scheme of the coding type is shown in table 2.
Table 2 coding identifier table corresponding to coding type
Sequence number 1 2 3
Code content Plaintext region Class a encryption zone Class B encryption zone
Code label (Tbye) 01 02 03
In the embodiment of the invention, the Length coding can occupy 1-3 bytes, accords with BER-TLV coding specification and refers to the standard: the ASN.1 coding rule part 1 of GB/T16263.1-2006 information technology: basic coding rules (BER), regular coding rules (CER) and atypical coding rules (DER) specifications.
The description of the Length first byte encoding is shown in table 3, wherein, when b8 of the first byte is 0, b7-b1 of the byte represents the Length of the Value field; when b8 is 1, b7-b1 is taken as the length of the following byte. The following byte identifies the length of the Value field.
TABLE 3 Length first byte encoding Table
In the embodiment of the invention, the binary code converted from the data identifier after the national encryption OID algorithm identifier 1.2.156.10197.1 is used as the algorithm identifier, the conversion standard accords with the series standard of ISO/IEC 8825, less than 3 bytes are complemented with 00H, and the plaintext is represented by 000000H. The coding of the OID accords with the OID identification specification jointly proposed by the ISO/IEC and ITU, and the specification of the application identification of the GM-T0006-2012_password can be seen. For example, the setting algorithm is identified as "000000H" for the plaintext type without encryption, and as "660000H" for the SM1 encryption algorithm.
For the algorithm additional information, two bytes are reserved as extension bytes to be described by applying the data encryption method. And encrypting the plaintext data by using the selected encryption algorithm for the encrypted data block to obtain corresponding ciphertext information, and determining the Value of the encrypted data block according to the coding format of algorithm identification, algorithm additional information and ciphertext information. For example, if the determined coding type is a type a encryption coding type, the plaintext information is "5130001000000017031280", the encryption algorithm is "SM4-ECB", the algorithm identifier is "680100", the algorithm additional information is "0000", and the encrypted ciphertext data is "7AC0CF055F8E9E3E02FC550a60a44427", the Value in the data content of the data block is "68010000007AC0CF055F8E9E3E02FC550a60a44427".
Setting the data Value of the Type A encryption coding Type to be 01, if the Length of the data block is 15, determining the data content of the data block to be '011568010000007 AC0CF055F8E9E3E02FC550A60A 44427' according to the coding format 'Type-Length-Value' of the data content of the data block.
If there is only one data block, i.e., the number of data blocks is encoded as "01", it can be determined that the service data is "01011568010000007AC0CF055F8E9E3E02FC550a60a44427".
In step 104, a cyclic redundancy check algorithm is used to calculate the service code and service data to obtain a check code.
In an embodiment of the present invention, the "service code+service data" is calculated using a cyclic redundancy check algorithm CRC16 algorithm to obtain a check code.
In step 105, the service code, the service data and the check code are combined to obtain two-dimensional code information for making a two-dimensional code image.
In the embodiment of the invention, the encoding format of the two-dimensional code information is 'service code + service data + check code'.
For example, if the service code is "020100", the service data is "010115a44427", and the check code is "EDE1", it can be determined that the two-dimensional code information is "020100010115a44427EDE1".
Fig. 6 is a flowchart of two-dimensional code generation according to an embodiment of the present invention. As shown in fig. 6, the method is divided into three parts of determining service codes, organizing service data and adding check codes.
For determining the service code portion, the service code is determined primarily based on the specific service category.
For organizing the business data part, the coding type is determined according to the security level of the plaintext information, and the corresponding data content is determined according to different coding types. For the ciphertext data block, according to different security protection levels, determining that the encryption level belongs to A class or B class, selecting a corresponding cryptographic algorithm, determining an algorithm identification and algorithm additional information of the block data, encrypting plaintext information, and obtaining a Value of the ciphertext data block according to the format of the algorithm identification, the algorithm additional information and the ciphertext information. For the plaintext data block that does not need encryption, the plaintext information is the Value of the plaintext data block. Then, after the Length Value of each data block is determined, the service data is organized according to the format of n+ "type+length+value" (plaintext) + "type+length+value" (class a ciphertext) + "type+length+value" (class B ciphertext).
And for the added check code part, a CRC16 algorithm is mainly adopted according to the acquired service codes and service data to calculate the check codes, and then the check codes are combined according to the format of 'service codes + service data + check codes', so as to acquire two-dimensional code information, and the two-dimensional code information is used for manufacturing a two-dimensional code image according to the two-dimensional code information.
The following explains a two-dimensional code application scenario of an energy router as an example.
The energy router manufacturer provides the Bluetooth address information and the energy router ID corresponding to each device to the provincial metering center, and the provincial metering center generates the encrypted two-dimensional code by using the special password device and provides the encrypted two-dimensional code to the energy router manufacturer, and the energy router manufacturer leaves the factory after spraying the encrypted two-dimensional code on the device by the manufacturer. The Bluetooth address information and the energy router ID adopt A-type encryption modes respectively.
The generation process data of the two-dimensional code information are as follows:
(1) The original unencrypted two-dimensional code information is shown in table 4.
Table 4 original unencrypted two-dimensional code information Table
Data value
Energy router ID 5130001000000017031280
Data bluetooth address 7E216AAC030E
Two-dimensional code data 51300010000000170312807E216AAC030E
(2) The two-dimensional code information table processed according to the technical scheme of the invention is shown in table 5.
Table 5 processed two-dimensional code information table
A comparison diagram of a two-dimensional code image obtained using raw data and a two-dimensional code image obtained according to an embodiment of the present invention is shown in fig. 7. And the user uses the APP embedded with the code scanning and decrypting software module which accords with the application specification of the marketing two-dimensional code to scan the two-dimensional code. And decrypting the data of the two-dimensional code to obtain the A-class data 'Bluetooth connection address' and 'energy router ID'.
And the APP actively performs Bluetooth connection according to the obtained Bluetooth connection address, disperses the embedded keys according to the ID of the energy router after connection is established, performs bidirectional identity authentication based on a national encryption algorithm with the energy router, and can develop mobile phone APP Bluetooth ordered charging service after authentication is passed.
Fig. 8 is a schematic structural diagram of a two-dimensional code information security reinforcement system 800 according to an embodiment of the present invention. As shown in fig. 8, a two-dimensional code information security reinforcement system 800 provided in an embodiment of the present invention includes: a service code determining module 801, a coding type determining module 802, a service data acquiring module 803, a check code acquiring module 804 and a two-dimensional code information acquiring module 805.
Preferably, the service code determining module 801 is configured to determine a service code according to a specific service category and a coding rule of the service code.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
Preferably, the coding type determining module 802 is configured to determine a coding type corresponding to each plaintext information according to a security level of the plaintext information.
Preferably, wherein the coding type includes: plaintext coding type, class a encryption coding type and class B encryption coding type.
Preferably, the service data obtaining module 803 is configured to determine the data content of the data block corresponding to each plaintext information according to the coding type, and combine the data content of each data block with the format of "the number of data blocks+the number of data blocks" to obtain service data.
Preferably, the coding format of the data content of each data block is: type-Length-Value encoding format; when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information; when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
Preferably, the binary code obtained after binary code conversion of the data is used as the corresponding algorithm identifier of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H; and encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
Preferably, the check code obtaining module 804 is configured to calculate the service code and the service data by using a cyclic redundancy check algorithm to obtain a check code.
Preferably, the two-dimensional code information obtaining module 805 is configured to combine the service code, the service data and the check code to obtain two-dimensional code information for making a two-dimensional code image.
The two-dimensional code information security reinforcement system 800 according to the embodiment of the present invention corresponds to the two-dimensional code information security reinforcement method 100 according to another embodiment of the present invention, and is not described herein.
Fig. 9 is a flowchart of a two-dimensional code image parsing method 900 according to an embodiment of the present invention. As shown in fig. 9, the two-dimensional code image analysis method provided by the embodiment of the invention can determine a new check code according to the analyzed service code and service data, and compare the analyzed check code to determine the accuracy of the two-dimensional code data; and meanwhile, when the comparison result is determined to indicate that the verification is passed, analyzing the analyzed service data to obtain plaintext information. The analysis method can analyze the complex two-dimensional code information according to the known coding rule, so that the common analysis method can not simply identify the plaintext information, the safety of the plaintext information is ensured, and the risk of leakage does not exist. The two-dimensional code image analysis method 900 according to the embodiment of the present invention starts at step 901, and at step 901, a two-dimensional code image created from the two-dimensional code information is identified to acquire an application code.
In step 902, the application code is parsed according to the format of "service code+service data+check code" to obtain the parsed service code, parsed service data and parsed check code.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
In step 903, a cyclic redundancy check algorithm is used to calculate the parsed service code and parsed service data, and the calculation result is compared with the parsed check code.
In step 904, when the comparison result of the calculation result and the parsed check code indicates that the check is passed, the parsed service data is parsed to obtain plaintext information.
Preferably, the parsing the parsed service data to obtain plaintext information includes:
analyzing the analyzed service data to obtain the number of the analyzed data blocks and the data content of each analyzed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
Determining the corresponding coding Type of each data block according to the Type value in the data content of each parsed data block;
extracting a Value in the data content of each data block;
and determining the plaintext information according to the corresponding coding type and the corresponding Value of each data block.
Preferably, the determining plaintext information according to the corresponding coding type and the corresponding Value of each data block includes:
when the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely algorithm identification of the used encryption algorithm, algorithm additional information and corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information;
the binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; the algorithm identifies a complement of 00H of less than 3 bytes.
The two-dimensional code image analysis method and the two-dimensional code information security reinforcement method of the embodiment of the invention correspond to each other, and the decoding rule and the encoding rule correspond to each other, so that the decoding method can be determined according to the encoding method.
For example, a client-side mobile phone APP (embedded software decryption module) scans codes on site, and an APP program identifies two-dimensional code data as:
040100020000000000000B51300010000000170312806801000000001070768740AF2DB2E5807F44DC1754C1386408。
analyzing the ciphertext data according to a decoding rule corresponding to the encoding rule, transmitting the ciphertext data to a two-dimensional code data analyzing module and a decrypting module, and analyzing and decrypting the ciphertext data as follows:
therefore, by scanning the two-dimensional code, it can be determined that: the service code is 040100, the equipment asset number is 5130001000000017031280, and the Bluetooth address is 7E216AAC030E.
Fig. 10 is a flowchart for reading a two-dimensional code to obtain plaintext information according to an embodiment of the present invention. As shown in fig. 10, in the embodiment of the present invention, a method for reading a two-dimensional code image to obtain plaintext information mainly includes: checking and obtaining a service data part, analyzing the service data part and outputting a plaintext data part.
For checking and acquiring the service data part, the method comprises the following steps: scanning the two-dimensional code image, correcting, and decoding to obtain an application code (namely two-dimensional code information); after the application code is obtained, analyzing the application code according to the format of the service code, the service data and the check code, comparing the result of CRC16 operation of the service code and the service data with the check code, and if the comparison result is consistent, indicating that the verification is passed; otherwise, checking is not passed, reporting error and ending the flow. And when the verification is passed, acquiring the analyzed service data.
For parsing a service data portion, comprising: and the acquired analyzed service data is processed according to the following steps: the method comprises the steps of analyzing the format of N+ "type+length+value" (plaintext) + "type+length+value" (class A ciphertext) + "type+length+value" (class B ciphertext), identifying the number of data blocks and the data content of each data block, and analyzing according to the coding format of "Type-Length-Value" of the data content of each data block. If the Type value is "01", the coding Type is a plaintext coding Type; if the Type value is '02', the coding Type is a Type A encryption coding Type; if the Type value is "03", it indicates that the encoding Type is a B-Type encryption encoding Type.
For the plaintext coding type, the Value is plaintext information; for the encrypted data block, the algorithm identifier, the algorithm additional information and the ciphertext information need to be determined according to the format of the algorithm identifier, the algorithm additional information and the ciphertext information, and the ciphertext information needs to be decrypted to obtain plaintext information.
And finally, outputting the obtained plaintext information to complete the reading of the two-dimensional code image.
Fig. 11 is a schematic diagram illustrating a structure of a two-dimensional code image analysis system 1100 according to an embodiment of the present invention. As shown in fig. 11, a two-dimensional code image analysis system 1100 according to an embodiment of the present invention includes: an application code acquisition module 1101, an analysis module 1102, a judgment module 1003, and a plaintext information acquisition module 1104.
Preferably, the application code obtaining module 1101 is configured to identify a two-dimensional code image made according to the two-dimensional code information, so as to obtain an application code.
Preferably, the parsing module 1102 is configured to parse the application code according to a format of "service code+service data+check code" to obtain a parsed service code, parsed service data, and parsed check code.
Preferably, the coding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
Preferably, the judging module 1103 is configured to calculate the parsed service code and the parsed service data by using a cyclic redundancy check algorithm, and compare a calculation result with the parsed check code.
Preferably, the plaintext information obtaining module 1104 is configured to parse the parsed service data to obtain plaintext information when the comparison result of the calculation result and the parsed check code indicates that the check is passed.
Preferably, the plaintext information acquisition module 1104 includes: a data content acquisition unit 11041, an encoding type determination unit 11042, a data extraction unit 11043, and a plaintext information acquisition unit 11044.
Preferably, the data content obtaining unit 11041 is configured to parse the parsed service data to obtain the number of parsed data blocks and the data content of each parsed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format.
Preferably, the coding Type determining unit 11042 is configured to determine, according to the Type value in the data content of each parsed data block, a coding Type corresponding to the data block.
Preferably, the data extracting unit 11043 is configured to extract a Value in the data content of each data block.
Preferably, the plaintext information acquisition unit 11044 is configured to determine plaintext information according to a corresponding encoding type and a corresponding Value for each data block.
Preferably, the plaintext information obtaining unit 11044 determines plaintext information according to the corresponding encoding type and the corresponding Value for each data block, and includes: when the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information; when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely algorithm identification of the used encryption algorithm, algorithm additional information and corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information; the binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; the algorithm identifies a complement of 00H of less than 3 bytes.
The two-dimensional code image analysis system 1100 according to the embodiment of the present invention corresponds to the two-dimensional code image analysis method 900 according to another embodiment of the present invention, and will not be described herein.
The invention has been described with reference to a few embodiments. However, as is well known to those skilled in the art, other embodiments than the above disclosed invention are equally possible within the scope of the invention, as defined by the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise therein. All references to "a/an/the [ means, component, etc. ]" are to be interpreted openly as referring to at least one instance of said means, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

Claims (12)

1. The method for reinforcing the information security of the two-dimensional code is characterized by comprising the following steps:
determining a service code according to a specific service category and a coding rule of the service code;
determining the corresponding coding type of each plaintext information according to the security level of the plaintext information;
Determining the data content of the data block corresponding to each plaintext information according to the coding type, and combining according to the format of 'the number of the data blocks plus the data content of each data block' to obtain service data;
calculating the service codes and the service data by adopting a cyclic redundancy check algorithm to obtain check codes;
combining the service code, the service data and the check code to obtain two-dimensional code information for manufacturing a two-dimensional code image;
wherein the coding type includes: a plaintext encoding type, a class a encoding type, and a class B encoding type;
wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
Binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H;
and encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
3. The method of claim 1, wherein the encoding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
4. The two-dimensional code image analysis method is characterized by comprising the following steps of:
identifying a two-dimensional code image manufactured according to the two-dimensional code information to acquire an application code;
analyzing the application code according to the format of 'service code + service data + check code' to obtain an analyzed service code, analyzed service data and an analyzed check code;
calculating the analyzed service codes and the analyzed service data by adopting a cyclic redundancy check algorithm, and comparing a calculation result with the analyzed check codes;
When the comparison result of the calculation result and the analyzed check code indicates that the check is passed, analyzing the analyzed service data to obtain plaintext information;
the analyzing the analyzed service data to obtain plaintext information includes:
analyzing the analyzed service data to obtain the number of the analyzed data blocks and the data content of each analyzed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
determining the corresponding coding Type of each data block according to the Type value in the data content of each parsed data block;
extracting a Value in the data content of each data block;
determining plaintext information according to the corresponding coding type and the corresponding Value of each data block;
the determining plaintext information according to the corresponding coding type and the corresponding Value of each data block includes:
when the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely the algorithm identification of the used encryption algorithm, the algorithm additional information and the corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information.
5. The method according to claim 4, wherein the binary code obtained by binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 is used as the corresponding algorithm identification of different encryption algorithms; the algorithm identifies a complement of 00H of less than 3 bytes.
6. The method of claim 4, wherein the encoding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
7. A two-dimensional code information security reinforcement system, the system comprising:
the service code determining module is used for determining the service code according to the specific service category and the coding rule of the service code;
the coding type determining module is used for determining the coding type corresponding to each plaintext information according to the security level of the plaintext information;
the service data acquisition module is used for determining the data content of the data block corresponding to each plaintext information according to the coding type, and combining according to the format of the number of the data blocks and the data content of each data block so as to acquire service data;
The check code acquisition module is used for calculating the service codes and the service data by adopting a cyclic redundancy check algorithm so as to acquire check codes;
the two-dimension code information acquisition module is used for combining the service codes, the service data and the check codes to acquire two-dimension code information for manufacturing two-dimension code images;
wherein the coding type includes: a plaintext encoding type, a class a encoding type, and a class B encoding type;
wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
when the coding type is a plaintext coding type, the Value in the data content of the data block corresponding to the plaintext information is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, the coding format of the Value in the data content of the data block corresponding to the plaintext information is "the algorithm identification of the encryption algorithm used by the data block+the algorithm additional information+the corresponding ciphertext information".
8. The system of claim 7, wherein the system further comprises a controller configured to control the controller,
binary codes obtained after binary code conversion of the data after the national encryption algorithm OID algorithm identification 1.2.156.10197.1 are used as corresponding algorithm identifications of different encryption algorithms; wherein, the complement of less than 3 bytes is 00H;
And encrypting the plaintext information according to the algorithm identification and the algorithm additional information of the encryption algorithm used by the data block so as to obtain ciphertext information.
9. The system of claim 7, wherein the encoding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
10. A two-dimensional code image parsing system, the system comprising:
the application code acquisition module is used for identifying the two-dimensional code image manufactured according to the two-dimensional code information so as to acquire an application code;
the analysis module is used for analyzing the application code according to the format of 'service code + service data + check code' so as to obtain an analyzed service code, analyzed service data and an analyzed check code;
the judging module is used for calculating the analyzed service codes and the analyzed service data by adopting a cyclic redundancy check algorithm and comparing the calculation result with the analyzed check codes;
The plaintext information acquisition module is used for analyzing the analyzed service data to acquire plaintext information when the comparison result of the calculation result and the analyzed check code indicates that the check is passed;
the plaintext information obtaining module analyzes the parsed service data to obtain plaintext information, and includes:
the data content acquisition unit is used for analyzing the analyzed service data to acquire the number of the analyzed data blocks and the data content of each analyzed data block; wherein the coding format of the data content of each data block is as follows: type-Length-Value encoding format;
the coding Type determining unit is used for determining the coding Type corresponding to each data block according to the Type value in the data content of each parsed data block;
a data extraction unit for extracting a Value in the data content of each data block;
the plaintext information acquisition unit is used for determining plaintext information according to the corresponding coding type and the corresponding Value of each data block;
the plaintext information obtaining unit determines plaintext information according to a coding type and a Value corresponding to each data block, and includes:
When the coding type is a plaintext coding type, the Value in the data content of the data block is the plaintext information;
when the coding type is a type A encryption coding type or a type B encryption coding type, extracting ciphertext information from the Value according to the coding format of the Value in the data content of the data block, namely the algorithm identification of the used encryption algorithm, the algorithm additional information and the corresponding ciphertext information, and decrypting the ciphertext information by a corresponding algorithm to obtain plaintext information.
11. The system of claim 10, wherein the binary code obtained by binary code conversion of the data after the national encryption algorithm OID algorithm identifier 1.2.156.10197.1 is used as a corresponding algorithm identifier of a different encryption algorithm; the algorithm identifies a complement of 00H of less than 3 bytes.
12. The system of claim 10, wherein the encoding rule of the service code is: the length of the service code is set to be at least 3 bytes, wherein the first byte is a large service number, the second byte is a small service number, and the third byte is reserved bits for the extended use of different service institutions.
CN201910451541.9A 2019-05-28 2019-05-28 Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system Active CN110210270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910451541.9A CN110210270B (en) 2019-05-28 2019-05-28 Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910451541.9A CN110210270B (en) 2019-05-28 2019-05-28 Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system

Publications (2)

Publication Number Publication Date
CN110210270A CN110210270A (en) 2019-09-06
CN110210270B true CN110210270B (en) 2024-04-09

Family

ID=67789061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910451541.9A Active CN110210270B (en) 2019-05-28 2019-05-28 Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system

Country Status (1)

Country Link
CN (1) CN110210270B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691359A (en) * 2019-09-24 2020-01-14 中国电力科学研究院有限公司 Safety protection method for power marketing professional Bluetooth communication
CN110909842A (en) * 2019-11-15 2020-03-24 成都旺小宝科技有限公司 Business planning book making and customer management method based on dynamic two-dimensional code
CN111866839A (en) * 2020-08-10 2020-10-30 福州康达八方电子科技有限公司 Method and system for establishing Bluetooth connection based on two-dimensional code
CN113452688B (en) * 2021-06-24 2022-07-08 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488195A (en) * 2008-12-30 2009-07-22 深圳华为通信技术有限公司 Method, apparatus and terminal for declaring data information type in two-dimensional code
CN104835071A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Form-filling method and device
CN106408065A (en) * 2016-09-05 2017-02-15 成都天钥科技有限公司 Two-dimensional code encoding method and apparatus
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN107358284A (en) * 2017-07-11 2017-11-17 北京捷润科技有限公司 Generation method, read method, generating means and the reading device of Quick Response Code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488195A (en) * 2008-12-30 2009-07-22 深圳华为通信技术有限公司 Method, apparatus and terminal for declaring data information type in two-dimensional code
CN104835071A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Form-filling method and device
CN106408065A (en) * 2016-09-05 2017-02-15 成都天钥科技有限公司 Two-dimensional code encoding method and apparatus
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN107358284A (en) * 2017-07-11 2017-11-17 北京捷润科技有限公司 Generation method, read method, generating means and the reading device of Quick Response Code

Also Published As

Publication number Publication date
CN110210270A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110210270B (en) Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
CN101149768B (en) Special processor software encryption and decryption method
US20090063861A1 (en) Information security transmission system
CN110011993B (en) Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption
CN110022314B (en) Big data secure transmission method based on matrix two-dimensional code
CN101894235B (en) Smart card security session system
CN109635610A (en) The read-write system and method for RFID tag data
CN111756522A (en) Data processing method and system
US20100241865A1 (en) One-Time Password System Capable of Defending Against Phishing Attacks
CN102648625B (en) Method, device and system for implementing the grouping of broadcast services
CN103347248B (en) A kind of based on identity identifying method trans-regional on handheld terminal
CN109831782B (en) Safety transmission verification method for electronic card information
CN101171860A (en) Security method and device for managing access to multimedia contents
CN107196973A (en) A kind of data encryption, decryption method and device
US20120017086A1 (en) Information security transmission system
US10615975B2 (en) Security authentication method for generating secure key by combining authentication elements of multi-users
CN109214488B (en) Method and system for information transmission based on graphic coded data
CN113254986B (en) Data processing method, device and computer readable storage medium
JP6031729B1 (en) RFID tag code generation device and method, authentication device and method, and program
CN116150780A (en) Method and device for dynamically generating token, electronic equipment and storage medium
CN116781265A (en) Data encryption method and device
CN115935299A (en) Authorization control method, device, computer equipment and storage medium
CN114492489A (en) NFC label verification system based on dynamic data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant