CN114444860B - One-code passing method and terminal - Google Patents

One-code passing method and terminal Download PDF

Info

Publication number
CN114444860B
CN114444860B CN202111596480.9A CN202111596480A CN114444860B CN 114444860 B CN114444860 B CN 114444860B CN 202111596480 A CN202111596480 A CN 202111596480A CN 114444860 B CN114444860 B CN 114444860B
Authority
CN
China
Prior art keywords
code
dimensional code
universal
data model
application data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111596480.9A
Other languages
Chinese (zh)
Other versions
CN114444860A (en
Inventor
洪章阳
黄河
戴文艳
林文国
陈存恩
王伟宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Evecom Information Technology Development Co ltd
Original Assignee
Evecom Information Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Evecom Information Technology Development Co ltd filed Critical Evecom Information Technology Development Co ltd
Priority to CN202111596480.9A priority Critical patent/CN114444860B/en
Publication of CN114444860A publication Critical patent/CN114444860A/en
Application granted granted Critical
Publication of CN114444860B publication Critical patent/CN114444860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a one-code passing method and a terminal, wherein a two-dimensional code application data model is constructed, and the two-dimensional code application data model comprises a user identifier; acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification; the general two-dimensional code is verified based on the two-dimensional code application data model according to the received verification request to obtain a verification result, the verification result is returned to the preset industry application corresponding to the verification request, one-code passing of all industries is realized, main data is real and accurate by establishing the two-dimensional code application data model, the two-dimensional code application data model comprises two-dimensional code related information of multiple service applications, sharing of multiple application data is guaranteed, identity interaction is completed among the multiple industry applications in the one-code passing scene, safe and reliable one-code passing is realized, and convenient one-code passing is realized in the multiple service application scene.

Description

One-code passing method and terminal
Technical Field
The invention relates to the technical field of data communication, in particular to a one-code passing method and a terminal.
Background
With the continuous deepening of the internet and the service, the deep fusion of the service and the information technology is promoted, an online-offline fusion and multistage linkage application platform exchange system is created, and the effort of breaking the information island and the data chimney is the main direction. Therefore, one-code passage of identity mutual trust is the core key of service cross-application exchange.
At present, the traditional two-dimension code application is that respective systems form respective two-dimension codes, people need to open different APPs to switch back and forth to use a plurality of codes such as health codes, medical insurance electronic certificates, travel service codes, reading codes and bus codes, and the following defects exist:
(1) Code scanning is cumbersome. As the masses need to open different APPs to switch back and forth to use a plurality of codes such as health codes, medical insurance electronic certificates, travel service codes, reading codes, riding codes and the like, the code scanning experience is complicated, and various inconveniences are brought;
(2) And (4) data authentication. After the user is registered, the application system A, B, C cannot verify the identity information of people, the main body information of the generated two-dimensional code lacks accuracy, and the systems have no unified standard;
(3) Repeated construction consumes resources. The application system A, B, C needs to establish an identity information verification standard and a personal two-dimensional code application data model respectively, and meanwhile needs to establish different two-dimensional code scanning standards, so that the working efficiency is reduced, and more computing resources are consumed.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the one-code passing method and the terminal can realize convenient one-code passing under a multi-service application scene.
In order to solve the technical problem, the invention adopts a technical scheme that:
a method of code passage, comprising:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
and verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a code passing terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
and verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request.
The invention has the beneficial effects that: the method comprises the steps of constructing a two-dimension code application data model, obtaining a current timestamp according to a received two-dimension code generation request, generating a universal two-dimension code according to the current timestamp and a user identification, verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request, and returning a verification result to a corresponding preset industry application, so that one-code passing of all industries is realized.
Drawings
FIG. 1 is a flowchart illustrating steps of a code passing method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a one-code-passing terminal according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a two-dimensional code application data model in a code passage method according to an embodiment of the present invention;
FIG. 4 is a schematic overall flow chart of a code passing method according to an embodiment of the present invention;
fig. 5 is a schematic flow chart illustrating code verification in a code passing method according to an embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, an embodiment of the present invention provides a code passing method, including:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
and verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request.
As can be seen from the above description, the beneficial effects of the present invention are: the method comprises the steps of constructing a two-dimension code application data model, obtaining a current timestamp according to a received two-dimension code generation request, generating a universal two-dimension code according to the current timestamp and a user identification, verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request, returning a verification result to a corresponding preset industry application, and realizing one-code passage of all industries.
Further, the constructing the two-dimensional code application data model comprises:
acquiring code segment information, user identification, user information corresponding to the user identification and industry identification of a preset industry application;
correlating the code segment information, the user information and the industry identification to obtain an incidence relation;
constructing a two-dimensional code application data model according to the user identification and the incidence relation;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
and verifying the universal two-dimension code based on the user identification and the incidence relation in the two-dimension code application data model according to the received verification request to obtain a verification result.
As can be seen from the above description, by obtaining code segment information of a preset industry application, code segment information corresponding to an application two-dimensional code existing on the market, such as a doctor-seeing code, a tourist code, a borrowing code, and the like, can be obtained, it is convenient to store multiple "code" data in a two-dimensional code application data model in an associated manner, associate the code segment information, user information, and industry identification to obtain an association relationship, construct a two-dimensional code application data model according to the user identification and the association relationship, facilitate information exchange with various industry service applications during subsequent verification, and ensure sharing of multiple application data.
Further, the generating a universal two-dimensional code according to the current timestamp and the user identifier includes:
generating an initial code text according to the current timestamp and the user identifier;
encrypting the initial code text to generate a final code text;
generating a universal two-dimensional code according to the final code text;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
acquiring request time corresponding to a received verification request;
and judging whether the difference value between the request time and the current timestamp exceeds a preset value, if so, returning to the step of executing the step of acquiring the current timestamp according to the received two-dimensional code generation request, and if not, verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result.
According to the description, the initial code text is generated according to the current timestamp and the user identification, the initial code text is encrypted to generate the final code text, the universal two-dimensional code is generated according to the final code text, the universal two-dimensional code is used as a code to be passed, the two-dimensional code technical standards of various application platforms are unified, when verification is performed, if the difference value between the request time and the current timestamp exceeds a preset value, the universal two-dimensional code is overdue, the universal two-dimensional code needs to be refreshed, namely, the step of generating the universal two-dimensional code is returned to be executed, and the passing safety of the code is ensured.
Further, the verification request comprises the encrypted universal two-dimension code;
the step of verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request comprises the following steps of:
decrypting the encrypted universal two-dimensional code to obtain the universal two-dimensional code and a target industry identifier;
decoding the general two-dimensional code to obtain a target user identifier;
acquiring target user information from the user identification in the two-dimensional code application data model and the incidence relation according to the target user identification;
acquiring a verification standard corresponding to the target industry identifier;
comparing the verification standard with the target user information to obtain a comparison result;
and packaging the comparison result and the target user information to obtain a verification result.
According to the description, when the two-dimensional code is verified, the encrypted general two-dimensional code is decrypted to obtain the general two-dimensional code and the target industry identification, the general two-dimensional code is decoded to obtain the target user identification, the target user information is obtained from the user identification and the incidence relation in the two-dimensional code application data model according to the target user identification, the verification standard corresponding to the target industry identification is obtained, the verification standard is compared with the target user information, the verification result is packaged with the target user information according to the comparison result, the industry to which the industry application belongs can be determined according to the target industry identification, the target user identification is used for determining the user to which the general two-dimensional code belongs, the target user information can be conveniently obtained from the two-dimensional code application data model, data sharing and intercommunication among various application platforms are achieved, and finally the verification standard is compared with the target user information, and reliable two-dimensional code verification is achieved.
Further, when the encrypted universal two-dimensional code is decrypted, code segment information is also obtained;
the returning the verification result to the preset industry application corresponding to the verification request comprises:
packaging the verification result and the code segment information to obtain a data packet, and encrypting the data packet to obtain an encrypted data packet;
and returning the encrypted data packet to a preset industry application corresponding to the verification request according to the code segment information.
According to the description, the verification result and the code segment information are packaged to obtain the data packet, the data packet is encrypted to obtain the encrypted data packet, the encrypted data packet can be accurately returned to the corresponding preset industry for application according to the code segment information, the security of the verification result and the code segment information in the data packet can be ensured through encryption operation, and therefore safe and reliable one-code passing is achieved under the multi-service application scene.
Referring to fig. 2, a code passing terminal includes a memory, a processor and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the processor implements the following steps:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
and verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of constructing a two-dimension code application data model, obtaining a current timestamp according to a received two-dimension code generation request, generating a universal two-dimension code according to the current timestamp and a user identification, verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request, and returning a verification result to a corresponding preset industry application, so that one-code passing of all industries is realized.
Further, the constructing the two-dimensional code application data model comprises:
acquiring code segment information, user identification, user information corresponding to the user identification and industry identification of a preset industry application;
correlating the code segment information, the user information and the industry identification to obtain an association relation;
constructing a two-dimensional code application data model according to the user identification and the incidence relation;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
and verifying the universal two-dimension code based on the user identification and the incidence relation in the two-dimension code application data model according to the received verification request to obtain a verification result.
As can be seen from the above description, by obtaining code segment information of preset industry applications, code segment information corresponding to an application two-dimensional code existing on the market, such as a doctor code, a tourist code, a borrowing code, and the like, can be obtained, it is convenient to store multiple "code" data association into a two-dimensional code application data model, associate the code segment information, user information, and industry identification to obtain an association relationship, construct a two-dimensional code application data model according to the user identification and the association relationship, facilitate information exchange with various industry service applications during subsequent verification, and ensure sharing of multiple application data.
Further, the generating a universal two-dimensional code according to the current timestamp and the user identifier includes:
generating an initial code text according to the current timestamp and the user identifier;
encrypting the initial code text to generate a final code text;
generating a universal two-dimensional code according to the final code text;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
acquiring request time corresponding to the received verification request;
and judging whether the difference value between the request time and the current timestamp exceeds a preset value, if so, returning to the step of executing the step of acquiring the current timestamp according to the received two-dimensional code generation request, and if not, verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result.
According to the description, the initial code text is generated according to the current timestamp and the user identification, the initial code text is encrypted to generate the final code text, the universal two-dimensional code is generated according to the final code text, the universal two-dimensional code is used as a code to be passed, the two-dimensional code technical standards of various application platforms are unified, when verification is performed, if the difference value between the request time and the current timestamp exceeds a preset value, the universal two-dimensional code is overdue, the universal two-dimensional code needs to be refreshed, namely, the step of generating the universal two-dimensional code is returned to be executed, and the passing safety of the code is ensured.
Further, the verification request comprises the encrypted universal two-dimension code;
the verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request, and obtaining a verification result comprises:
decrypting the encrypted universal two-dimensional code to obtain the universal two-dimensional code and a target industry identifier;
decoding the general two-dimensional code to obtain a target user identifier;
acquiring target user information from the user identification in the two-dimensional code application data model and the incidence relation according to the target user identification;
acquiring a verification standard corresponding to the target industry identifier;
comparing the verification standard with the target user information to obtain a comparison result;
and packaging the comparison result and the target user information to obtain a verification result.
According to the description, when the two-dimensional code is verified, the encrypted general two-dimensional code is decrypted to obtain the general two-dimensional code and the target industry identification, the general two-dimensional code is decoded to obtain the target user identification, the target user information is obtained from the user identification and the incidence relation in the two-dimensional code application data model according to the target user identification, the verification standard corresponding to the target industry identification is obtained, the verification standard is compared with the target user information, the verification result is packaged with the target user information according to the comparison result, the industry to which the industry application belongs can be determined according to the target industry identification, the target user identification is used for determining the user to which the general two-dimensional code belongs, the target user information can be conveniently obtained from the two-dimensional code application data model, data sharing and intercommunication among various application platforms are achieved, and finally the verification standard is compared with the target user information, and reliable two-dimensional code verification is achieved.
Further, when the encrypted universal two-dimensional code is decrypted, code segment information is also obtained;
the returning the verification result to the preset industry application corresponding to the verification request comprises:
packaging the verification result and the code segment information to obtain a data packet, and encrypting the data packet to obtain an encrypted data packet;
and returning the encrypted data packet to a preset industry application corresponding to the verification request according to the code segment information.
According to the description, the verification result and the code segment information are packaged to obtain the data packet, the data packet is encrypted to obtain the encrypted data packet, the encrypted data packet can be accurately returned to the corresponding preset industry for application according to the code segment information, the security of the verification result and the code segment information in the data packet can be ensured through encryption operation, and therefore safe and reliable one-code passing is achieved under the multi-service application scene.
The one-code passing method and the terminal of the present invention can be applied to an application platform that needs to use a two-dimensional code for communication, and are described below by specific embodiments:
example one
Referring to fig. 1, 3-5, a code passing method of the present embodiment includes:
s1, constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier, and specifically comprises the following steps:
s11, acquiring code segment information, a user identification, user information corresponding to the user identification and an industry identification of a preset industry application;
the preset industries comprise medical treatment, tourism, transportation, medical and social security, libraries, campuses, fitness, finance, life and the like, the user information comprises user basic information, health information and travel information, as shown in fig. 3, the user basic information comprises names, identification numbers, telephone numbers, sexes and the like, the health information comprises health states, abnormal reasons, data sources and the like, the travel information comprises travel time, travel places, travel routes, high risk areas and the like, the code segment information comprises medical insurance electronic certificates, library access certificates, bus travel codes and the like, the user identifiers are unique identifiers corresponding to the users, and the industry identifiers are unique identifiers corresponding to the preset industries;
the code segment information applied in the preset industry can be acquired through the following modes besides being directly acquired by a one-code platform:
acquiring an application two-dimensional code of a preset industry application, and decoding the application two-dimensional code to obtain code segment information;
the code segment information is used for identifying each preset industry application and comprises service specific attributes of users on different platforms;
for example, one code platform scans and acquires a medical code applied in the medical industry through code scanning equipment, is in butt joint with a corresponding medical platform, and decodes the medical code to obtain code segment information;
s12, correlating the code segment information, the user information and the industry identification to obtain a correlation relationship;
s13, constructing a two-dimensional code application data model according to the user identification and the incidence relation;
the two-dimensional code application data model is a two-dimensional table structure;
s2, acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identifier, as shown in FIG. 4, specifically including:
s21, generating an initial code text according to the current timestamp and the user identification;
s22, encrypting the initial code text to generate a final code text;
s23, generating a universal two-dimensional code according to the final code text;
specifically, when a user needs to use two-dimensional code communication, a one-code platform is opened, a two-dimensional code generation request is automatically generated, the one-code platform acquires a current timestamp according to the received two-dimensional code generation request, and an initial code text is generated according to the current timestamp and the user identification; encrypting the initial code text to generate a final code text; generating a universal two-dimensional code according to the final code text;
as shown in fig. 5, scanning the universal two-dimensional code offline by a code scanning device (such as a code scanning gun), sending a code text request to a preset industry application corresponding to the code scanning device by the code scanning device, recombining the universal two-dimensional code by using a target industry identifier and code segment information corresponding to the preset industry application after the preset industry application receives the universal two-dimensional code, generating a recombined universal two-dimensional code, and encrypting the recombined universal two-dimensional code to obtain the encrypted universal two-dimensional code; the preset industry application generates a verification request according to the encrypted universal two-dimensional code and sends the verification request to a one-code platform;
s3, verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request, as shown in FIG. 5, specifically comprising:
s31, acquiring request time corresponding to the received verification request;
s32, judging whether the difference value between the request time and the current timestamp exceeds a preset value, if so, returning to execute the step S2, and if not, executing S33;
the preset value can be flexibly set according to actual conditions, and in the embodiment, the preset value is 10 minutes;
specifically, whether the difference between the request time and the current timestamp exceeds 10 minutes is judged, if yes, the step S2 is returned to be executed, and if not, the step S33 is executed;
s33, verifying the universal two-dimension code based on the two-dimension code application data model according to the received verification request to obtain a verification result;
wherein the verification request comprises the encrypted universal two-dimensional code;
specifically, verifying the universal two-dimensional code based on the user identifier and the association relationship in the two-dimensional code application data model according to the received verification request to obtain a verification result, specifically including:
s331, decrypting the encrypted universal two-dimensional code to obtain the universal two-dimensional code and a target industry identifier;
specifically, when the encrypted universal two-dimensional code is decrypted, code segment information is also obtained;
in an optional implementation manner, the preset industry application sends the verification request to a one-code-pass platform, that is, one-time calling of the preset industry application to the one-code-pass platform is completed, and after the one-code-pass platform is decrypted, a call log generated by a call record of this time is stored in a platform database, as shown in fig. 5, so that the calling and checking are facilitated;
s332, decoding the universal two-dimensional code to obtain a target user identifier;
s333, acquiring target user information from the user identification and the incidence relation in the two-dimensional code application data model according to the target user identification;
s334, obtaining a verification standard corresponding to the target industry identification;
s335, comparing the verification standard with the target user information to obtain a comparison result;
s336, packing the comparison result and the target user information to obtain a verification result;
for example, the one-code platform obtains health information and travel information from a user identifier and an association relation in a two-dimensional code application data model through a target user identifier, and obtains a verification standard corresponding to a target industry identifier, assuming that the verification standard is as follows: (1) entering and exiting the high-risk areas without passing; (2) no vaccine is inoculated, and no passing is performed; (3) The user does not enter or exit the high-risk area, the health data are normal, and the user is allowed to pass; comparing the verification standard with the health information and the travel information to obtain a comparison result, and packaging the verification standard and the health information according to the comparison result and the verification standard to form a data packet to obtain a verification result;
in an optional implementation manner, the one-code platform puts the verification result in a library, as shown in fig. 5, which is convenient for calling and checking;
s34, returning the verification result to a preset industry application corresponding to the verification request;
specifically, the verification result and the code segment information are packaged to obtain a data packet, and the data packet is encrypted to obtain an encrypted data packet;
returning the encrypted data packet to a preset industry application corresponding to the verification request according to the code segment information;
in an alternative embodiment, the whole authentication process can be encrypted by using an SSL (Secure socket layer) digital certificate, so as to ensure the security of one-code passage;
as shown in fig. 5, after receiving the encrypted data packet, the preset industry application decrypts the encrypted data packet to obtain target user information, a comparison result, and code segment information, which are used to determine whether the user is passing or going to handle a service, for example, a user with normal health information and travel information, and enters an application system to handle a service, such as ticket buying, reading, medicine buying, etc., according to service specific attributes of the user on different platforms in the target user information and the code segment information of the user.
Example two
Referring to fig. 2, a code passing terminal includes a memory, a processor, and a computer program stored in the memory and running on the processor, and the processor executes the computer program to implement the steps of the code passing method in the first embodiment or the second embodiment.
In summary, according to the one-code passing method and the terminal provided by the present invention, code segment information, a user identifier, user information corresponding to the user identifier, and an industry identifier of a preset industry application are obtained; correlating the code segment information, the user information and the industry identification to obtain an incidence relation; a two-dimensional code application data model is built according to the user identification and the association relation, so that multi-code data can be conveniently stored in the two-dimensional code application data model in an associated manner, main data is real and accurate, the two-dimensional code application data model comprises two-dimensional code related information of multi-service application, and sharing of multi-application data is guaranteed; acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification; the method comprises the steps of verifying the universal two-dimensional code based on the two-dimensional code application data model according to a received verification request to obtain a verification result, packaging the verification result and code segment information, encrypting the data packet when returning the packaged data packet to a preset industry application corresponding to the verification request, and accurately returning the encrypted data packet to the corresponding preset industry application according to the code segment information.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for passing a code, comprising:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request;
the constructing of the two-dimensional code application data model comprises the following steps:
acquiring code segment information, user identification, user information corresponding to the user identification and industry identification of a preset industry application;
correlating the code segment information, the user information and the industry identification to obtain an incidence relation;
constructing a two-dimensional code application data model according to the user identification and the incidence relation;
the verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request, and obtaining a verification result comprises the following steps:
and verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request to obtain a verification result.
2. The one-code passing method according to claim 1, wherein the generating a universal two-dimensional code according to the current timestamp and the user identifier comprises:
generating an initial code text according to the current timestamp and the user identifier;
encrypting the initial code text to generate a final code text;
generating a universal two-dimensional code according to the final code text;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
acquiring request time corresponding to the received verification request;
and judging whether the difference value between the request time and the current timestamp exceeds a preset value, if so, returning to the step of executing the step of acquiring the current timestamp according to the received two-dimensional code generation request, and if not, verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result.
3. The one-code passage method according to claim 1, wherein the authentication request includes the encrypted universal two-dimensional code;
the step of verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request comprises the following steps of:
decrypting the encrypted universal two-dimensional code to obtain the universal two-dimensional code and a target industry identifier;
decoding the general two-dimensional code to obtain a target user identifier;
acquiring target user information from the user identification and the incidence relation in the two-dimensional code application data model according to the target user identification;
acquiring a verification standard corresponding to the target industry identifier;
comparing the verification standard with the target user information to obtain a comparison result;
and packaging the comparison result and the target user information to obtain a verification result.
4. The one-code passing method according to claim 3, wherein when decrypting the encrypted universal two-dimensional code, code segment information is also obtained;
the step of returning the verification result to the preset industry application corresponding to the verification request comprises the following steps:
packaging the verification result and the code segment information to obtain a data packet, and encrypting the data packet to obtain an encrypted data packet;
and returning the encrypted data packet to a preset industry application corresponding to the verification request according to the code segment information.
5. A code-passing terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program performs the steps of:
constructing a two-dimensional code application data model, wherein the two-dimensional code application data model comprises a user identifier;
acquiring a current timestamp according to a received two-dimension code generation request, and generating a universal two-dimension code according to the current timestamp and the user identification;
verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result, and returning the verification result to a preset industry application corresponding to the verification request;
the constructing of the two-dimensional code application data model comprises the following steps:
acquiring code segment information, user identification, user information corresponding to the user identification and industry identification of a preset industry application;
correlating the code segment information, the user information and the industry identification to obtain an association relation;
constructing a two-dimensional code application data model according to the user identification and the incidence relation;
the verifying the general two-dimension code based on the two-dimension code application data model according to the received verification request, and obtaining a verification result comprises:
and verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request to obtain a verification result.
6. The one-code pass terminal of claim 5, wherein the generating a universal two-dimensional code according to the current timestamp and the user identifier comprises:
generating an initial code text according to the current timestamp and the user identifier;
encrypting the initial code text to generate a final code text;
generating a universal two-dimensional code according to the final code text;
the verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request, and obtaining a verification result comprises the following steps:
acquiring request time corresponding to a received verification request;
and judging whether the difference value between the request time and the current timestamp exceeds a preset value, if so, returning to the step of executing the step of acquiring the current timestamp according to the received two-dimensional code generation request, and if not, verifying the universal two-dimensional code based on the two-dimensional code application data model according to the received verification request to obtain a verification result.
7. The one-code-pass terminal according to claim 5, wherein the authentication request includes the encrypted universal two-dimensional code;
the verifying the universal two-dimensional code based on the user identification and the association relation in the two-dimensional code application data model according to the received verification request, and obtaining a verification result comprises:
decrypting the encrypted universal two-dimensional code to obtain the universal two-dimensional code and a target industry identifier;
decoding the general two-dimensional code to obtain a target user identifier;
acquiring target user information from the user identification in the two-dimensional code application data model and the incidence relation according to the target user identification;
acquiring a verification standard corresponding to the target industry identifier;
comparing the verification standard with the target user information to obtain a comparison result;
and packaging the comparison result and the target user information to obtain a verification result.
8. The one-code pass terminal according to claim 7, wherein when decrypting the encrypted universal two-dimensional code, code segment information is also obtained;
the returning the verification result to the preset industry application corresponding to the verification request comprises:
packaging the verification result and the code segment information to obtain a data packet, and encrypting the data packet to obtain an encrypted data packet;
and returning the encrypted data packet to a preset industry application corresponding to the verification request according to the code segment information.
CN202111596480.9A 2021-12-24 2021-12-24 One-code passing method and terminal Active CN114444860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111596480.9A CN114444860B (en) 2021-12-24 2021-12-24 One-code passing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111596480.9A CN114444860B (en) 2021-12-24 2021-12-24 One-code passing method and terminal

Publications (2)

Publication Number Publication Date
CN114444860A CN114444860A (en) 2022-05-06
CN114444860B true CN114444860B (en) 2023-04-18

Family

ID=81363355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111596480.9A Active CN114444860B (en) 2021-12-24 2021-12-24 One-code passing method and terminal

Country Status (1)

Country Link
CN (1) CN114444860B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014075566A1 (en) * 2012-11-16 2014-05-22 腾讯科技(深圳)有限公司 Sensitive operation verification method, terminal device, server and verification system
CN104299140A (en) * 2014-09-12 2015-01-21 广州市坚真信息科技有限公司 Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce
WO2015165423A1 (en) * 2014-04-30 2015-11-05 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
WO2020108118A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Methods and devices for providing and authenticating two-dimensional code

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7624278B2 (en) * 2004-09-10 2009-11-24 At&T Intellectual Property I, L.P. Resetting access account passwords of a multitude of compartmentalized systems
CN108959990B (en) * 2017-05-23 2021-08-06 中国移动通信有限公司研究院 Two-dimensional code verification method and device
CN110298421B (en) * 2019-06-26 2023-11-03 云宝宝大数据产业发展有限责任公司 Online generation, offline generation and verification method and device for two-dimensional code
CN112308187A (en) * 2020-10-30 2021-02-02 万达信息股份有限公司 Multi-code fusion realization method, fusion application code use method and system
CN112364333B (en) * 2020-11-30 2023-10-24 中国银行股份有限公司 Method and system for providing service by using two-dimension code and code communication platform
CN113011864B (en) * 2021-03-22 2022-12-16 支付宝(杭州)信息技术有限公司 Two-dimensional code generation and verification method, device, equipment and readable medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014075566A1 (en) * 2012-11-16 2014-05-22 腾讯科技(深圳)有限公司 Sensitive operation verification method, terminal device, server and verification system
WO2015165423A1 (en) * 2014-04-30 2015-11-05 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
CN104299140A (en) * 2014-09-12 2015-01-21 广州市坚真信息科技有限公司 Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce
WO2020108118A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Methods and devices for providing and authenticating two-dimensional code

Also Published As

Publication number Publication date
CN114444860A (en) 2022-05-06

Similar Documents

Publication Publication Date Title
CN110377239B (en) Data signature method, device, server, system and storage medium
CN109409122B (en) File storage method, electronic device and storage medium
CN110555029B (en) Ticket management method, device and storage medium based on block chain
CN105554032B (en) A kind of identity real name verification method and verification system for posting part based on express delivery
TWI796675B (en) Blockchain-based identity verification method and related hardware
CN105871786B (en) A kind of verification method of user information, device and system
CN104715187A (en) Method and apparatus used for authenticating nodes of electronic communication system
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN106059760B (en) A kind of cryptographic system from user terminal crypto module calling system private key
CN111651794A (en) Alliance chain-based electronic data management method and device and storage medium
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN108985409B (en) Identity card information reading method and device and electronic equipment
CN109242666A (en) Personal reference method, apparatus and computer equipment are obtained based on block chain
CN105553667A (en) Dynamic password generating method
CN108805574B (en) Transaction method and system based on privacy protection
CN113946877A (en) Data security calculation method, system, computer equipment, storage medium and terminal
CN111489164A (en) Electric power transaction method and device based on Internet of things identification and block chain and electronic equipment
CN112861102A (en) Block chain-based electronic file processing method and system
CN116992458A (en) Programmable data processing method and system based on trusted execution environment
WO2022042745A1 (en) Key management method and apparatus
CN114826604A (en) Applet login verification method, device and equipment based on face recognition and storage medium
CN111770081B (en) Role authentication-based big data confidential file access method
CN114444860B (en) One-code passing method and terminal
CN112687363A (en) Health code public service method and platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant