CN103164662A - Method and equipment of information storage and information read - Google Patents

Method and equipment of information storage and information read Download PDF

Info

Publication number
CN103164662A
CN103164662A CN2011104069500A CN201110406950A CN103164662A CN 103164662 A CN103164662 A CN 103164662A CN 2011104069500 A CN2011104069500 A CN 2011104069500A CN 201110406950 A CN201110406950 A CN 201110406950A CN 103164662 A CN103164662 A CN 103164662A
Authority
CN
China
Prior art keywords
data message
information
security information
message
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104069500A
Other languages
Chinese (zh)
Other versions
CN103164662B (en
Inventor
王长桥
车洪波
邓姿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University Medical Information Technology Co ltd
Original Assignee
Founder Mobile Media Technology Beijing Co Ltd
Peking University Founder Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Founder Mobile Media Technology Beijing Co Ltd, Peking University Founder Group Co Ltd filed Critical Founder Mobile Media Technology Beijing Co Ltd
Priority to CN201110406950.0A priority Critical patent/CN103164662B/en
Publication of CN103164662A publication Critical patent/CN103164662A/en
Application granted granted Critical
Publication of CN103164662B publication Critical patent/CN103164662B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information processing, in particular to a method and equipment of information storage and information read. The method and the equipment of the information storage and the information read are used for improving safety of recorded information. The method of the information storage comprises ensuring second data information which is really stored according to safety information set by a user and first data information which needs to be stored; carrying out two-dimensional code encoding processing on an information identifier of the first data information and the second data information, generating and storing a two-dimensional code, and building and storing a corresponding relationship between the information identifier and the safety information, wherein the corresponding relationship is used for reading data information. According to the method and the equipment of the information storage and the information read, due to the facts that a two-dimensional code mode is adopted to store information, and the corresponding relationship, used for the reading data information, between the information identifier and the safety information is built and is stored, the safety of the recorded information is improved under the premise that the recorded information is enabled to be convenient to read.

Description

The method and apparatus of a kind of storage and reading information
Technical field
The present invention relates to technical field of information processing, particularly the method and apparatus of a kind of storage and reading information.
Background technology
Along with the progress of technology, it is more and more important that information is stored in the position that occupies in people's life.Some informational needs people properly preserves, and avoids losing leaking.As all kinds of bank cards, credit card, the user need to remember password; Various chat tools, the user need to remember password equally; Shopping website, forum etc., user need password just can log in, and blog, microblogging etc. all be unable to do without account, password.Miscellaneous password often makes us tired and is unequal to being tired of, slightly careless forgetting Password, bring many puzzlements to life, forgotten as the password of bank card, and the user need to carry I.D. and handle to bank of deposit's sales counter.Password is in a single day stolen, brings loss to the user, and is as stolen in the password of chat tool, and others can utilize chat tool to swindle.How properly to preserve these private informations, be the problem of a most important thing.
Common store method is that the user writes on convenient searching later conveniently on notepad with all kinds of passwords.Because the information of user's note on notepad is generally cleartext information, make the security of information poor.
In sum, the mode security of recorded information is poor at present.
Summary of the invention
A kind of storage that the embodiment of the present invention provides and the method and apparatus of reading information are in order to improve the security of the information that records.
A kind of method of storing information that the embodiment of the present invention provides comprises:
According to the security information of user's setting and the first data message of needs storage, determine the second data message of actual storage;
The message identification of described the first data message and described the second data message are carried out the two-dimension code coding process, generate and store two-dimension code, and set up and store described message identification that read data information uses and the corresponding relation of described security information.
The method of a kind of reading information that the embodiment of the present invention provides comprises:
Two-dimension code to storage is decoded, and obtains the second data message of message identification and actual storage;
According to the corresponding relation of canned data sign and security information, determine security information corresponding to message identification that decoding obtains;
It is believed that according to security information and the second number the first data message of determining the needs storage.
A kind of equipment of storing information that the embodiment of the present invention provides comprises:
The first determination module is used for determining the second data message of actual storage according to the security information of user's setting and the first data message of needs storage;
The first processing module, be used for message identification and described second data message of described the first data message are carried out the processing of two-dimension code coding, generate and store two-dimension code, and set up and store described message identification that read data information uses and the corresponding relation of described security information.
The equipment of a kind of reading information that the embodiment of the present invention provides comprises:
Decoder module is used for the two-dimension code of storage is decoded, and obtains the second data message of message identification and actual storage;
The second determination module is used for the corresponding relation according to canned data sign and security information, determines security information corresponding to message identification that decoding obtains;
The second processing module is used for according to security information and the second data message, need to determine the first data message of storage.
The embodiment of the present invention is owing to adopting the two-dimension code mode to store information, and sets up and store message identification that read data information uses and the corresponding relation of security information, thereby under the prerequisite that can conveniently read, improved the security of the information that records.
Description of drawings
Fig. 1 is the method flow schematic diagram of embodiment of the present invention storage information;
Fig. 2 is the method flow schematic diagram of embodiment of the present invention reading information;
Fig. 3 is the method flow schematic diagram of embodiment of the present invention process information;
Fig. 4 is the device structure schematic diagram of embodiment of the present invention storage information;
Fig. 5 is the device structure schematic diagram of embodiment of the present invention reading information.
Embodiment
The embodiment of the present invention according to the security information of user's setting and the first data message of needs storage, is determined the second data message of actual storage when needs storage information; The message identification of the first data message and the second data message are carried out the two-dimension code coding process, generate and store two-dimension code, and set up and store message identification that read data information uses and the corresponding relation of security information; When the needs reading information, the two-dimension code of storage is decoded, obtain the second data message of message identification and actual storage; According to the corresponding relation of canned data sign and security information, determine security information corresponding to message identification that decoding obtains; It is believed that according to security information and the second number the first data message of determining the needs storage.The embodiment of the present invention is owing to adopting the two-dimension code mode to store information, and sets up and store message identification that read data information uses and the corresponding relation of security information, thereby under the prerequisite that can conveniently read, improved the security of the information that records.
Below in conjunction with Figure of description, the embodiment of the present invention is described in further detail.
As shown in Figure 1, the method for embodiment of the present invention storage information comprises:
Step 101, the security information that arranges according to the user and the first data message of needs storage are determined the second data message of actual storage;
Step 102, the message identification of the first data message and the second data message are carried out the two-dimension code coding process, generate and store two-dimension code, and set up and store message identification that read data information uses and the corresponding relation of security information.
Preferably, the user can arrange security information when needs storage information, specifically comprise whether needing to encrypt.Accordingly, in step 101, judge according to security information whether needs are encrypted data message the user, according to security information, after definite need to being encrypted, the first data message is encrypted processing, obtain the second data message; According to security information, after determining not need to be encrypted, with the first data message as the second data message.
Preferably, security information can also comprise key and/or cryptographic algorithm.Accordingly, in step 101:
If enciphered message comprises key, the cryptographic algorithm that adopts the key in security information and set in advance is encrypted the first data message;
If enciphered message comprises cryptographic algorithm, the key that adopts the cryptographic algorithm in security information and set in advance is encrypted the first data message;
If enciphered message comprises key and cryptographic algorithm, adopt key in security information and the cryptographic algorithm in security information, the first data message is encrypted.
If security information does not comprise key and cryptographic algorithm, in step 101, adopt the key that sets in advance and the cryptographic algorithm that sets in advance, the first data message is encrypted.
Owing to can adopting the key form that data message is encrypted, further improved the security of data message.
Preferably, in step 102, according to setting in advance or user configured coding parameter, the message identification of the first data message and the second data message are carried out the two-dimension code coding process, generate two-dimension code.
Wherein, coding parameter includes but not limited at least a in following message:
The two-dimension code type, error-correction level, module pixel.
Preferably, the message identification of the first data message is to determine and need to generate after the first data message of storage.
In force, can also generate in advance a large amount of message identifications, be the first data message assignment information sign according to sequencing.
Preferably, the corresponding relation of message identification and security information can adopt the form of database to preserve.Such as being saved in encrypting database.Wherein encrypting database can be Database Systems, as oracle, and sqlserver etc.
In force, if some two-dimension codes are deleted, can according to the message identification in deleted two-dimension code, comprise the corresponding relation of the message identification in deleted two-dimension code in delete database.
In force, the first data message that needs in step 101 to store can be the new information that the user inputs, can be also decode in the two-dimension code to storage obtain data message after, the user modifies to this data message and obtains.
Concrete decode procedure can referring to the content of embodiment of the present invention reading information, not repeat them here.
Preferably, if the user arranges coding parameter, in step 102, according to user configured coding parameter, the message identification of the first data message and the second data message are carried out the two-dimension code coding process, generate two-dimension code.
If the user does not arrange coding parameter, in step 102, according to the coding parameter that sets in advance, the message identification of the first data message and the second data message are carried out the two-dimension code coding process, generate two-dimension code.
As shown in Figure 2, the method for embodiment of the present invention reading information comprises the following steps:
Step 201, to the storage two-dimension code decode, obtain the second data message of message identification and actual storage;
Step 202, according to the corresponding relation of canned data sign and security information, determine security information corresponding to message identification that decoding obtains;
Step 203, it is believed that according to security information and the second number the first data messages of determining the needs storage.
Whether preferably, security information comprises needs to encrypt.In step 202, according to security information, after definite need to being decrypted, the second data message is decrypted processing, obtains the first data message
According to security information, after determining not need to be decrypted, with the second data message as the first data message.
Preferably, security information can also comprise key and/or cryptographic algorithm.Accordingly, in step 202:
If enciphered message comprises key, adopt the key in security information and decipherment algorithm corresponding to cryptographic algorithm that sets in advance, the second data message is decrypted processing;
If enciphered message comprises cryptographic algorithm, the decipherment algorithm that the cryptographic algorithm in the employing security information is corresponding and the key that sets in advance are decrypted processing to the second data message;
If enciphered message comprises key and cryptographic algorithm, adopt key and decipherment algorithm corresponding to cryptographic algorithm in security information, the second data message is decrypted processing.
If security information does not comprise key and cryptographic algorithm, in step 202, adopt the key and decipherment algorithm corresponding to cryptographic algorithm that set in advance, the second data message is decrypted processing.
Preferably, if the user arranges coding parameter, the decoding parametric corresponding according to user configured coding parameter, decode to the two-dimension code of storage.
If the user does not arrange coding parameter, according to decoding parametric corresponding to coding parameter that sets in advance, the two-dimension code of storage is decoded.
Wherein, Fig. 1 and Fig. 2 can synthesize a flow process, form the method for another process information, i.e. first execution in step 101~step 102, then execution in step 201~step 202.
As shown in Figure 3, the method for embodiment of the present invention process information comprises the following steps:
Step 301, judge whether storing data information according to user's execution, if so, execution in step 302; Otherwise, need to determine read data information, and execution in step 310.
The first data message that step 302, the information that the user is inputted or imports are stored as needs.
The contents are as follows (the overstriking italics) of the first data message:
Figure BDA0000117684090000061
Step 303, according to user's configuration integrate enciphered message.
Wherein, whenever execution that step 303 can be between step 302~step 305.
Step 304, be that the first data message distributes a unique message identification.Such as 1231256343543545345.
Step 305, judge whether that according to enciphered message needs are encrypted processing, if so, execution in step 306; Otherwise, execution in step 307.
Step 306, according to key and cryptographic algorithm, the first data message is encrypted processing, obtain the second data message of actual storage, and execution in step 308.
Step 307, with the first data message as the second data message, and execution in step 308.
Step 308, according to coding parameter, the message identification of the first data message and the second data message are carried out the two-dimension code coding and process, generate and store two-dimension code.
Such as the two-dimension code type is the QR code, error-correction level is L (7%), and module pixel is 4.
Step 309, set up message identification that read data information uses and the corresponding relation of security information, and this corresponding relation is stored in encrypting database into process ends.
Wherein, whenever execution that step 309 can be after information generated sign and security information.
Step 310, according to decoding parametric, the two-dimension code of the storage that the user is selected is decoded, and obtains the second data message of message identification and actual storage.
Step 311, in the corresponding relation of canned data sign and security information, determine security information corresponding to message identification that decoding obtains from encrypting database.
The security information that step 312, basis are determined judges whether that needs are decrypted processing, and if so, execution in step 313; Otherwise, execution in step 314.
Step 313, according to key and decipherment algorithm corresponding to cryptographic algorithm, the second data message is decrypted processing, obtain the first data message, and execution in step 315.
Step 314, the second data message that decoding is obtained are as the first data message, and execution in step 315.
The contents are as follows (the overstriking italics) of the first data message:
Figure BDA0000117684090000071
Figure BDA0000117684090000081
Step 315, judge whether the user needs the data message that obtains is updated, and if so, execution in step 316; Otherwise, process ends.
The first data message that step 316, the information that the user is inputted or imports are stored as needs.
The contents are as follows (the overstriking italics) of the first data message:
Figure BDA0000117684090000082
Step 317, according to user's configuration integrate enciphered message.
Wherein, whenever execution that step 317 can be between step 316~step 319.
Step 318, be that the first data message distributes a unique message identification.Such as 90124354335465469856.
Step 319, judge whether that according to enciphered message needs are encrypted processing, if so, execution in step 320; Otherwise, execution in step 321.
Step 320, according to key and cryptographic algorithm, the first data message is encrypted processing, obtain the second data message of actual storage, and execution in step 322.
Step 321, with the first data message as the second data message, and execution in step 222.
Step 322, according to coding parameter, the message identification of the first data message and the second data message are carried out the two-dimension code coding and process, generate and store two-dimension code.
Such as the two-dimension code type is the QR code, error-correction level is H (30%), and module pixel is 5 (being picture pixel 265*265).
Step 323, set up message identification that read data information uses and the corresponding relation of security information, and this corresponding relation is stored in encrypting database into process ends.
Based on same inventive concept, a kind of equipment of storing information also is provided in the embodiment of the present invention, because the principle that this equipment is dealt with problems is similar to the method for embodiment of the present invention storage information, so the enforcement of this equipment can referring to the enforcement of method, repeat part and repeat no more.
As shown in Figure 4, the equipment of embodiment of the present invention storage information comprises: the first determination module 40 and the first processing module 41.
The first determination module 40 is used for determining the second data message of actual storage according to the security information of user's setting and the first data message of needs storage;
The first processing module 41 is used for that the message identification of the first data message and the second data message are carried out the two-dimension code coding and processes, and generates and stores two-dimension code, and sets up and store message identification that read data information uses and the corresponding relation of security information.
Preferably, the first determination module 40 after definite need to being encrypted, is encrypted processing to the first data message according to security information, obtains the second data message; According to security information, after determining not need to be encrypted, with the first data message as the second data message.
Preferably, if enciphered message comprises key, the first determination module 40 adopts the key in security information and the cryptographic algorithm that sets in advance, and the first data message is encrypted.
Preferably, if enciphered message comprises cryptographic algorithm, the first determination module 40 adopts the cryptographic algorithm in security information and the key that sets in advance, and the first data message is encrypted.
Preferably, if enciphered message comprises key and cryptographic algorithm, key and cryptographic algorithm that the first determination module 40 adopts in security information are encrypted the first data message.
Preferably, if security information does not comprise key and cryptographic algorithm, the first determination module 40 adopts key and the cryptographic algorithm that sets in advance, and the first data message is encrypted.
Preferably, the first processing module 41 is decoded to the two-dimension code of storage according to the decoding parametric that sets in advance or user configured coding parameter is corresponding.
Based on same inventive concept, a kind of equipment of reading information also is provided in the embodiment of the present invention, because the principle that this equipment is dealt with problems is similar to the method for embodiment of the present invention reading information, so the enforcement of this equipment can referring to the enforcement of method, repeat part and repeat no more.
As shown in Figure 5, the equipment of embodiment of the present invention reading information comprises: decoder module 50, the second determination module 51 and the second processing module 52.
Decoder module 50 is used for the two-dimension code of storage is decoded, and obtains the second data message of message identification and actual storage;
The second determination module 51 is used for the corresponding relation according to canned data sign and security information, determines security information corresponding to message identification that decoding obtains;
The second processing module 52 is used for according to security information and the second data message, need to determine the first data message of storage.
Preferably, the second processing module 52 after definite need to being decrypted, is decrypted processing to the second data message according to security information, obtains the first data message; According to security information, after determining not need to be decrypted, with the second data message as the first data message.
Preferably, if enciphered message comprises key, the second processing module 52 adopts the key in security information and decipherment algorithm corresponding to cryptographic algorithm that sets in advance, and the second data message is decrypted processing.
Preferably, if enciphered message comprises cryptographic algorithm, the second processing module 52 adopts decipherment algorithm corresponding to the cryptographic algorithm in security information and the key that sets in advance, and the second data message is decrypted processing.
Preferably, if enciphered message comprises key and cryptographic algorithm, key and decipherment algorithm corresponding to cryptographic algorithm that the second processing module 52 adopts in security information are decrypted processing to the second data message.
Preferably, if security information does not comprise key and cryptographic algorithm, the second processing module 52 adopts key and decipherment algorithm corresponding to cryptographic algorithm that sets in advance, and the second data message is decrypted processing.
Preferably, decoder module 50 is decoded to the two-dimension code of storage according to the decoding parametric that sets in advance or user configured coding parameter is corresponding.
In force, the equipment of storage information and the function of equipment of the breath of winning the confidence can be combined in an entity, thus the module in the equipment of the module in the equipment of storage information and reading information can be combined in an entity, module corresponding to choice for use as required.
The preservation of two-dimension code graphic file is simple and convenient, file can be printed with printer, is clipped in photograph album, and wallet is medium, also the two-dimension code graphic file can be deposited in USB flash disk, PC or mobile phone.
The described scheme of the embodiment of the present invention is not limited to the plain text information such as code data, and the scheme that the Word messages such as audio frequency, video, books in libraries can use the embodiment of the present invention to provide is equally stored.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, implement software example or in conjunction with the form of the embodiment of software and hardware aspect fully.And the present invention can adopt the form that wherein includes the upper computer program of implementing of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code one or more.
The present invention is that reference is described according to process flow diagram and/or the block scheme of method, equipment (system) and the computer program of the embodiment of the present invention.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, make the instruction of carrying out by the processor of computing machine or other programmable data processing device produce to be used for the device of realizing in the function of flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, make the instruction that is stored in this computer-readable memory produce the manufacture that comprises command device, this command device is realized the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded on computing machine or other programmable data processing device, make on computing machine or other programmable devices and to carry out the sequence of operations step producing computer implemented processing, thereby be provided for realizing the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame in the instruction of carrying out on computing machine or other programmable devices.
Although described the preferred embodiments of the present invention, in a single day those skilled in the art get the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not break away from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of claim of the present invention and equivalent technologies thereof, the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. a method of storing information, is characterized in that, the method comprises:
According to the security information of user's setting and the first data message of needs storage, determine the second data message of actual storage;
The message identification of described the first data message and described the second data message are carried out the two-dimension code coding process, generate and store two-dimension code, and set up and store described message identification that read data information uses and the corresponding relation of described security information.
2. the method for claim 1, is characterized in that, determines that the second data message of actual storage comprises:
According to described security information, after definite need to being encrypted, described the first data message is encrypted processing, obtain described the second data message;
According to described security information, after determining not need to be encrypted, with described the first data message as described the second data message.
3. method as claimed in claim 2, is characterized in that, is encrypted to process to comprise:
If enciphered message comprises key, adopt the key in described security information and the cryptographic algorithm that sets in advance, described the first data message is encrypted;
If enciphered message comprises cryptographic algorithm, adopt the cryptographic algorithm in described security information and the key that sets in advance, described the first data message is encrypted;
If enciphered message comprises key and cryptographic algorithm, adopt key and cryptographic algorithm in described security information, described the first data message is encrypted;
If described security information does not comprise key and cryptographic algorithm, adopt the key and the cryptographic algorithm that set in advance, described the first data message is encrypted.
4. described method as arbitrary in claim 1~3, is characterized in that, generates two-dimension code and comprise:
According to setting in advance or user configured coding parameter, the message identification of described the first data message and described the second data message are carried out the two-dimension code coding process, generate two-dimension code.
5. the method for a reading information, is characterized in that, the method comprises:
Two-dimension code to storage is decoded, and obtains the second data message of message identification and actual storage;
According to the corresponding relation of canned data sign and security information, determine security information corresponding to message identification that decoding obtains;
According to security information and the second data message, need to determine the first data message of storage.
6. method as claimed in claim 5, is characterized in that, need to determine the first data message of storage to comprise:
According to described security information, after definite need to being decrypted, described the second data message is decrypted processing, obtain described the first data message;
According to described security information, after determining not need to be decrypted, with described the second data message as described the first data message.
7. method as claimed in claim 6, is characterized in that, described the second data message is decrypted to process comprise:
If enciphered message comprises key, decipherment algorithm corresponding to cryptographic algorithm that adopts the key in described security information and set in advance is decrypted processing to described the second data message;
If enciphered message comprises cryptographic algorithm, adopt decipherment algorithm corresponding to cryptographic algorithm in described security information and the key that sets in advance, described the second data message is decrypted processing;
If enciphered message comprises key and cryptographic algorithm, adopt key and decipherment algorithm corresponding to cryptographic algorithm in described security information, described the second data message is decrypted processing;
If described security information does not comprise key and cryptographic algorithm, adopt the key and decipherment algorithm corresponding to cryptographic algorithm that set in advance, described the second data message is decrypted processing.
8. described method as arbitrary in claim 5~7, is characterized in that, the two-dimension code of storage is decoded to be comprised:
According to the decoding parametric that sets in advance or user configured coding parameter is corresponding, the two-dimension code of storage is decoded.
9. an equipment of storing information, is characterized in that, this equipment comprises:
The first determination module is used for determining the second data message of actual storage according to the security information of user's setting and the first data message of needs storage;
The first processing module, be used for message identification and described second data message of described the first data message are carried out the processing of two-dimension code coding, generate and store two-dimension code, and set up and store described message identification that read data information uses and the corresponding relation of described security information.
10. the equipment of a reading information, is characterized in that, this equipment comprises:
Decoder module is used for the two-dimension code of storage is decoded, and obtains the second data message of message identification and actual storage;
The second determination module is used for the corresponding relation according to canned data sign and security information, determines security information corresponding to message identification that decoding obtains;
The second processing module is used for according to security information and the second data message, need to determine the first data message of storage.
CN201110406950.0A 2011-12-08 2011-12-08 A kind of method and apparatus of storage and the information of reading Expired - Fee Related CN103164662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110406950.0A CN103164662B (en) 2011-12-08 2011-12-08 A kind of method and apparatus of storage and the information of reading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110406950.0A CN103164662B (en) 2011-12-08 2011-12-08 A kind of method and apparatus of storage and the information of reading

Publications (2)

Publication Number Publication Date
CN103164662A true CN103164662A (en) 2013-06-19
CN103164662B CN103164662B (en) 2016-06-29

Family

ID=48587738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110406950.0A Expired - Fee Related CN103164662B (en) 2011-12-08 2011-12-08 A kind of method and apparatus of storage and the information of reading

Country Status (1)

Country Link
CN (1) CN103164662B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844315A (en) * 2016-03-14 2016-08-10 广州赛莱拉干细胞科技股份有限公司 Sample source data management method and apparatus
CN109948760A (en) * 2019-03-28 2019-06-28 尤尼泰克(嘉兴)信息技术有限公司 A kind of information demonstrating method and device based on two dimensional code

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004072312A (en) * 2002-08-05 2004-03-04 Planet:Kk Authentication method using mobile communication terminal
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
CN101339599A (en) * 2008-08-14 2009-01-07 深圳华为通信技术有限公司 Method and terminal for obtaining two-dimension code
CN101473332A (en) * 2007-06-15 2009-07-01 日立软件工程株式会社 Method, system and program for processing document
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004072312A (en) * 2002-08-05 2004-03-04 Planet:Kk Authentication method using mobile communication terminal
CN101473332A (en) * 2007-06-15 2009-07-01 日立软件工程株式会社 Method, system and program for processing document
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
CN101339599A (en) * 2008-08-14 2009-01-07 深圳华为通信技术有限公司 Method and terminal for obtaining two-dimension code
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844315A (en) * 2016-03-14 2016-08-10 广州赛莱拉干细胞科技股份有限公司 Sample source data management method and apparatus
CN105844315B (en) * 2016-03-14 2019-03-22 广州赛莱拉干细胞科技股份有限公司 A kind of sample source data information management method and apparatus
CN109948760A (en) * 2019-03-28 2019-06-28 尤尼泰克(嘉兴)信息技术有限公司 A kind of information demonstrating method and device based on two dimensional code
CN109948760B (en) * 2019-03-28 2022-05-17 尤尼泰克(嘉兴)信息技术有限公司 Information presentation method and device based on two-dimensional code

Also Published As

Publication number Publication date
CN103164662B (en) 2016-06-29

Similar Documents

Publication Publication Date Title
US11743041B2 (en) Technologies for private key recovery in distributed ledger systems
US10713535B2 (en) Methods and processes of encrypted deep learning services
JP4999751B2 (en) Data sharing techniques
US8826036B1 (en) Ebook encryption using variable keys
WO2016179334A1 (en) Identity management service using a block chain
US20030041251A1 (en) Rule-compliant password generator
US10395232B2 (en) Methods for enabling mobile payments
US11568085B2 (en) Systems and methods for tokenization to support pseudonymization of sensitive data
CN101494860A (en) Handhold mobile terminal and document secrecy method thereof
CN103345601A (en) Identity recording and verification system based on radio frequency
CN101789862A (en) Encryption and decryption device and method based on gravity acceleration
CN110401542A (en) Electronic identity voucher generation method, terminal and server
CN101552675A (en) Commercial intelligent real time identity authentication method based on mobile handhold terminal and two-dimension bar-code
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
CN105703901A (en) Encrypted data input method and encrypted data input device
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
CN103164662A (en) Method and equipment of information storage and information read
CN101539890B (en) Data processing system, cryptogram management method and data reading and writing method
CN201130381Y (en) Electric signature tool with cryptogram management function
CN117313119A (en) Application code encryption verification method and device and computer equipment
CN103336928A (en) Method and device for encrypting and decrypting database
US20060104445A1 (en) Systems and methods for hiding a data group
CN110336669A (en) A kind of encryption method of information, device and electronic equipment
JP5913041B2 (en) Secret information concealment device, secret information restoration device, secret information concealment program, and secret information restoration program
JP2006172351A (en) Method and system for content expiration date management by use of removable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Free format text: FORMER OWNER: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) CO., LTD.

Effective date: 20130624

Owner name: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) CO., LTD

Free format text: FORMER OWNER: BEIDA FANGZHENG GROUP CO. LTD.

Effective date: 20130624

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100871 HAIDIAN, BEIJING TO: 100080 HAIDIAN, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20130624

Address after: 100080, room 901, 9 floor, No. 52 West Fourth Ring Road, Haidian District, Beijing

Applicant after: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) Co.,Ltd.

Address before: 100871 Beijing, Haidian District into the house road, founder of the building on the 9 floor, No. 298

Applicant before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

Applicant before: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) Co.,Ltd.

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: PKU HEALTHCARE IT CO., LTD.

Free format text: FORMER OWNER: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) CO., LTD.

Effective date: 20141208

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20141208

Address after: 100080, Beijing, Haidian District, No. 52 West Fourth Ring Road, founder International Building, 19 floor

Applicant after: Peking University Medical Information Technology Co.,Ltd.

Address before: 100080, room 901, 9 floor, No. 52 West Fourth Ring Road, Haidian District, Beijing

Applicant before: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160629

CF01 Termination of patent right due to non-payment of annual fee