CN103281340B - 2 D code verification method, system, client, issue and cloud server - Google Patents

2 D code verification method, system, client, issue and cloud server Download PDF

Info

Publication number
CN103281340B
CN103281340B CN201310261383.3A CN201310261383A CN103281340B CN 103281340 B CN103281340 B CN 103281340B CN 201310261383 A CN201310261383 A CN 201310261383A CN 103281340 B CN103281340 B CN 103281340B
Authority
CN
China
Prior art keywords
information
identification information
quick response
response code
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310261383.3A
Other languages
Chinese (zh)
Other versions
CN103281340A (en
Inventor
巫国忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201310261383.3A priority Critical patent/CN103281340B/en
Publication of CN103281340A publication Critical patent/CN103281340A/en
Application granted granted Critical
Publication of CN103281340B publication Critical patent/CN103281340B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes a kind of 2 D code verification method, including: publisher server obtains encryption key;Publisher server generates the content information of Quick Response Code;Publisher server generates checking information according to encryption key and content information;Publisher server generates Quick Response Code according to checking information and content information;And Quick Response Code is distributed at least one client by publisher server, so that content information is verified by least one client according to checking information.This method realizes two-dimension code safe inspection by checking Quick Response Code publisher's identity, and has high efficiency, ease for use and safety.The invention also discloses a kind of Quick Response Code checking system, client, publisher server and cloud server.

Description

2 D code verification method, system, client, issue and cloud server
Technical field
The present invention relates to communication technical field, particularly relate to a kind of 2 D code verification method, system, client, issue clothes Business device and cloud server.
Background technology
At present, Quick Response Code has obtained extensive utilization, can store the much information such as word, picture with Quick Response Code for medium, logical In overscanning Quick Response Code, the content information of storage, identifies whether have Virus Info or other unsafe content, but this There is serious potential safety hazard in mode.Specifically, wooden horse, virus easily invade Quick Response Code, particularly insert disease to Quick Response Code Poison is very simple, and be seen everywhere in network two-dimension code generator, as long as by the trojan horse program of wooden horse link or stealth according to calculating The coded system of machine 1,0 is enrolled, the two-dimension code pattern of certain favor information that then disguises oneself as, and user sweeps and i.e. can infect, and does not has There is good safety, and the memory capacity of Quick Response Code is limited, cause the limitation of storage information.
In order to insert substantial amounts of information in Quick Response Code, in the prior art, we store URL network address in Quick Response Code Link, the information that user more enriches by opening website links to obtain after resolving, and can in order to improve Consumer's Experience Directly automatically to redirect, the most jumbo information can be placed in the network address after redirecting, and improves the memory capacity of Quick Response Code, but This also brings hidden danger for security, because these URL implanting Quick Response Code redirect link and there may be potential safety hazard, such as, fishes Fishnet station etc..
In order to solve above-mentioned potential safety hazard, two ways can be used at present to solve, one is depositing by scanning Quick Response Code Storage content, then identifies whether have Virus Info or other unsafe content;Two be by identify Quick Response Code redirect link, Identify and whether chained address contains unsafe content, and establish the link blacklist so that user inquires about, as long as at this It is unsafe that URL in list just represents Quick Response Code.Prior art there is problems of, and identifies the storage content in Quick Response Code Highly difficult, and take mass-rent pattern, user to report and constantly update url database, complex steps, efficiency is low.
Summary of the invention
It is contemplated that at least solve one of above-mentioned technical problem.
To this end, the first of the present invention purpose is to propose a kind of 2 D code verification method.The method is by checking two dimension Code publisher's identity realizes two-dimension code safe inspection, and has high efficiency, ease for use and safety.Second mesh of the present invention Be a kind of Quick Response Code checking system is proposed.Third object of the present invention is to propose a kind of publisher server.The present invention The 4th purpose be to propose a kind of client.5th purpose of the present invention is to propose a kind of cloud server.
To achieve these goals, the 2 D code verification method of first aspect present invention embodiment, including: publisher server Obtain encryption key;Described publisher server generates the content information of Quick Response Code;Described publisher server is close according to described encryption Key and described content information generate checking information;Described publisher server generates according to described checking information and described content information Described Quick Response Code;And described Quick Response Code is distributed at least one client by described publisher server so that described at least Described content information is verified by one client according to described checking information.
2 D code verification method according to embodiments of the present invention, publisher server obtains encryption key and generates Quick Response Code Content information, generates checking information according to encryption key and content information, then generates two according to checking information and content information Dimension code, Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking information Content information is verified.The method realizes asking of two-dimension code safe inspection by checking Quick Response Code publisher's identity Topic, and there is high efficiency, ease for use and safety.
To achieve these goals, the Quick Response Code checking system of second aspect present invention embodiment, including: described issue takes Business device, is used for obtaining encryption key, and generates the content information of Quick Response Code, and according to described encryption key and described content information Generate checking information, and generate described Quick Response Code according to described checking information and described content information, and by described Quick Response Code It is distributed at least one client described;Described client, for testing described content information according to described checking information Card.
Quick Response Code checking system according to embodiments of the present invention, publisher server obtains encryption key and generates the interior of Quick Response Code Appearance information, generates checking information according to encryption key and content information, then generates two dimension according to checking information and content information Code, Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking information pair Content information is verified.This system realizes, by checking Quick Response Code publisher's identity, the problem that two-dimension code safe checks, And there is high efficiency, ease for use and safety.
To achieve these goals, the publisher server of third aspect present invention embodiment, including: the first acquisition module, For obtaining encryption key;First generation module, for generating the content information of Quick Response Code;Second generation module, for basis Described encryption key and described content information generate checking information;3rd generation module, for according to described checking information and institute State content information and generate described Quick Response Code;And release module, for described Quick Response Code being distributed at least one client described End.
Publisher server according to embodiments of the present invention, publisher server obtains encryption key and generates the content of Quick Response Code Information, generates checking information according to encryption key and content information, then generates Quick Response Code according to checking information and content information, Quick Response Code is distributed at least one client by publisher server so that at least one client according to checking information to content Information is verified.This publisher server provides the Quick Response Code with identification, so that client is by checking Quick Response Code Publisher's identity realizes the problem that two-dimension code safe checks, and has safety and ease for use.
To achieve these goals, the client of fourth aspect present invention embodiment, including: the first acquisition module, it is used for Obtain described Quick Response Code;Second acquisition module, for obtaining content information and checking information according to described Quick Response Code;And checking Module, for verifying described content information according to described checking information.
Client according to embodiments of the present invention, publisher server obtains encryption key and generates the content letter of Quick Response Code Breath, generates checking information according to encryption key and content information, then generates Quick Response Code according to checking information and content information, send out Quick Response Code is distributed at least one client by cloth server, so that content is believed by least one client according to checking information Breath is verified.This client realizes the problem that two-dimension code safe checks, and tool by checking Quick Response Code publisher's identity There are safety and ease for use.
To achieve these goals, the cloud server of fifth aspect present invention embodiment, including: receiver module, it is used for Receive the multiple report informations for multiple publisher servers;Authentication module, for carrying out the plurality of described report information Checking is to determine suspicious information, and wherein, described suspicious information includes suspicious described publisher server;And sending module, use In described suspicious information is sent at least one client so that at least one client described send to described user can Doubt information alert.
Cloud server according to embodiments of the present invention, receives the multiple report informations for multiple publisher servers, and Verifying to determine suspicious information to report information, suspicious information sends at least one client so that at least the most at last One client issues the user with suspicious information prompting.This cloud server provides the list of suspicious publisher server so that visitor Family end realizes, by Quick Response Code publisher's identity, the problem that two-dimension code safe checks, and has high efficiency, ease for use and peace Quan Xing.
Aspect and advantage that the present invention adds will part be given in the following description, and part will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially with easy to understand, wherein,
Fig. 1 is the flow chart of the verification method of Quick Response Code according to an embodiment of the invention;
Fig. 2 is the flow chart of the verification method of Quick Response Code in accordance with another embodiment of the present invention;
Fig. 3 is Quick Response Code storage format structured flowchart;
Fig. 4 is the flow chart of the verification method of Quick Response Code in accordance with another embodiment of the present invention;
Fig. 5 is the structural representation of the checking system of Quick Response Code according to an embodiment of the invention;
Fig. 6 is the structural representation of publisher server according to an embodiment of the invention;
Fig. 7 is the structural representation of client according to an embodiment of the invention;And
Fig. 8 is the structural representation of cloud server according to an embodiment of the invention.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached The embodiment that figure describes is exemplary, is only used for explaining the present invention, and is not considered as limiting the invention.On the contrary, originally Inventive embodiment includes all changes in the range of the spirit falling into attached claims and intension, revises and be equal to Thing.
In describing the invention, it is to be understood that term " first ", " second " etc. are not only used for describing purpose, and not It is understood that as instruction or hint relative importance.In describing the invention, it should be noted that unless otherwise clear and definite regulation And restriction, term " is connected ", " connection " should be interpreted broadly, and connects for example, it may be fixing, it is also possible to be to removably connect, Or be integrally connected;Can be to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to pass through intermediary It is indirectly connected to.For the ordinary skill in the art, above-mentioned term tool in the present invention can be understood with concrete condition Body implication.Additionally, in describing the invention, except as otherwise noted, " multiple " are meant that two or more.
In flow chart or at this, any process described otherwise above or method description are construed as, and expression includes One or more is for realizing the module of code, fragment or the portion of the executable instruction of the step of specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not by shown or discuss suitable Sequence, including according to involved function by basic mode simultaneously or in the opposite order, performs function, and this should be by the present invention Embodiment person of ordinary skill in the field understood.
Below with reference to the accompanying drawings the verification method of Quick Response Code according to embodiments of the present invention is described.
At present, the much information such as word, picture can be stored with Quick Response Code for medium, by storage in scanning Quick Response Code Appearance information, identifies whether have Virus Info or other unsafe content, but this mode exists serious potential safety hazard. Specifically, wooden horse, virus easily invade Quick Response Code, do not have good safety, and the memory capacity of Quick Response Code is limited, makes Become the limitation of storage information;In order to insert substantial amounts of information in Quick Response Code, in the prior art, we deposit in Quick Response Code Store up URL website links, the information that user more enriches by opening website links to obtain after resolving, and in order to improve Consumer's Experience can redirect the most automatically, and the most jumbo information can be placed in the network address after redirecting, and improves Quick Response Code Memory capacity, but this also brings hidden danger for security, because these URL implanting Quick Response Code redirect link and there may be safety Hidden danger, such as fishing website etc..
To this end, the present invention proposes the verification method of a kind of Quick Response Code, comprise the following steps: publisher server obtains encryption Key;Publisher server generates the content information of Quick Response Code;Publisher server generates checking according to encryption key and content information Information;Publisher server generates Quick Response Code according to checking information and content information;And Quick Response Code is distributed to by publisher server At least one client, so that content information is verified by least one client according to checking information.
Fig. 1 is the flow chart of the verification method of the Quick Response Code according to one embodiment of the invention.
As it is shown in figure 1, the verification method of Quick Response Code, including:
S101, publisher server obtains encryption key.
In one embodiment of the invention, encryption key may include but be not limited to PKI and private key.
In one embodiment of the invention, publisher server is multiple, and multiple publisher servers obtain from cloud server Taking encryption key, wherein, cloud server quite provides a use platform registering multiple publisher servers, such as: one Website platform.After Quick Response Code publisher's input information based on this website platform publisher server, it is thus achieved that a PKI and one Individual private key, i.e. PKI represent it is key, and private key is expressed as secret, and further, Quick Response Code publisher needs to preserve the two letter Breath, private key is necessary to ensure that only oneself is known, it is impossible to open;PKI can be disclosed to anyone.
S102, publisher server generates the content information of Quick Response Code.
S103, publisher server generates checking information according to encryption key and content information.
Specifically, it is possible to use the content information of encryption keys Quick Response Code is to generate checking information, for example, it is possible to make With private key, Quick Response Code is encrypted to generate checking information, checking information can also include PKI.
S104, publisher server generates Quick Response Code according to checking information and content information.
S105, Quick Response Code is distributed at least one client by publisher server so that at least one client according to Content information is verified by checking information.
Specifically, after client obtains Quick Response Code, resolve application program by Quick Response Code and resolve in acquisition Quick Response Code Appearance information and checking information, wherein checking information includes content information and the PKI of encryption, it is possible to use PKI is in encryption Appearance information is decrypted to obtain content information, the Quick Response Code letter after the 2 D code information after being deciphered by judgement and parsing Breath is the most consistent, if both are consistent, it is determined that this two-dimension code safe.
2 D code verification method according to embodiments of the present invention, publisher server obtains encryption key and generates Quick Response Code Content information, generates checking information according to encryption key and content information, then generates two according to checking information and content information Dimension code, Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking information Content information is verified.The method realizes asking of two-dimension code safe inspection by checking Quick Response Code publisher's identity Topic, and there is safety and ease for use.
Fig. 2 is the flow chart of the verification method of the Quick Response Code according to another embodiment of the present invention.
Wherein, step S204-S206 is to believe step S103 in Fig. 1, i.e. publisher server according to encryption key and content Breath generates the detailed description of checking information;Step S209-S215 is that i.e. publisher server is by Quick Response Code to step S105 in Fig. 1 Be distributed at least one client so that at least one client according to checking information content information is verified detailed Explanation.As in figure 2 it is shown, the verification method of Quick Response Code, including:
S201, publisher server obtains encryption key.
In one embodiment of the invention, encryption key may include but be not limited to PKI and private key.
In one embodiment of the invention, publisher server is multiple, and multiple publisher servers obtain from cloud server Taking encryption key, wherein, cloud server quite provides a use platform registering multiple publisher servers, such as: one Website platform.When based on this website platform, after Quick Response Code publisher's input information of publisher server, it is thus achieved that a PKI and One private key, i.e. PKI represent it is key, and private key is expressed as secret, and further, Quick Response Code publisher needs to preserve the two Information, private key is necessary to ensure that only oneself is known, it is impossible to open;PKI can be disclosed to anyone.
S202, publisher server generates the content information of Quick Response Code.
S204, publisher server obtains the first identification information of content information.
S205, the first identification information is encrypted by publisher server according to private key.
S206, publisher server is calculated according to the acquisition of the first identification information, PKI and the first identification information after encryption Method generates checking information.
In one embodiment of the invention, checking information includes first after the length of checking information, PKI, encryption Identification information and the acquisition algorithm of the first identification information.Further, Quick Response Code includes checking information and content information two parts, As it is shown on figure 3, be Quick Response Code storage format structured flowchart, including: the length 310 of checking information, the first mark after encryption Information 320, PKI 330, the first identification information acquisition algorithm 340, the content information 350 of Quick Response Code, wherein, the first identification information Acquisition algorithm 340 can be hash algorithm, such as, MD5(Message-Digest Algorithm, md5-challenge), right The content information of Quick Response Code carries out Hash calculation and obtains a cryptographic Hash and be the first identification information 340, then uses private key pair Cryptographic Hash is encrypted, and obtains the first identification information 320 after an encryption message segment is i.e. encrypted.
S207, publisher server generates Quick Response Code according to checking information and content information.
S208, Quick Response Code is distributed at least one client by publisher server so that at least one client according to Content information is verified by checking information.
Specifically, after client obtains Quick Response Code, resolve application program by Quick Response Code and resolve in acquisition Quick Response Code Appearance information and checking information, wherein checking information includes content information and the PKI of encryption, it is possible to use PKI is in encryption Appearance information is decrypted to obtain content information, the Quick Response Code letter after the 2 D code information after being deciphered by judgement and parsing Breath is the most consistent, if both are consistent, it is determined that this two-dimension code safe, concrete proof procedure is step S209-S215.
S209, client obtains Quick Response Code.
S210, client obtains content information and checking information according to Quick Response Code.
S211, client is according to public key decryptions the first identification information.
S212, content information is recalculated to obtain content information by client according to the acquisition algorithm of the first identification information The second identification information.
S213, client judges that the first identification information and the second identification information are the most consistent.
S214, if the first identification information and the second identification information are consistent, then client determines that publisher server identity is recognized Card passes through.
S215, if the first identification information and the second identification information are inconsistent, then client determines publisher server identity Certification is not passed through.
For example, specifically, obtain Quick Response Code in client, and when scanning Quick Response Code, Quick Response Code scanning software reads To the content information of whole relevant Quick Response Codes, then parse checking information therein.Further, in addition it is also necessary to be two masters Process to be calculated, one is according to public key decryptions the first identification information, is i.e. decrypted the content information of encryption according to PKI, Obtain the cryptographic Hash after deciphering, be i.e. labeled as hash_A;Content is believed by another according to the acquisition algorithm of the first identification information Breath recalculates to obtain the second identification information of content information, i.e. according to the hash algorithm specified in checking information, such as: MD5, carries out cryptographic Hash calculating to the content information of Quick Response Code, obtains a cryptographic Hash determined, is hash_B, then compares First identification information and the second identification information, i.e. hash_A with hash_B are the most consistent, and if consistent; can confirm that be through The Quick Response Code that the publisher server of cloud server certification provides;If inconsistent, it is considered sending out of non-high in the clouds server authentication Cloth server, needs to point out further client user.
2 D code verification method according to embodiments of the present invention, publisher server obtains encryption key and generates Quick Response Code Content information, generates checking information according to encryption key and content information, and wherein, publisher server obtains the first of content information Identification information, and according to private key, the first identification information is encrypted, i.e. the first identification information, PKI and first after encryption The acquisition algorithm of identification information generates checking information, then generates Quick Response Code according to checking information and content information.Work as client When obtaining Quick Response Code, obtain content information and checking information according to Quick Response Code, further according to public key decryptions the first identification information, then Content information is recalculated to obtain the second identification information of content information by the acquisition algorithm according to the first identification information, by One identification information and the second identification information carry out conforming judgement, if the two is consistent, then client determines publisher server Authentication is passed through.The method realizes the problem that two-dimension code safe checks, and tool by checking Quick Response Code publisher's identity There are safety and accuracy.
Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking letter Content information is verified by breath, and specifically, client obtains Quick Response Code;Content information and checking letter is obtained further according to Quick Response Code Breath;Then client is according to public key decryptions the first identification information.Further, client is calculated according to the acquisition of the first identification information Content information is recalculated to obtain the second identification information of content information by method, is further continued for judging the first identification information and second Identification information is the most consistent, if the first identification information and the second identification information are inconsistent, then client determines publisher server Authentication is not passed through, and the most as shown in Figure 4, is the flow chart of the verification method of the Quick Response Code of another embodiment of the present invention, holds Row step is as follows:
S106, cloud server receives the multiple report informations for multiple publisher servers.
S107, multiple report informations are verified to determine suspicious information by cloud server.
In one embodiment of the invention, wherein, suspicious information includes suspicious publisher server.
S108, cloud server by suspicious information send at least one client so that at least one client to Family sends suspicious information prompting.
Specifically, i.e. Quick Response Code scanning software is recognizing the Quick Response Code that the unsanctioned client user of authentication provides Time, need to inform client user by the way of interface prompts, it is indicated that publisher server is unverified, it is understood that there may be risk, Need with caution, and report mode is provided simultaneously, this Quick Response Code of cloud server whether safety can be informed, for reported Quick Response Code, the manager of cloud server needs to verify the situation of its reality according to handling process, and here is omitted.
Further, the Quick Response Code issued even across the publisher server of cloud server certification is also likely to be dangerous , therefore cloud server also needs to introduce user and reports function, and cloud server needs more online and offline to arrange Execute the reliability of the publisher server ensureing cloud server certification, pinpoint the problems and need the data base that upgrades in time, providing The publisher server of dangerous Quick Response Code cleans out in the registration database of cloud server.
2 D code verification method according to embodiments of the present invention, publisher server obtains encryption key and generates Quick Response Code Content information, generates checking information according to encryption key and content information, then generates two according to checking information and content information Dimension code, Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking information Content information is verified.Further, for not verified Quick Response Code, cloud server receives for multiple issues Multiple report informations of server, then verify to determine suspicious information to multiple report informations, finally suspicious information is sent out Deliver at least one client so that at least one client issues the user with suspicious information prompting.The method is by checking two Dimension code publisher's identity realizes the problem that two-dimension code safe checks, and has simplicity and safety.
In order to realize above-described embodiment, the present invention also proposes the checking system of a kind of Quick Response Code.
The present invention proposes the checking system of a kind of Quick Response Code, including: publisher server, it is used for obtaining encryption key, and Generate the content information of Quick Response Code, and generate checking information according to encryption key and content information, and according to checking information and interior Appearance information generates Quick Response Code, and Quick Response Code is distributed at least one client;Client, for internal according to checking information Appearance information is verified.
Fig. 5 is the structural representation of the checking system of the Quick Response Code according to one embodiment of the invention.
As it is shown in figure 5, the checking system of Quick Response Code, including: publisher server 510, at least one client 520 and high in the clouds Server 530.Should be appreciated that publisher server 510 is the most multiple.
Specifically, publisher server 510 is used for obtaining encryption key, and generates the content information of Quick Response Code, and according to adding Decryption key and content information generate checking information, and generate Quick Response Code according to checking information and content information, and by Quick Response Code It is distributed at least one client 520.
In one embodiment of the invention, encryption key may include but be not limited to PKI and private key.
In one embodiment of the invention, publisher server 510 is multiple, and multiple publisher servers 510 take from high in the clouds Business device 530 obtains encryption key, and wherein, cloud server 530 quite provides a use registering multiple publisher servers 510 Platform, such as: a website platform.When based on this website platform, the Quick Response Code publisher of publisher server 510 inputs information After, it is thus achieved that a PKI and a private key, i.e. PKI represent it is key, and private key is expressed as secret, and further, Quick Response Code is sent out Cloth person needs to preserve the two information, and private key is necessary to ensure that only oneself is known, it is impossible to open;PKI can be disclosed to any People.
Further, publisher server 510 can use the content information of encryption keys Quick Response Code to generate checking letter Breath, it is, for example possible to use private key is encrypted to generate checking information to Quick Response Code, can also include PKI in checking information.
Client 520 is for verifying content information according to checking information.More specifically, client 520 obtains two After dimension code, resolve application program by Quick Response Code and resolve the content information obtaining Quick Response Code and checking information, wherein verify letter Breath includes content information and the PKI of encryption, it is possible to use the content information of encryption is decrypted to obtain content letter by PKI 2 D code information after breath, the 2 D code information after being deciphered by judgement and parsing is the most consistent, if both are consistent, then Determine this two-dimension code safe.
Quick Response Code checking system according to embodiments of the present invention, publisher server obtains encryption key and generates Quick Response Code Content information, generates checking information according to encryption key and content information, then generates two according to checking information and content information Dimension code, Quick Response Code is distributed at least one client by publisher server, so that at least one client is according to checking information Content information is verified.This system realizes asking of two-dimension code safe inspection by checking Quick Response Code publisher's identity Topic, and there is safety and ease for use.
In one embodiment of the invention, publisher server 510 is additionally operable to: obtain the first mark letter of content information Breath, and according to private key, the first identification information is encrypted, and according to the first identification information, PKI and first after encryption The acquisition algorithm of identification information generates checking information.
In one embodiment of the invention, checking information includes first after the length of checking information, PKI, encryption Identification information and the acquisition algorithm of the first identification information.Further, Quick Response Code includes checking information and content information two parts, As it is shown on figure 3, be Quick Response Code storage format structured flowchart, including: the length 310 of checking information, the first mark after encryption Information 320, PKI 330, the first identification information acquisition algorithm 340, the content information 350 of Quick Response Code, wherein, the first identification information Acquisition algorithm 340 can be hash algorithm, such as, MD5(Message-Digest Algorithm, md5-challenge), right The content information of Quick Response Code carries out Hash calculation and obtains a cryptographic Hash and be the first identification information 340, then uses private key pair Cryptographic Hash is encrypted, and obtains the first identification information 320 after an encryption message segment is i.e. encrypted.
In one embodiment of the invention, client 520 is additionally operable to: obtains Quick Response Code, and obtains according to Quick Response Code interior Appearance information and checking information, and according to public key decryptions the first identification information, and the acquisition algorithm according to the first identification information is internal Appearance information recalculates to obtain the second identification information of content information, and judges that the first identification information and the second identification information are No unanimously and when the first identification information and the second identification information are consistent, determine that publisher server 510 authentication is passed through, with And when the first identification information and the second identification information are inconsistent, determine that publisher server 510 authentication is not passed through.Citing comes Saying, specifically, obtain Quick Response Code in client 520, and when scanning Quick Response Code, Quick Response Code scanning software reads whole relevant The content information of Quick Response Code, then parses checking information therein.Further, in addition it is also necessary to do two main processes of calculation, One is according to public key decryptions the first identification information, is i.e. decrypted the content information of encryption according to PKI, it is thus achieved that after deciphering Cryptographic Hash, be i.e. labeled as hash_A;Content information is recalculated by another according to the acquisition algorithm of the first identification information To obtain the second identification information of content information, i.e. according to the hash algorithm specified in checking information, such as: MD5, to two dimension The content information of code carries out cryptographic Hash calculating, obtains a cryptographic Hash determined, is hash_B, then compares the first mark letter Breath and the second identification information, i.e. hash_A with hash_B are the most consistent, if consistent, can confirm that it is through cloud server The Quick Response Code that the publisher server 520 of 530 certifications provides;If inconsistent, it is considered the issue clothes of non-high in the clouds server authentication Business device 520, needs prompting client 510 user further.
Quick Response Code is distributed at least one client 510 by publisher server 520, so that at least one client 510 Verifying content information according to checking information, specifically, client 510 obtains Quick Response Code;In obtaining further according to Quick Response Code Appearance information and checking information;Then client 510 is according to public key decryptions the first identification information.Further, client 510 basis Content information is recalculated to obtain the second identification information of content information by the acquisition algorithm of the first identification information, is further continued for sentencing Disconnected first identification information and the second identification information are the most consistent, if the first identification information and the second identification information are inconsistent, then Client 510 determines that publisher server 520 authentication is not passed through.
In one embodiment of the invention, cloud server 530 is used for: receives and states publisher server 520 for multiple Multiple report informations, and verify to determine suspicious information to multiple described report informations, wherein, suspicious information includes can The publisher server 520 doubted, and suspicious information is sent at least one client 510 so that at least one client 510 issue the user with suspicious information prompting.Specifically, i.e. Quick Response Code scanning software is recognizing the unsanctioned client of authentication When holding the Quick Response Code that 510 users provide, need by the way of interface prompts, inform client 510 user, it is indicated that issuing service Device 520 is unverified, it is understood that there may be risk, needs with caution, and provides report mode simultaneously, can inform cloud server 530 This Quick Response Code whether safety, for the Quick Response Code reported, the manager of cloud server 530 needs to come according to handling process Verifying the situation of its reality, here is omitted.
Further, the Quick Response Code issued even across the publisher server 520 of cloud server 530 certification is also likely to be Unsafe, therefore cloud server 530 also needs to introduce user and reports function, and cloud server 530 needs more Online and offline measure ensures the reliability of the publisher server 510 of cloud server 530 certification, pinpoints the problems needs in time More new database, cleans out the publisher server 520 providing dangerous Quick Response Code the registration database of cloud server 530 In.
In order to realize above-described embodiment, the present invention also proposes a kind of publisher server.
The present invention proposes a kind of publisher server, including: the first acquisition module, it is used for obtaining encryption key;First is raw Become module, for generating the content information of Quick Response Code;Second generation module, tests for generating according to encryption key and content information Card information;3rd generation module, for generating Quick Response Code according to checking information and content information;And release module, being used for will Quick Response Code is distributed at least one client.
Fig. 6 is the structural representation of the publisher server according to one embodiment of the invention.
As shown in Figure 6, publisher server, including: the first acquisition module 610, the first generation module 620, second generates mould Block 630, the 3rd generation module 640 and release module 650.
Specifically, the first acquisition module 610, it is used for obtaining encryption key.
In one embodiment of the invention, encryption key may include but be not limited to PKI and private key, and publisher server Encryption key is obtained from cloud server.
Further, cloud server quite provides a use platform registering multiple publisher servers, such as: one Website platform.Based on this website platform, after Quick Response Code publisher's input information of publisher server, the first acquisition module 610 Obtaining a PKI and a private key, i.e. PKI represent it is key, private key is expressed as secret.Quick Response Code publisher needs to preserve The two information, private key is necessary to ensure that only oneself is known, it is impossible to open;PKI can be disclosed to anyone.
First generation module 620, for generating the content information of Quick Response Code.
Second generation module 630, for generating checking information according to encryption key and content information.More specifically, second Generation module 630 can use the content information of encryption keys Quick Response Code to generate checking information, it is, for example possible to use private Key is encrypted to generate checking information to Quick Response Code, can also include PKI in checking information.
3rd generation module 640, for generating Quick Response Code according to checking information and content information.
Release module 650, for being distributed at least one client by Quick Response Code.Issue more specifically, client obtains After the Quick Response Code that module 650 is issued, resolve application program by Quick Response Code and resolve content information and the checking of acquisition Quick Response Code Information, wherein checking information includes content information and the PKI of encryption, it is possible to use the content information of encryption is solved by PKI Close to obtain content information, the 2 D code information after being deciphered by judgement is the most consistent with the 2 D code information after parsing, If both are consistent, it is determined that this two-dimension code safe.
Publisher server according to embodiments of the present invention, publisher server obtains encryption key and generates the content of Quick Response Code Information, generates checking information according to encryption key and content information, then generates Quick Response Code according to checking information and content information, Quick Response Code is distributed at least one client by publisher server so that at least one client according to checking information to content Information is verified.This publisher server provides the Quick Response Code (PKI etc. in such as encryption key) with identification, with Make client by checking Quick Response Code publisher's identity realize two-dimension code safe check problem, and have safety with Ease for use.
In one embodiment of the invention, the second generation module 630 includes: acquiring unit (not shown), encryption Unit (not shown) and signal generating unit (not shown).Specifically, acquiring unit is for obtaining the mark of content information Information.Ciphering unit is for being encrypted identification information according to private key.Signal generating unit is for according to the mark letter after encryption The acquisition algorithm of breath, PKI and identification information generates checking information.
In one embodiment of the invention, checking information includes the mark after the length of checking information, PKI, encryption Information and the acquisition algorithm of identification information.Wherein, identification information acquisition algorithm can be hash algorithm, such as, MD5, to two dimension The content information of code carries out Hash calculation and obtains a cryptographic Hash and be identification information, then uses private key to encrypt cryptographic Hash, Obtain the identification information after an encryption message segment is i.e. encrypted.
In order to realize above-described embodiment, the present invention also proposes a kind of client.
The present invention proposes a kind of client, including: the first acquisition module, it is used for obtaining Quick Response Code;Second acquisition module, For obtaining content information and checking information according to Quick Response Code;And authentication module, it is used for according to checking information content information Verify.
Fig. 7 is the structural representation of the client according to one embodiment of the invention.
As it is shown in fig. 7, client, including: the first acquisition module 710, the second acquisition module 720 and authentication module 730.
Specifically, the first acquisition module 710, it is used for obtaining Quick Response Code.
Second acquisition module 720, for obtaining content information and checking information according to Quick Response Code.
In one embodiment of the invention, checking information may include but be not limited to the length of checking information, issuing service The PKI of device.Specifically, it is possible to use the content information of encryption keys Quick Response Code to generate checking information, for example, it is possible to Use private key that Quick Response Code is encrypted to generate checking information, checking information can also include PKI.
Authentication module 730, for verifying content information according to checking information.
In one embodiment of the invention, authentication module 730 includes: acquiring unit (not shown), for basis Content information is recalculated to obtain the second identification information of content information by the acquisition algorithm of the first identification information;Decryption unit (not shown), for being decrypted according to PKI first identification information of publisher server;Judging unit (does not shows in figure Go out), for judging that the first identification information and the second identification information are the most consistent;And determine unit (not shown), it is used for When judging unit (not shown) judges the first identification information and the second identification information is consistent, determine publisher server identity Certification is passed through, and when judging unit (not shown) judges the first identification information and the second identification information is inconsistent, really Determine publisher server authentication not pass through.
In one embodiment of the invention, checking information also includes the first identification information and first identification information of encryption Acquisition algorithm, wherein, use publisher server private key the first identification information is encrypted.
Client according to embodiments of the present invention, publisher server obtains encryption key and generates the content letter of Quick Response Code Breath, generates checking information according to encryption key and content information, then generates Quick Response Code according to checking information and content information, send out Quick Response Code is distributed at least one client by cloth server, so that content is believed by least one client according to checking information Breath is verified.This client realizes the problem that two-dimension code safe checks, and tool by checking Quick Response Code publisher's identity There are safety and ease for use.
In order to realize above-described embodiment, the present invention also proposes a kind of cloud server.
The present invention proposes a kind of cloud server, including: receiver module, for receiving for multiple publisher servers Multiple report informations;Authentication module, for verifying to determine suspicious information to multiple report informations, wherein, suspicious information Including suspicious publisher server;And sending module, for suspicious information is sent at least one client so that extremely A few client issues the user with suspicious information prompting.
Fig. 8 is the structural representation of the cloud server according to one embodiment of the invention.
As shown in Figure 8, cloud server, including: receiver module 810, authentication module 820 and sending module 830.
Specifically, receiver module 810 receives the multiple report informations for multiple publisher servers;Pass through authentication module again 820 pairs of multiple report informations are verified to determine suspicious information, and wherein, suspicious information includes suspicious publisher server, By sending module 830, suspicious information is sent at least one client so that at least one client issues the user with afterwards Suspicious information is pointed out.
Cloud server according to embodiments of the present invention, receives the multiple report informations for multiple publisher servers, and Verifying to determine suspicious information to report information, suspicious information sends at least one client so that at least the most at last One client issues the user with suspicious information prompting.This cloud server provides the list of suspicious publisher server so that visitor Family end realizes, by Quick Response Code publisher's identity, the problem that two-dimension code safe checks, and has high efficiency, ease for use and peace Quan Xing.
In flow chart or at this, any process described otherwise above or method description are construed as, and expression includes One or more is for realizing the module of code, fragment or the portion of the executable instruction of the step of specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not by shown or discuss suitable Sequence, including according to involved function by basic mode simultaneously or in the opposite order, performs function, and this should be by the present invention Embodiment person of ordinary skill in the field understood.
Represent in flow charts or the logic described otherwise above at this and/or step, for example, it is possible to be considered as to use In the sequencing list of the executable instruction realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (system such as computer based system, including processor or other can hold from instruction Row system, device or equipment instruction fetch also perform the system instructed) use, or combine these instruction execution systems, device or set Standby and use.For the purpose of this specification, " computer-readable medium " can be any can to comprise, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or combines these instruction execution systems, device or equipment and the dress that uses Put.The more specifically example (non-exhaustive list) of computer-readable medium includes following: have the electricity of one or more wiring Connecting portion (electronic installation), portable computer diskette box (magnetic device), random-access memory (ram), read only memory (ROM), erasable read only memory (EPROM or flash memory), the fiber device edited, and portable optic disk is read-only deposits Reservoir (CDROM).It addition, computer-readable medium can even is that and can print the paper of described program thereon or other are suitable Medium, because then can carry out editing, interpreting or if desired with it such as by paper or other media are carried out optical scanning His suitable method is processed to electronically obtain described program, is then stored in computer storage.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method in memory and can be performed by suitable instruction execution system with storage Or firmware realizes.Such as, if realized with hardware, with the most the same, available well known in the art under Any one or their combination in row technology realize: have the logic gates for data signal realizes logic function Discrete logic, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), on-the-spot Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that and realize all or part of step that above-described embodiment method is carried Suddenly the program that can be by completes to instruct relevant hardware, and described program can be stored in a kind of computer-readable storage medium In matter, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated mould Block both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.Described integrated module is such as When fruit is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " specifically show Example " or the description of " some examples " etc. means to combine this embodiment or example describes specific features, structure, material or spy Point is contained at least one embodiment or the example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is example Property, it is impossible to be interpreted as limitation of the present invention, those of ordinary skill in the art is without departing from the principle of the present invention and objective In the case of above-described embodiment can be changed within the scope of the invention, revise, replace and modification.The scope of the present invention Extremely it is equal to by claims and limits.

Claims (15)

1. the verification method of a Quick Response Code, it is characterised in that including:
Publisher server obtains encryption key;
Described publisher server generates the content information of Quick Response Code;
Described publisher server generates checking information according to described encryption key and described content information;
Described publisher server generates described Quick Response Code according to described checking information and described content information;And
Described Quick Response Code is distributed at least one client by described publisher server, so that at least one client root described According to described checking information, described content information is verified;
Described encryption key includes PKI and private key;
Described publisher server generates checking information according to described encryption key and described content information, farther includes:
Described publisher server obtains the first identification information of described content information;
Described first identification information is encrypted by described publisher server according to described private key;And
Described publisher server is according to described first identification information, described PKI and described first identification information after encryption Acquisition algorithm generates described checking information.
Method the most according to claim 1, it is characterised in that described checking information include described checking information length, Described first identification information after described PKI, encryption and the acquisition algorithm of described first identification information.
Method the most according to claim 1, it is characterised in that at least one client described is according to described checking information pair Described content information is verified, farther includes:
Described client obtains described Quick Response Code;
Described client obtains described content information and described checking information according to described Quick Response Code;
Described client is according to the first identification information described in described public key decryptions;
Described content information is recalculated to obtain described according to the acquisition algorithm of described first identification information by described client Second identification information of content information;
Described client judges that described first identification information is the most consistent with described second identification information;
If described first identification information is consistent with described second identification information, the most described client determines described publisher server Authentication is passed through;And
If described first identification information and described second identification information are inconsistent, the most described client determines described issuing service Device authentication is not passed through.
Method the most according to claim 1, it is characterised in that described publisher server is multiple, and described method also includes: Multiple described publisher servers obtain described encryption key from cloud server.
Method the most according to claim 4, it is characterised in that also include:
Described cloud server receives the multiple report informations for multiple described publisher servers;
The plurality of described report information is verified to determine suspicious information by described cloud server, wherein, described suspicious Information includes suspicious described publisher server;And
Described cloud server by described suspicious information send at least one client described so that described at least one visitor Family end issues the user with suspicious information prompting.
6. the checking system of a Quick Response Code, it is characterised in that including: publisher server and at least one client, wherein,
Described publisher server, is used for obtaining encryption key, and generates the content information of Quick Response Code, and according to described encryption key Generate checking information with described content information, and generate described Quick Response Code according to described checking information and described content information, with And described Quick Response Code is distributed at least one client described;
Described client, for verifying described content information according to described checking information;
Described encryption key includes PKI and private key;
Described publisher server is additionally operable to:
Obtain the first identification information of described content information, and according to described private key, described first identification information be encrypted, And generate institute according to the acquisition algorithm of described first identification information, described PKI and described first identification information after encryption State checking information.
System the most according to claim 6, it is characterised in that described checking information include described checking information length, Described first identification information after described PKI, encryption and the acquisition algorithm of described first identification information.
System the most according to claim 6, it is characterised in that described client is additionally operable to:
Obtain described Quick Response Code, and obtain described content information and described checking information according to described Quick Response Code, and according to described First identification information described in public key decryptions, and according to the acquisition algorithm of described first identification information, described content information is counted again Calculate to obtain the second identification information of described content information, and judge that described first identification information and described second identification information are No unanimously, and when described first identification information is consistent with described second identification information, determine that described publisher server identity is recognized Card passes through, and when described first identification information and described second identification information are inconsistent, determines described publisher server body Part certification is not passed through.
System the most according to claim 6, it is characterised in that also include: cloud server, wherein, described issuing service Device is multiple, and multiple described publisher servers obtain described encryption key from described cloud server.
System the most according to claim 9, it is characterised in that described cloud server is used for:
Receive the multiple report informations for multiple described publisher servers, and the plurality of described report information is verified To determine suspicious information, wherein, described suspicious information includes suspicious described publisher server, and is sent out by described suspicious information Deliver at least one client described so that at least one client described issues the user with suspicious information prompting.
11. 1 kinds of publisher servers, it is characterised in that including:
First acquisition module, is used for obtaining encryption key;
First generation module, for generating the content information of Quick Response Code;
Second generation module, for generating checking information according to described encryption key and described content information;
3rd generation module, for generating described Quick Response Code according to described checking information and described content information;And
Release module, for being distributed at least one client by described Quick Response Code;
Described encryption key includes PKI and private key;
Described second generation module includes:
Acquiring unit, for obtaining the identification information of described content information;
Ciphering unit, for being encrypted described identification information according to described private key;And
Signal generating unit, for according to described identification information, described PKI and the acquisition algorithm of described identification information after encryption Generate described checking information.
12. publisher servers according to claim 11, it is characterised in that described checking information includes described checking information Length, described PKI, encryption after described identification information and the acquisition algorithm of described identification information.
13. publisher servers according to claim 11, it is characterised in that described publisher server obtains from cloud server Take described encryption key.
14. 1 kinds of clients, it is characterised in that including:
First acquisition module, is used for obtaining Quick Response Code;
Second acquisition module, for obtaining content information and checking information according to described Quick Response Code;And
Authentication module, for verifying described content information according to described checking information;
Described checking information include the length of described checking information, the PKI of publisher server, the first identification information of encryption and The acquisition algorithm of described first identification information, wherein, uses the private key of described publisher server to add described first identification information Close.
15. clients according to claim 14, it is characterised in that described authentication module includes:
Acquiring unit, for recalculating to obtain institute to described content information according to the acquisition algorithm of described first identification information State the second identification information of content information;
Decryption unit, for being decrypted according to the first identification information described in the PKI of described publisher server;
Judging unit, is used for judging that described first identification information is the most consistent with described second identification information;And
Determine unit, be used for when described judging unit judges that described first identification information is consistent with described second identification information, Determine that described publisher server authentication is passed through, and judge described first identification information and described at described judging unit When two identification informations are inconsistent, determine that described publisher server authentication is not passed through.
CN201310261383.3A 2013-06-26 2013-06-26 2 D code verification method, system, client, issue and cloud server Active CN103281340B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310261383.3A CN103281340B (en) 2013-06-26 2013-06-26 2 D code verification method, system, client, issue and cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310261383.3A CN103281340B (en) 2013-06-26 2013-06-26 2 D code verification method, system, client, issue and cloud server

Publications (2)

Publication Number Publication Date
CN103281340A CN103281340A (en) 2013-09-04
CN103281340B true CN103281340B (en) 2016-12-28

Family

ID=49063787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310261383.3A Active CN103281340B (en) 2013-06-26 2013-06-26 2 D code verification method, system, client, issue and cloud server

Country Status (1)

Country Link
CN (1) CN103281340B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104980332A (en) * 2014-04-14 2015-10-14 深圳市亚汇讯实业有限公司 System and method for remote data management
CN104079577A (en) * 2014-07-07 2014-10-01 北京智谷睿拓技术服务有限公司 Authentication method and authentication device
CN105187428A (en) * 2015-09-15 2015-12-23 重庆智韬信息技术中心 Method for realizing third-party safety authentication detection of two-dimensional code
CN105511283B (en) * 2015-12-14 2018-03-13 成都思唯奇科技有限公司 A kind of smart home remote communication method
CN106897761A (en) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 A kind of two-dimensional code generation method and device
TWI644227B (en) * 2017-05-19 2018-12-11 台新國際商業銀行股份有限公司 Cross verification system implemented along with a mobile device and method thereof
CN108959990B (en) * 2017-05-23 2021-08-06 中国移动通信有限公司研究院 Two-dimensional code verification method and device
TWI640887B (en) * 2017-05-26 2018-11-11 台新國際商業銀行股份有限公司 User verification system implemented along with a mobile device and method thereof
CN107608645A (en) * 2017-09-29 2018-01-19 珠海盛源信息科技有限公司 A kind of bill printing method and device, computer installation, storage medium
CN108399346A (en) * 2018-02-12 2018-08-14 安徽千云度信息技术有限公司 The scan method and its verification system of verification Quick Response Code based on big data
CN108632387B (en) * 2018-05-15 2021-11-23 网易(杭州)网络有限公司 Method, device and terminal for generating game reservation message
CN109063451B (en) * 2018-08-09 2022-07-19 南京百敖软件有限公司 Method for verifying BIOS user login through mobile phone two-dimensional code
CN111104629B (en) * 2019-11-26 2023-04-11 广州羊城通有限公司 Verification method and device of dynamic two-dimensional code
CN111860727B (en) * 2020-07-30 2023-06-20 深圳前海微众银行股份有限公司 Two-dimensional code generation method, two-dimensional code verification device and computer readable storage medium
CN113593082B (en) * 2021-05-14 2023-05-23 国家电网有限公司技术学院分公司 Five-prevention lockset management method and system based on blockchain
CN113435223A (en) * 2021-07-07 2021-09-24 北京华宇信息技术有限公司 Two-dimensional code release method based on block chain, block chain platform and release side platform
CN113611014B (en) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 Five-prevention lockset management method based on block chain
CN113593090B (en) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 Block chain-based five-prevention Bluetooth lock system of transformer substation
CN113988242A (en) * 2021-10-19 2022-01-28 艾斯芸防伪科技(福建)有限公司 Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750510A (en) * 2012-06-19 2012-10-24 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN102799990A (en) * 2012-06-19 2012-11-28 袁开国 Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)
CN103036902A (en) * 2012-12-26 2013-04-10 百度在线网络技术(北京)有限公司 Login control method and login control system based on two-dimension code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750510A (en) * 2012-06-19 2012-10-24 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN102799990A (en) * 2012-06-19 2012-11-28 袁开国 Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)
CN103036902A (en) * 2012-12-26 2013-04-10 百度在线网络技术(北京)有限公司 Login control method and login control system based on two-dimension code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium
CN109495268B (en) * 2017-09-12 2020-12-29 中国移动通信集团公司 Two-dimensional code authentication method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN103281340A (en) 2013-09-04

Similar Documents

Publication Publication Date Title
CN103281340B (en) 2 D code verification method, system, client, issue and cloud server
CN103685311B (en) A kind of login validation method and equipment
CN107832624A (en) A kind of visualization signature system and method based on block chain
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
KR101589192B1 (en) Identity authentication and management device and method thereof
CN108183924A (en) A kind of login validation method and terminal device
CN106161350B (en) Method and device for managing application identifier
CN106899410A (en) A kind of method and device of equipment identities certification
CN107231331A (en) Obtain, issue the implementation method and device of electronic certificate
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
CN110298421A (en) A kind of online generation, offline generation and the verification method and device of two dimensional code
US9882719B2 (en) Methods and systems for multi-factor authentication
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN107871081A (en) A kind of computer information safe system
CN105723373A (en) Method for encoding an access to a computer resource
CN106973046B (en) Inter-gateway data transmission method, source gateway and destination gateway
CN108768635A (en) A kind of cipher mark administrative model and method suitable for Internet of things system
CN113961893A (en) User login method and device based on block chain, electronic equipment and storage medium
CN110505185A (en) Auth method, equipment and system
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN108063748A (en) A kind of user authen method, apparatus and system
CN107294981B (en) Authentication method and equipment
CN111600701B (en) Private key storage method, device and storage medium based on blockchain
CN109450636A (en) The integrity verification method of group data in a kind of cloud storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant