CN102118710A - System and method for transmitting data between mobile terminals - Google Patents

System and method for transmitting data between mobile terminals Download PDF

Info

Publication number
CN102118710A
CN102118710A CN2011100544172A CN201110054417A CN102118710A CN 102118710 A CN102118710 A CN 102118710A CN 2011100544172 A CN2011100544172 A CN 2011100544172A CN 201110054417 A CN201110054417 A CN 201110054417A CN 102118710 A CN102118710 A CN 102118710A
Authority
CN
China
Prior art keywords
data
mobile phone
phone terminal
session
dimension code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100544172A
Other languages
Chinese (zh)
Inventor
金锡丹
程序
宋宇锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI HONGSONG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI HONGSONG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI HONGSONG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI HONGSONG INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011100544172A priority Critical patent/CN102118710A/en
Publication of CN102118710A publication Critical patent/CN102118710A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a system for transmitting data between mobile terminals, comprising mobile terminals and a server. The invention also provides a method for transmitting data between mobile terminals by using the system, which comprises the following steps: RSA (Ron Rivest, Adi Shamir and Len Adleman) asymmetric cryptography and 3DES (Triple Data Encryption Algorithm) symmetric cryptography are used for compressing and transferring data into two-dimension codes in the mobile terminals, and the two-dimension codes are transmitted to a data receiving party, and then the mobile terminal of the data receiving party deciphers the original data through a private key, and tests the data through a public key. By skillfully combining the RSA asymmetric cryptography and the 3DES symmetric cryptography, the safe application of the two-dimension codes in mobiles is ensured and uniqueness and timeliness of the two-dimension codes are initiated so that electronic payment is safely and efficiently realized on the mobile phone through the two-dimension codes.

Description

Data transmission system and transmission method thereof between the mobile phone terminal
Technical field
The present invention relates to the two-dimension code field, data transmission system and transmission method thereof between particularly a kind of mobile phone terminal.
Background technology
Two-dimension code also is called two-dimensional bar code (two-dimensional bar code), is to arrange moulding with some specific geometric figure on two dimensional surface (commonly chequered with black and white figure) according to certain rule, comes the record data symbolic information.The mode of this record, be some principles of having utilized computer, combine cleverly with this principle, " 0 ", the bit stream of " 1 " that make things convenient for these pictorial informations can be converted into computer to discern, thus can convey a message to computer easily.
Mobile phone two-dimension code is that planar bar code technology is the most perfect in conjunction with product, and is still limited according to the security capabilities of the definition of two-dimension code own, is decrypted easily and duplicates, and especially do not possess non repudiation, and the range of application of having placed restrictions on mobile phone two-dimension code further enlarges.
Use based on mobile phone two-dimension code at present and be applied to pay by mails receipt basically, be that present mobile communication technology and two-dimension code coding techniques are combined, the content of traditional voucher and holder's information coding are become a two-dimension code figure, and be sent to by modes such as note, multimedia messages on user's the mobile phone, the two-dimension code figure that shows on the mobile phone is distinguished the characteristics of verifying its maximum is uniqueness and fail safe to the decoding apparatus of reading by special use, not only saved cost, the more important thing is saves time raises the efficiency, makes things convenient for use and environmental protection and fashion.Pay the receipt technology by mails and be widely used in electronic payment certificate and electronic certificate class voucher two big business fields, as various electronic bills, evidence, as electronic ticket (film ticket,, plane ticket or the like), electronic coupons, electronics delivery of cargo certificate, accumulated point exchanging voucher or the like.Defective such as the present invention overcomes two-dimension code transreplication in the prior art, poor stability, can not authenticate, data transmission system and transmission method thereof between a kind of mobile phone terminal are provided, utilize the exchanges data of carrying out of two-dimension code, by authentication, encryption, signature, the fail safe that improves mobile phone two-dimension code.Utilize exchanges data realization E-Payment between the mobile phone, and do not need the special-purpose decoding apparatus of reading.
Summary of the invention
The purpose of this invention is to provide data transmission system and transmission method thereof between a kind of mobile phone terminal, realize that cell-phone customer terminal utilizes two-dimension code to carry out exchanges data safely and efficiently.
The invention provides data transmission system between a kind of mobile phone terminal, comprise mobile phone terminal and server;
Wherein, mobile phone terminal comprises:
Memory module, in order to storing unsymmetrical key to, symmetric encipherment algorithm, and rivest, shamir, adelman;
The random key module is stabbed in order to generate session key and Session Time at random;
Whether data processing module is encrypted in order to data to be sent, session key and Session Time are stabbed, maybe the enciphered data that receives is decrypted, and examines described Session Time and stab effective;
Data generation module is in order to generate two-dimension code;
Data identification module is in order to the identification and the described two-dimension code that reduces;
Wherein, server comprises:
Memory module is in order to store unsymmetrical key to, symmetric encipherment algorithm and rivest, shamir, adelman;
Adopt mobile network or the Internet to carry out transfer of data between mobile phone terminal and the described server.
Wherein, unsymmetrical key is to comprising PKI and private key.
Wherein, symmetric encipherment algorithm is the 3DES cryptographic algorithm, and rivest, shamir, adelman is a RSA cryptographic algorithms.
The present invention also provides the transmission method of data transmission system between a kind of mobile phone terminal, may further comprise the steps:
Step 1: in data receiver and data receiver's mobile phone terminal, it is right to generate unsymmetrical key respectively, and the PKI of unsymmetrical key centering is sent to the other side's mobile phone terminal in the mode of two-dimension code;
Step 2: in the mobile phone terminal of data receiver, the random key module generates session key at random and Session Time stabs;
Step 3: data processing module is encrypted as the data ciphertext with data to be sent with session key and symmetric encipherment algorithm;
Step 4: data processing module is done signature with the private key of data receiver to the Session Time stamp;
Step 5: data processing module is encrypted as the session ciphertext with PKI and the rivest, shamir, adelman that session key and Session Time stab with the data receiver;
Step 6: the mobile phone terminal that data ciphertext, session ciphertext and signature is sent to the data receiver in the mode of two-dimension code;
Step 7: in data receiver's mobile phone terminal, data processing module is deciphered the session ciphertext that receives with data receiver's private key, obtain session key and Session Time and stab;
Step 8: data processing module confirms that with the PKI of data receiver the current sessions timestamp is effective;
Step 9: data processing module obtains described data to be sent with the data ciphertext that the session key deciphering receives.
In step 2, the random key module generates 24 session keys at random according to the pre-defined algorithm of the mobile phone sequence number of the mobile phone terminal of the system time of server and data receiver.
Wherein, the sending method of two-dimension code may further comprise the steps in the step 1:
Step 1: in the mobile phone terminal of data receiver, be that unit is converted to a yard word sequence with the byte sequence of two 16 systems with data to be sent;
Step 2: in the trailing zero of sign indicating number word sequence, the length of feasible sign indicating number word sequence is 6 multiple, with sign indicating number speech 924 lock code word sequences;
Step 3: the sign indicating number word sequence after will locking generates two-dimension code according to the two-dimension code create-rule, and sends to data receiver's mobile phone terminal;
Step 4: data receiver's mobile phone terminal is by the two-dimension code identification software, and identification receives two-dimension code;
Step 5: obtain the sign indicating number word sequence and zero-suppress with the described two-dimension code of sign indicating number speech 924 releases;
Step 6: the sign indicating number word sequence after will zero-suppressing is converted to byte sequence, obtains the data that data receiver sends.
In the step 3, two-dimension code is to send by bluetooth, mode infrared, multimedia message.
Wherein, the two-dimension code create-rule is a PDF417 two-dimension code create-rule.
Data transmission system between mobile phone terminal of the present invention and transmission method thereof, it adopts non-title cryptographic algorithm of RSA and 3DES symmetric encipherment algorithm, utilize the session key, timestamp and the 3DES symmetric encipherment algorithm that produce at random to encrypt initial data, utilize the PKI and the RSA rivest, shamir, adelman encrypted session key of opposite end, to be sent to the opposite end through two parts data of encrypting, the opposite end utilizes private key to decrypt session key more successively, decrypts the validity of initial data and proving time stamp again with session key.The present invention combines 3DES symmetric encipherment algorithm, RSA rivest, shamir, adelman cleverly with the PDF417 two-dimensional bar code, and it is effective to be limited in the active session time period data interaction, not only guaranteed based on two-dimensional bar code validity, non repudiation, and started and utilized two-dimensional bar code to carry out the mutual method of data in mobile phone, make mobile phone terminal carry out exchanges data safely and efficiently, realized the possibility that two-dimensional bar code is particularly paid by mails based on the mobile phone terminal client by methods such as bluetooth, infrared, multimedia messages.
Description of drawings
Fig. 1 is the structural representation of the data transmission system between mobile phone terminal of the present invention;
Fig. 2 is the flow chart of the transmission method of the data transmission system between mobile phone terminal of the present invention;
Fig. 3 be in the transmission method of the data transmission system between mobile phone terminal of the present invention mobile phone terminal generate unsymmetrical key to and obtain the schematic diagram of the other side's PKI;
Fig. 4 is the schematic diagram of data receiver ciphering process in the transmission method of the data transmission system between mobile phone terminal of the present invention;
Fig. 5 is the schematic diagram of data receiver's decrypting process in the transmission method of the data transmission system between mobile phone terminal of the present invention;
Fig. 6 is the workflow diagram of data receiver in the method that sends two-dimension code in the transmission method of the data transmission system between mobile phone terminal of the present invention;
Fig. 7 is the workflow diagram that sends data receiver in the method for two-dimension code in the transmission method of the data transmission system between mobile phone terminal of the present invention.
Embodiment
Further elaborate the present invention below in conjunction with drawings and Examples.Following examples are not limitation of the present invention.Under the spirit and scope that do not deviate from inventive concept, variation and advantage that those skilled in the art can expect all are included among the present invention.
Fig. 1 is the structural representation of the data transmission system between mobile phone terminal of the present invention.As shown in Figure 1, the data transmission system between mobile phone terminal of the present invention comprises the mobile phone terminal A of data receiver, data receiver's mobile phone terminal B and server.Adopt mobile network or the Internet to carry out transfer of data between mobile phone terminal and the server.
Data receiver and data receiver's mobile phone terminal includes memory module, random key module, data processing module, data generation module, data identification module.
Wherein, the storage module stores unsymmetrical key is to, symmetric encipherment algorithm, rivest, shamir, adelman; The random key module generates session key at random and Session Time stabs; Data processing module stabs data to be sent, session key and Session Time and encrypts, and maybe the enciphered data that receives is decrypted, and whether the audit Session Time stabs effective; Data generation module generates two-dimension code; Data identification module identification and reduction two-dimension code.
Fig. 2 is the flow chart of the transmission method of the data transmission system between mobile phone terminal of the present invention.As shown in Figure 2, the transmission method of the data transmission system between mobile phone terminal of the present invention may further comprise the steps:
Step 1: as shown in Figure 3, it is right that mobile phone terminal A, B generate unsymmetrical key respectively, comprises PKI and private key, and PKI is sent to the other side's mobile phone terminal in the mode of two-dimension code, and promptly mobile phone terminal A obtains PKI B, and mobile phone terminal B obtains PKI A.
Step 2: the random key module of mobile phone terminal A generates session key at random and Session Time stabs;
Step 3: Fig. 4 is the schematic diagram of ciphering process.As shown in Figure 3, the data processing module of mobile phone terminal A is encrypted as data ciphertext 1 with data to be sent with session key and symmetric encipherment algorithm;
Step 4: data processing module is done signature with the private key A of data receiver to the Session Time stamp;
Step 5: data processing module utilizes data receiver's PKI B and rivest, shamir, adelman to be encrypted as session ciphertext 2 session key and Session Time stamp;
Step 6: mobile phone terminal A is sent to mobile phone terminal B with data ciphertext 1, session ciphertext 2, signature in the mode of two-dimension code;
Step 7: Fig. 5 is the schematic diagram of decrypting process.As shown in Figure 5, the data processing module of mobile phone terminal B is used the private key B of oneself to decipher the session ciphertext 2 that receives and is obtained session key and Session Time stamp;
Step 8: data processing module verifies with the PKI A of mobile phone terminal A whether the signature that its Session Time stabs is effective, stabs under effective situation at Session Time, and whether the difference of comparing current time and session timestamp again is in effective time;
Step 9: if the difference of current time and session timestamp whether in effective time, data processing module obtains the data that mobile phone terminal A sends with the session ciphertext 1 that the session key deciphering receives.If not at active session within the time period, then data processing module assert that data are invalid, and it is overtime to call time.
Among the present invention, data receiver can be sent to the data receiver with two-dimension code by modes such as bluetooth, infrared, multimedia messages.When two mobile terminal of mobile telephone carry out aspectant exchanges data in the above described manner in low coverage.
In the present embodiment, data receiver is that the symmetric encipherment algorithm that mobile phone terminal A uses is the 3DES cryptographic algorithm, and the rivest, shamir, adelman that uses is RSA cryptographic algorithms.Because rivest, shamir, adelman (RSA cryptographic algorithms) operation efficiency when the encryption and decryption data is lower, and symmetric encipherment algorithm (3DES cryptographic algorithm) operation efficiency when the encryption and decryption data is higher, so being data to be sent, the scheme that present embodiment is taked encrypts with session key and symmetric encipherment algorithm, and session key comes encryption and decryption with rivest, shamir, adelman, because session key of a rivest, shamir, adelman encryption and decryption and do signature is so the efficient of its data operation is higher.
Symmetric encipherment algorithm is the cryptographic algorithm of using early, technology maturation.In symmetric encipherment algorithm, data receiver after promptly plaintext and key are handled through special cryptographic algorithm together, makes data to be sent it become complicated encryption ciphertext and sends.After the data receiver receives ciphertext,, then need to use to encrypt ciphertext is decrypted, just can make it revert to readable plaintext with the key of crossing and the algorithm for inversion of identical algorithms if want to understand original text.In symmetric encipherment algorithm, the key of use has only one, and data receiver and data receiver both sides use this key that data are carried out encryption and decryption, and this will find the solution close side must know encryption key in advance.Symmetric encipherment algorithm has several so far, comprises the 3DES symmetric encipherment algorithm, and it is a kind of pattern of des encryption algorithm, and it uses 3 56 key that data are carried out three encryptions.It is basic module with DES, designs block encryption algorithm by the combination group technology, and it is implemented as follows:
If Ek () and Dk () represent the encryption and decryption process of DES algorithm, the key that on behalf of the DES algorithm, K use, P are represented expressly, and C represents Mi Biao, like this,
The 3DES ciphering process is: C=Ek3 (Dk2 (Ek1 (P)))
The 3DES decrypting process is: P=Dk1 ((EK2 (Dk3 (C)))
K1, K2, K3 have determined the fail safe of algorithm, if three keys are different, in essence with regard to be equivalent to one long be that 168 key is encrypted.For many years, it is comparison safety when tackling heavy attack.If data are so not high to security requirement, K1 can equal K3.In this case, the effective length of key is 112.
Many fields use such as rivest, shamir, adelman is on the present network, banking system are cryptographic algorithm very widely.This algorithm was in the ronal rivest by the mit of Massachusetts Institute Technology (massachusetts institute of technology) in 1977, adi shamir and len adleman3 position young professor propose, and with 3 people's surname rivest, shamir and adlernan called after RSA algorithm.This algorithm has utilized and has closed number in the number theory field and can't efficiently be decomposed into two fixedly theoretical principles of prime number.The RSA algorithm need not participate in ciphering process by receiving-transmitting sides simultaneously, and is very suitable for the encryption of e-commerce system.
1) key generates.
If m wants information encrypted, optional two big prime number p and q; Select positive integer e, make that e and ψ (n)=(p-1) (q-1) is relatively prime.
Utilize division algorithm, calculate d, make ed mod ψ (n)=1, i.e. ed=k ψ (n)+1, wherein k is a certain positive integer.
Public keys is that (e n), does not wherein comprise any factor p and q about n
Information.
Private key is that (d, n), wherein d is implied with the information of factor p and q.
2) ciphering process.Use formula ci=mi^e (mod n) (a) plaintext m to be encrypted, get ciphertext c.
3) decrypting process.Use (d n) is decrypted ciphertext c, and computational process is:
cd?mod?n?=?(me?mod?n)d?mod?n
=?med?mod?n
=?m(kψ(n)?+?1)?mod?n
=?(mkψ(n)?mod?n)·(m?mo?d?n)
=?m
M is and recovers the plaintext of coming out from ciphertext c.
Data receiver produces 24 session keys at random according to the pre-defined algorithm of the mobile phone sequence number (IMEI) of the system time of server and data receiver mobile phone terminal.The implementation procedure that generates session key at random is described below:
1) according to system time and mobile phone sequence number (IMEI) design random number seed sr;
If sr=hour*k1+min*k2+sec*k3
(k1, k2, k3 are respectively the 9th to the 15th each two of mobile phone sequence numbers; Hour when min, sec get respectively, divides second respective value).
2) because session key is 24, design a for circulation, cycle-index is 24, each circulation primary generates a session key;
3) implementation procedure of loop body:
A) utilize initializer srand () the initialization random number seed of random number generator, make it to become big prime number;
B) utilize rand () to generate random number, require random number all to be not less than 0;
C) random number that generates being converted to the string type, to put into length be 20 char type array, and get the i-1 position (i represents cycle-index) of the character of highest order as 24 session keys.
The method that sends two-dimension code in the transmission method of the data transmission system between mobile phone terminal of the present invention comprises the transmission part of data receiver and data receiver's receiving unit.
Fig. 6 is the workflow diagram of data receiver in the method that sends two-dimension code in the transmission method of the data transmission system between mobile phone terminal of the present invention.Fig. 6 is the workflow diagram of data receiver in the method that sends two-dimension code in the transmission method of the data transmission system between mobile phone terminal of the present invention.
Shown in Fig. 6,7, the method that sends two-dimension code may further comprise the steps:
Step 1: the mobile phone terminal of data receiver is that unit is converted to a yard word sequence with data to be sent with the byte sequence of two 16 systems;
Step 2: in the trailing zero of sign indicating number word sequence, make that the length of sign indicating number word sequence is 6 multiple, and with yard speech 924 lock code word sequences;
Step 3: the sign indicating number word sequence after will locking generates the PDF417 two-dimension code according to PDF41 two-dimension code create-rule, and the PDF417 two-dimension code is sent to data receiver's mobile phone terminal;
Step 4: data receiver's mobile phone terminal is discerned the two-dimension code that receives by the two-dimension code identification software;
Step 5: with sign indicating number speech 924 release two-dimension codes, acquisition sign indicating number word sequence also zero-suppresses.
Step 6: the sign indicating number word sequence after will zero-suppressing is converted to byte sequence, obtains the data that data receiver sends.
Being preferred embodiment of the present invention only in sum, is not to be used for limiting practical range of the present invention.Be that all equivalences of doing according to the content of the present patent application claim change and modification, all should belong to technology category of the present invention.

Claims (8)

1. data transmission system between the mobile phone terminal is characterized in that, comprises mobile phone terminal, server;
Wherein, described mobile phone terminal comprises:
Memory module, in order to storing unsymmetrical key to, symmetric encipherment algorithm, and rivest, shamir, adelman;
The random key module is stabbed in order to generate session key and Session Time at random;
Whether data processing module is encrypted in order to data to be sent, session key and Session Time are stabbed, maybe the enciphered data that receives is decrypted, and examines described Session Time and stab effective;
Data generation module is in order to generate two-dimension code;
Data identification module is in order to the identification and the described two-dimension code that reduces;
Wherein, described server comprises:
Memory module is in order to store unsymmetrical key to, symmetric encipherment algorithm and rivest, shamir, adelman;
Adopt mobile network or the Internet to carry out transfer of data between described mobile phone terminal and the described server.
2. data transmission system between the mobile phone terminal as claimed in claim 1 is characterized in that, described unsymmetrical key is to comprising PKI and private key.
3. data transmission system between the mobile phone terminal as claimed in claim 1 is characterized in that, described symmetric encipherment algorithm is the 3DES cryptographic algorithm, and rivest, shamir, adelman is a RSA cryptographic algorithms.
4. the transmission method of data transmission system between the mobile phone terminal according to claim 1 may further comprise the steps:
Step 1: in data receiver and data receiver's mobile phone terminal, it is right to generate unsymmetrical key respectively, and the PKI of unsymmetrical key centering is sent to the other side's mobile phone terminal in the mode of two-dimension code;
Step 2: in the mobile phone terminal of described data receiver, the random key module generates session key at random and Session Time stabs;
Step 3: described data processing module is encrypted as data ciphertext (1) with data to be sent with described session key and symmetric encipherment algorithm;
Step 4: described data processing module is done signature with the private key of described data receiver to the Session Time stamp;
Step 5: described data processing module is encrypted as session ciphertext (2) with PKI and the rivest, shamir, adelman that described session key and Session Time stab with described data receiver;
Step 6: the mobile phone terminal that described data ciphertext (1), described session ciphertext (2) and described signature is sent to the data receiver in the mode of two-dimension code;
Step 7: in described data receiver's mobile phone terminal, the described session ciphertext (2) that described data processing module will receive obtains described session key and Session Time and stabs with data receiver's private key deciphering;
Step 8: described data processing module confirms that with the PKI of data receiver the current sessions timestamp is effective;
Step 9: described data processing module obtains described data to be sent with the described data ciphertext (1) that described session key deciphering receives.
5. as the transmission method of data transmission system between the mobile phone terminal as described in the claim 4, it is characterized in that, in the described step 2, described random key module generates 24 session keys at random according to the pre-defined algorithm of the mobile phone sequence number of the mobile phone terminal of the system time of described server and described data receiver.
6. as the transmission method of the data transmission system between mobile phone terminal as described in the claim 4, it is characterized in that the sending method of two-dimension code may further comprise the steps in the described step 1:
Step 1: in the mobile phone terminal of described data receiver, be that unit is converted to a yard word sequence with the byte sequence of two 16 systems with data to be sent;
Step 2: in the trailing zero of described sign indicating number word sequence, the length of feasible sign indicating number word sequence is 6 multiple, with described yard word sequence of sign indicating number speech 924 lockings;
Step 3: the described sign indicating number word sequence after will locking generates two-dimension code according to the two-dimension code create-rule, and sends to described data receiver's mobile phone terminal;
Step 4: described data receiver's mobile phone terminal is by the two-dimension code identification software, and identification receives described two-dimension code;
Step 5: obtain the sign indicating number word sequence and zero-suppress with the described two-dimension code of sign indicating number speech 924 releases;
Step 6: the sign indicating number word sequence after will zero-suppressing is converted to byte sequence, obtains the data that data receiver sends.
7. as the transmission method of data transmission system between the mobile phone terminal as described in the claim 6, it is characterized in that in the described step 3, described two-dimension code is to send by bluetooth, mode infrared, multimedia message.
8. as the transmission method of data transmission system between the mobile phone terminal as described in the claim 6, it is characterized in that described two-dimension code create-rule is a PDF417 two-dimension code create-rule.
CN2011100544172A 2011-03-08 2011-03-08 System and method for transmitting data between mobile terminals Pending CN102118710A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100544172A CN102118710A (en) 2011-03-08 2011-03-08 System and method for transmitting data between mobile terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100544172A CN102118710A (en) 2011-03-08 2011-03-08 System and method for transmitting data between mobile terminals

Publications (1)

Publication Number Publication Date
CN102118710A true CN102118710A (en) 2011-07-06

Family

ID=44217268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100544172A Pending CN102118710A (en) 2011-03-08 2011-03-08 System and method for transmitting data between mobile terminals

Country Status (1)

Country Link
CN (1) CN102118710A (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231883A (en) * 2011-07-11 2011-11-02 上海柯斯软件有限公司 Teledata transmission content encrypting system and method based on RFID (radio frequency identification)-SIM (subscriber identity module) card
CN102664735A (en) * 2012-04-13 2012-09-12 江苏新彩软件有限公司 Implementation method for secure session of mobile phone lottery system based on public key
CN103178964A (en) * 2013-03-05 2013-06-26 中国地质大学(武汉) QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103295127A (en) * 2012-12-14 2013-09-11 上海艾兴智能技术有限公司 Method and system for electronic payment based on two-dimensional code technology
CN103326860A (en) * 2013-06-03 2013-09-25 南京理工大学常熟研究院有限公司 Privacy secrecy system used in intelligent terminals
CN103401679A (en) * 2013-07-18 2013-11-20 湖北楚天传媒网络科技有限责任公司 Method for encrypting and decoding two-dimensional codes
CN103491180A (en) * 2013-09-29 2014-01-01 于慕华 Public service data switching method based on Bluetooth and mobile form-filling system for achieving public service data switching method
CN103514466A (en) * 2012-06-21 2014-01-15 成都芯昊芯科技有限公司 Electronic tag dynamic two-dimension code conversion system and method thereof
CN103544761A (en) * 2012-07-13 2014-01-29 合肥华恒电子科技有限责任公司 Method for realizing network lots drawing
CN103714458A (en) * 2013-12-20 2014-04-09 江苏大学 Two-dimension code-based mobile terminal transaction encryption method
CN103827904A (en) * 2011-07-28 2014-05-28 Upc咨询有限公司 Offline transaction
CN104011754A (en) * 2011-10-04 2014-08-27 奥利弗·C·梅赫勒 Method For Handling Electronic Vouchers
CN104065471A (en) * 2014-07-11 2014-09-24 北京德加才科技有限公司 Data exchange system and data exchange method based on mobile terminals
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
WO2015058658A1 (en) * 2013-10-21 2015-04-30 上海合合信息科技发展有限公司 Text encryption and interaction method, encryption method and apparatus, and decryption method and apparatus
CN104598801A (en) * 2015-01-23 2015-05-06 上海众人科技有限公司 Dynamic two-dimension code generation method based on algorithm reconstruction
CN104602209A (en) * 2015-02-27 2015-05-06 中国科学院大学 Combined information source short message encryption and decryption method based on RSA algorithm and stream cipher algorithm
CN104657765A (en) * 2015-02-13 2015-05-27 立德高科(北京)数码科技有限责任公司 Two-dimension code as well as two-dimension code generating method and generating device
CN104657766A (en) * 2015-02-13 2015-05-27 立德高科(北京)数码科技有限责任公司 Two-dimension code as well as two-dimension code generating method and generating device
WO2015130834A1 (en) * 2014-02-28 2015-09-03 Alibaba Group Holding Limited Establishing communication between devices
CN104955044A (en) * 2015-05-29 2015-09-30 北京奇虎科技有限公司 Target network access method and target network access guiding method thereof and corresponding terminal
CN105007155A (en) * 2015-07-28 2015-10-28 福建联迪商用设备有限公司 Two-dimension code mask encrypting and decrypting method and system
CN105426765A (en) * 2015-07-09 2016-03-23 深圳百云信息技术有限公司 Two-dimensional code dynamic encryption and decryption algorithm
CN105554028A (en) * 2016-01-22 2016-05-04 合肥学院 Method for establishing secure communication channel between mobile handheld devices based on two-dimension code
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN105959785A (en) * 2016-06-29 2016-09-21 微鲸科技有限公司 Multi-screen interaction method and equipment
CN106127275A (en) * 2016-06-23 2016-11-16 福建富士通信息软件有限公司 A kind of coded method of bar code of paying the bill
CN106301777A (en) * 2016-08-03 2017-01-04 国家计算机网络应急技术处理协调中心 Quick Response Code encrypted transmission method and system
CN106453069A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Instant communication message sending, viewing and viewing control method and device thereof
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method
CN106790462A (en) * 2016-12-08 2017-05-31 东软集团股份有限公司 Short sentence transmission method and system, server, transmission client, reception client
CN106897881A (en) * 2017-02-07 2017-06-27 桂林理工大学 On-line payment method with visible ray Yu the two-way public key system certification of bar code
CN106911661A (en) * 2016-09-23 2017-06-30 阿里巴巴集团控股有限公司 A kind of short-message verification method, device, client, server and system
CN107026869A (en) * 2017-05-02 2017-08-08 中江联合(北京)科技有限公司 Without data encryption and transmission method, equipment, system and medium under network environment
CN107204987A (en) * 2017-06-27 2017-09-26 重庆大广宇科技有限公司 A kind of data in mobile phone transmission method
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
WO2018153252A1 (en) * 2017-02-27 2018-08-30 黄贤杰 Electronic device bidirectional matching and authentication system
CN108810022A (en) * 2018-07-18 2018-11-13 郑州云海信息技术有限公司 A kind of encryption method, decryption method and device
CN108809936A (en) * 2018-04-20 2018-11-13 山东大学 A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm
CN109348479A (en) * 2018-11-21 2019-02-15 长沙理工大学 Data communications method, device, equipment and the system of electric power system
CN109344638A (en) * 2018-10-26 2019-02-15 上海点融信息科技有限责任公司 Private key signature method and apparatus for block chain network
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device
CN110808842A (en) * 2019-11-13 2020-02-18 深圳前海智安信息科技有限公司 Mobile phone communication information safety protection method
CN111832056A (en) * 2014-09-28 2020-10-27 伊姆西Ip控股有限责任公司 Method and system for generating two-dimensional code
JP2021513141A (en) * 2018-02-07 2021-05-20 北京三快在線科技有限公司Beijing Sankuai Online Technology Co.,Ltd. Generation and identification of 2D barcodes
CN112990910A (en) * 2020-12-25 2021-06-18 深圳酷派技术有限公司 Two-dimensional code generation method, related device and computer storage medium
CN115150134A (en) * 2022-06-20 2022-10-04 国网山东省电力公司东平县供电公司 Intelligent power grid data encryption transmission method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1819515A (en) * 2006-03-20 2006-08-16 胡祥义 Realizing method of security symmetric coding algorithm
CN1946106A (en) * 2006-10-20 2007-04-11 刘彤 Method and system for obtaining personal information based on radio communication network
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1819515A (en) * 2006-03-20 2006-08-16 胡祥义 Realizing method of security symmetric coding algorithm
CN1946106A (en) * 2006-10-20 2007-04-11 刘彤 Method and system for obtaining personal information based on radio communication network
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴扬等: "二维条形码编码与译码的计算机实现", 《数据采集与处理》 *

Cited By (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231883A (en) * 2011-07-11 2011-11-02 上海柯斯软件有限公司 Teledata transmission content encrypting system and method based on RFID (radio frequency identification)-SIM (subscriber identity module) card
CN103827904A (en) * 2011-07-28 2014-05-28 Upc咨询有限公司 Offline transaction
CN104011754A (en) * 2011-10-04 2014-08-27 奥利弗·C·梅赫勒 Method For Handling Electronic Vouchers
CN102664735A (en) * 2012-04-13 2012-09-12 江苏新彩软件有限公司 Implementation method for secure session of mobile phone lottery system based on public key
CN102664735B (en) * 2012-04-13 2016-01-06 江苏新彩软件有限公司 A kind of cell phone lottery system safety session implementation method based on public keys
CN103514466A (en) * 2012-06-21 2014-01-15 成都芯昊芯科技有限公司 Electronic tag dynamic two-dimension code conversion system and method thereof
CN103544761A (en) * 2012-07-13 2014-01-29 合肥华恒电子科技有限责任公司 Method for realizing network lots drawing
CN103295127A (en) * 2012-12-14 2013-09-11 上海艾兴智能技术有限公司 Method and system for electronic payment based on two-dimensional code technology
CN103178964A (en) * 2013-03-05 2013-06-26 中国地质大学(武汉) QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
WO2014173233A1 (en) * 2013-04-26 2014-10-30 天地融科技股份有限公司 Information processing method and deciphering apparatus
CN103236929B (en) * 2013-04-26 2016-09-14 天地融科技股份有限公司 A kind of information processing method and deciphering device
CN103326860A (en) * 2013-06-03 2013-09-25 南京理工大学常熟研究院有限公司 Privacy secrecy system used in intelligent terminals
CN103401679A (en) * 2013-07-18 2013-11-20 湖北楚天传媒网络科技有限责任公司 Method for encrypting and decoding two-dimensional codes
CN103401679B (en) * 2013-07-18 2015-02-04 湖北荆楚网络科技股份有限公司 Method for encrypting and decoding two-dimensional codes
CN103491180A (en) * 2013-09-29 2014-01-01 于慕华 Public service data switching method based on Bluetooth and mobile form-filling system for achieving public service data switching method
CN103491180B (en) * 2013-09-29 2017-04-05 于慕华 Common service method for interchanging data based on bluetooth and realize that single system is filled out in the movement of the method
WO2015058658A1 (en) * 2013-10-21 2015-04-30 上海合合信息科技发展有限公司 Text encryption and interaction method, encryption method and apparatus, and decryption method and apparatus
CN103714458A (en) * 2013-12-20 2014-04-09 江苏大学 Two-dimension code-based mobile terminal transaction encryption method
CN103714458B (en) * 2013-12-20 2017-03-29 江苏大学 Mobile terminal transaction encryption method based on Quick Response Code
JP2017515319A (en) * 2014-02-28 2017-06-08 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Establish communication between devices
US9538372B2 (en) 2014-02-28 2017-01-03 Alibaba Group Holding Limited Establishing communication between devices
WO2015130834A1 (en) * 2014-02-28 2015-09-03 Alibaba Group Holding Limited Establishing communication between devices
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
CN104065471A (en) * 2014-07-11 2014-09-24 北京德加才科技有限公司 Data exchange system and data exchange method based on mobile terminals
CN111832056A (en) * 2014-09-28 2020-10-27 伊姆西Ip控股有限责任公司 Method and system for generating two-dimensional code
CN111832056B (en) * 2014-09-28 2024-04-26 伊姆西Ip控股有限责任公司 Method and system for generating two-dimensional code
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN104598801A (en) * 2015-01-23 2015-05-06 上海众人科技有限公司 Dynamic two-dimension code generation method based on algorithm reconstruction
CN104598801B (en) * 2015-01-23 2018-09-04 上海众人网络安全技术有限公司 A kind of Dynamic Two-dimensional code generating method based on algorithm reconstruct
CN104657766A (en) * 2015-02-13 2015-05-27 立德高科(北京)数码科技有限责任公司 Two-dimension code as well as two-dimension code generating method and generating device
CN104657765A (en) * 2015-02-13 2015-05-27 立德高科(北京)数码科技有限责任公司 Two-dimension code as well as two-dimension code generating method and generating device
CN104602209A (en) * 2015-02-27 2015-05-06 中国科学院大学 Combined information source short message encryption and decryption method based on RSA algorithm and stream cipher algorithm
CN104955044A (en) * 2015-05-29 2015-09-30 北京奇虎科技有限公司 Target network access method and target network access guiding method thereof and corresponding terminal
CN105426765A (en) * 2015-07-09 2016-03-23 深圳百云信息技术有限公司 Two-dimensional code dynamic encryption and decryption algorithm
CN105007155A (en) * 2015-07-28 2015-10-28 福建联迪商用设备有限公司 Two-dimension code mask encrypting and decrypting method and system
CN105007155B (en) * 2015-07-28 2017-12-08 福建联迪商用设备有限公司 Quick Response Code mask encryption and decryption approaches and system
CN105554028A (en) * 2016-01-22 2016-05-04 合肥学院 Method for establishing secure communication channel between mobile handheld devices based on two-dimension code
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
CN106127275A (en) * 2016-06-23 2016-11-16 福建富士通信息软件有限公司 A kind of coded method of bar code of paying the bill
CN106127275B (en) * 2016-06-23 2019-01-15 福建富士通信息软件有限公司 A kind of coding method for bar code of paying the bill
CN105959785A (en) * 2016-06-29 2016-09-21 微鲸科技有限公司 Multi-screen interaction method and equipment
CN106301777A (en) * 2016-08-03 2017-01-04 国家计算机网络应急技术处理协调中心 Quick Response Code encrypted transmission method and system
CN106911661A (en) * 2016-09-23 2017-06-30 阿里巴巴集团控股有限公司 A kind of short-message verification method, device, client, server and system
CN106911661B (en) * 2016-09-23 2020-04-28 阿里巴巴集团控股有限公司 Short message verification method, device, client, server and system
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method
CN106790462B (en) * 2016-12-08 2019-12-06 东软集团股份有限公司 Short sentence transmission method and system, server, sending client and receiving client
CN106790462A (en) * 2016-12-08 2017-05-31 东软集团股份有限公司 Short sentence transmission method and system, server, transmission client, reception client
CN106453069A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Instant communication message sending, viewing and viewing control method and device thereof
CN106897881A (en) * 2017-02-07 2017-06-27 桂林理工大学 On-line payment method with visible ray Yu the two-way public key system certification of bar code
CN106897881B (en) * 2017-02-07 2020-10-09 桂林理工大学 Online payment method with visible light and bar code bidirectional public key system authentication
WO2018153252A1 (en) * 2017-02-27 2018-08-30 黄贤杰 Electronic device bidirectional matching and authentication system
CN107026869A (en) * 2017-05-02 2017-08-08 中江联合(北京)科技有限公司 Without data encryption and transmission method, equipment, system and medium under network environment
CN107204987A (en) * 2017-06-27 2017-09-26 重庆大广宇科技有限公司 A kind of data in mobile phone transmission method
JP2021513141A (en) * 2018-02-07 2021-05-20 北京三快在線科技有限公司Beijing Sankuai Online Technology Co.,Ltd. Generation and identification of 2D barcodes
US11263416B2 (en) 2018-02-07 2022-03-01 Beijing Sankuai Online Technology Co., Ltd Two-dimensional code generation and identification
CN108809936A (en) * 2018-04-20 2018-11-13 山东大学 A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm
CN108809936B (en) * 2018-04-20 2020-12-08 山东大学 Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN108810022A (en) * 2018-07-18 2018-11-13 郑州云海信息技术有限公司 A kind of encryption method, decryption method and device
CN109344638A (en) * 2018-10-26 2019-02-15 上海点融信息科技有限责任公司 Private key signature method and apparatus for block chain network
CN109348479A (en) * 2018-11-21 2019-02-15 长沙理工大学 Data communications method, device, equipment and the system of electric power system
CN109766979B (en) * 2019-01-18 2022-03-22 北京思源理想控股集团有限公司 Two-dimensional code generation method, verification method and device
CN109766979A (en) * 2019-01-18 2019-05-17 北京思源互联科技有限公司 Two-dimensional code generation method, verification method and device
CN110808842A (en) * 2019-11-13 2020-02-18 深圳前海智安信息科技有限公司 Mobile phone communication information safety protection method
CN110808842B (en) * 2019-11-13 2023-10-27 深圳前海智安信息科技有限公司 Mobile phone communication information safety protection method
CN112990910A (en) * 2020-12-25 2021-06-18 深圳酷派技术有限公司 Two-dimensional code generation method, related device and computer storage medium
CN115150134A (en) * 2022-06-20 2022-10-04 国网山东省电力公司东平县供电公司 Intelligent power grid data encryption transmission method and system

Similar Documents

Publication Publication Date Title
CN102118710A (en) System and method for transmitting data between mobile terminals
CN109584978B (en) Information processing method and system based on signature aggregation medical health monitoring network model
CN111314089B (en) SM 2-based two-party collaborative signature method and decryption method
CN101789865B (en) Dedicated server used for encryption and encryption method
CN109818749B (en) Quantum computation resistant point-to-point message transmission method and system based on symmetric key pool
CN101964793A (en) Method and system for transmitting data between terminal and server and sign-in and payment method
CN109088726A (en) Communicating pair collaboration signature and decryption method and system based on SM2 algorithm
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN105610773B (en) A kind of communication encryption method of electric energy meter remote meter reading
CN107425971B (en) Certificateless data encryption/decryption method and device and terminal
CN103714458A (en) Two-dimension code-based mobile terminal transaction encryption method
CN112804205A (en) Data encryption method and device and data decryption method and device
CN102594551B (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN101977197B (en) Multi-receiver encryption method based on biological characteristics
US6640303B1 (en) System and method for encryption using transparent keys
CN106027247A (en) Method for remotely issuing POS key
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN110113150A (en) The encryption method and system of deniable authentication based on no certificate environment
CN109068322A (en) Decryption method, system, mobile terminal, server and storage medium
CN101789863B (en) Safe data information transmission method
CN1316405C (en) Method for obtaining digital siguature and realizing data safety
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN110535626A (en) The quantum communications service station secret communication method and system of identity-based
CN103117861A (en) Pseudo RSA (Rivest Shamir Adleman) based method for transmitting IBE key information (identity based encryption) in IBE

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110706