CN104994070A - Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code - Google Patents

Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code Download PDF

Info

Publication number
CN104994070A
CN104994070A CN201510277499.5A CN201510277499A CN104994070A CN 104994070 A CN104994070 A CN 104994070A CN 201510277499 A CN201510277499 A CN 201510277499A CN 104994070 A CN104994070 A CN 104994070A
Authority
CN
China
Prior art keywords
information
quick response
encryption
double
response code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510277499.5A
Other languages
Chinese (zh)
Other versions
CN104994070B (en
Inventor
涂新魁
陈珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou digital industry Interconnection Technology Co.,Ltd.
Original Assignee
Fuzhou Vsivs Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Vsivs Information Technology Co Ltd filed Critical Fuzhou Vsivs Information Technology Co Ltd
Priority to CN201510277499.5A priority Critical patent/CN104994070B/en
Publication of CN104994070A publication Critical patent/CN104994070A/en
Application granted granted Critical
Publication of CN104994070B publication Critical patent/CN104994070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information transmission method capable of verifying an information source based on an encrypted double-layered two-dimension bar code. The information transmission method comprises a cloud management background and a mobile terminal. The cloud management background generates the encrypted double-layered two-dimension bar code which is not provided with information. An information publisher adds information for the encrypted double-layered two-dimension bar code on the cloud management background. An information receiver obtains the information by scanning the encrypted double-layered two-dimension bar code with the information via the mobile terminal. The method is integrated with a computer, network communication, information coding and two-dimension bar code making technology, so it is ensured that the information receiver is capable of identifying the source publishing source when receiving the information so as to ensure there are only one entrance and one exit for the information, thereby preventing the two-dimension bar code from being infected with viruses to cause leakage of private information and endangering to information safety when a user is scanning the two-dimension bar code to receive information.

Description

A kind of based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source
Technical field
The present invention relates to information security field, particularly relate to internet two-dimensional code information transferring method.
Background technology
Information security mainly comprises the content of following five aspects, namely needs the fail safe of the confidentiality of guarantee information, authenticity, integrality, unauthorised copies and institute's parasitic system.The scope that information security itself comprises is very large, reveals comprising how taking precautions against commercial enterprise's secret, takes precautions against the leakage etc. of teenager to the browsing of flame, personal information.Information security system under network environment is the key ensured information security, comprise computer security operating system, various security protocol, security mechanism (digital signature, message authentication, data encryption etc.), until safety system, as UniNAC, DLP etc., as long as there are security breaches just can threaten global safety.Information security refers to that information system (comprising hardware, software, data, people, physical environment and infrastructure thereof) is protected; be not subject to reason that is accidental or malice and suffer destruction, change, leakage; system is reliably normally run continuously; information service is not interrupted, and finally realizes business continuance.
Two-dimensional bar code/Quick Response Code (2-dimensional bar code) is the chequered with black and white graphic recording data symbol information distributed in plane (on two-dimensional directional) according to certain rules with certain specific geometric figure; Coding utilizes the concept of " 0 ", " 1 " bit stream forming computer-internal logical foundations dexterously, the geometrical body using several corresponding with binary system, to represent word numerical information, is processed to realize information by image input device or photoelectric scanning device automatically identifying and reading: it has some general character of barcode technology automatically: often kind of code system has its specific character set; Each character occupies certain width; There is certain verifying function etc.Also there is the information automatic identification function to different rows and processing graphics rotation change point simultaneously.
Traditional information transferring method based on Quick Response Code: China's mobile Internet is now in the high speed development stage, and bandwidth, rate etc. are day by day popular.While mobile Internet permeability promotes, line lower intercommunication of reaching the standard grade also is eager to develop.Quick Response Code, as its entrance, popularizes today of development at mobile intelligent terminal, also present the value of its convenient practicality.Broadcasting media, false proofly to trace to the source, the field such as business card is social, enterprise marketing and E-Payment, be all the carrier diffused information with Quick Response Code, be communicated with line reach the standard grade under tie.The defect of traditional information transferring method based on Quick Response Code: Quick Response Code is as information carrier, and the chains such as the network address of its carrying are connected to the worry of security performance aspect, such as Quick Response Code virus, Quick Response Code wooden horse etc.Receiving party cannot assert information publisher, and lawless person utilizes two-dimension code generator, just according to the wish of oneself, can make Quick Response Code, hide trap wherein.
Summary of the invention
The object of the invention is to overcome above-mentioned weak point of the prior art and provide a kind of information transmission security based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source.
The present invention realizes in the following way:
A kind of based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, it is characterized in that: comprise cloud management backstage, mobile terminal, cloud management backstage generates the double-deck Quick Response Code of encryption of information of not giving, information publisher is on cloud management backstage for the double-deck Quick Response Code of encryption injects information, and receiving party is by the double-deck Quick Response Code obtaining information of encryption of mobile terminal scanning injection information;
(1) to generate the step of the double-deck Quick Response Code of encryption of information of not giving as follows on described cloud management backstage:
Step S101: an identity code Quick Response Code and an identifying code Quick Response Code are formed a double-deck Quick Response Code of encryption, and wherein identity code Quick Response Code is as ground floor, and identifying code Quick Response Code is as the second layer;
Step S102: the double-deck Quick Response Code of the encryption for step S101 generation generates the unique identity of 36 with GUID algorithm;
Step S103: the double-deck Quick Response Code stochastic generation of the encryption key be made up of 16 bit digital characters generated for step S101;
Step S104: the double-deck Quick Response Code stochastic generation of the encryption encryption vector be made up of octet array generated for step S101;
Step S105: effective identifying code that the described identity code Quick Response Code stochastic generation one of step S101 is made up of 1 letter and 11 bit digital;
Step S106: use DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, the effective identifying code in step S105 is encrypted, obtains the authorization information code area of 32 capitalizations and numeral formation;
Step S107: use 3DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, the effective identifying code in step S103 is encrypted and intercepts 8 conducts above and effectively verify district;
Step S108: use 3DES algorithm, using the key in step S103 as encryption key, using the encryption vector in step S104 as encryption vector, the unique identity in step S101 is encrypted, obtains main identifying code district;
Step S109: stochastic generation 8 bit digital, as digital verification code district;
Step S110: to generate the proparea that days, part was identify label district of the reference format of the system time of GUID in step S102,15 characters are arranged for back zone, identify label district with the inverted order self-propagation method of ASCII character value, described character is made up of 26 English alphabets of A-Z and 10 numerals of 0-9, and proparea, identify label district adds composition identify label district, back zone, identify label district;
Step S111: identity code Quick Response Code is divided into content regions, authorization information code area, effectively verifies district, identify label district; Described content regions is made up of standard URL(uniform resource locator); Described authorization information code area is obtained by step S106; Described effective checking district is obtained by step S107; Described identify label district is obtained by step S110;
Step S112: identifying code Quick Response Code is divided into main identifying code district and digital verification code district; Main identifying code district is obtained by step S108; Digital verification code district is obtained by step S109;
(2) described information publisher on cloud management backstage to be that the double-deck Quick Response Code of encryption injects the step specific practice of information as follows:
Step S201: information is being added into cloud management background data base by information publisher;
Step S202: content auditing is carried out to the information that information publisher issues in cloud management backstage, guarantees that the information that information publisher issues does not comprise virus, wooden horse;
Step S203: information publisher is that double-deck Quick Response Code is encrypted in the information applications that will issue on cloud management backstage;
Step S204: cloud management backstage to information publisher by the double-deck Quick Response Code of encryption identify label district from increasing order, the application quantity of match information publisher is carried out distributions and is encrypted double-deck Quick Response Code;
Step S205: information publisher obtains the identify label of the double-deck Quick Response Code of encryption distributed on cloud management backstage, and the information after the examination & verification that will issue is bound with the identify label of the double-deck Quick Response Code of encryption, after binding success, the binding relationship encrypting double-deck Quick Response Code and information will be stored in cloud management background data base;
(3) described receiving party is as follows by the step specific practice of the double-deck Quick Response Code obtaining information of encryption of mobile terminal scanning injection information:
Step S301: the double-deck Quick Response Code of encryption of mobile terminal scanning binding information, obtains the authorization information code area off-line decoding of encrypting double-deck Quick Response Code; If off-line decoding is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminding user;
Step S302: if off-line decoding is passed through, then submit the identify label of the double-deck Quick Response Code of encryption and effective verification msg to cloud management background end, after submission, decode to the information that mobile terminal is submitted in cloud management backstage, if line decode does not pass through, then judge that the double-deck Quick Response Code of encryption has personation risk;
Step S303: if cloud management backstage line decode passes through, returns to mobile terminal and encrypts information that double-deck Quick Response Code binds and show to mobile terminal user.
Described information transferring method also comprises the second layer of described receiving party by the double-deck Quick Response Code of mobile terminal scanning encryption, and obtain main checking code area and digital verification code district, assert Information issued source, step is as follows:
Step S401: receiving party uses mobile terminal that main checking code area is committed to cloud management backstage, if cloud management background authentication is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S402: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds mobile terminal user;
Step S403: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified.
Described information transferring method also comprises described receiving party and uses digital verification code district to assert Information issued source by mobile terminal, and step is as follows:
Step S501: receiving party uses mobile terminal that digital verification code district is committed to cloud management backstage, if cloud management background authentication is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S502: if cloud management backstage is verified the digital verification code district that mobile terminal is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds mobile terminal user;
Step S503: if cloud management backstage is verified the digital verification code district that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified.
Described mobile terminal is smart mobile phone, personal digital assistant or panel computer.
Beneficial effect of the present invention is: the Integrated predict model new and high technologies such as computer, network service, information coding and Quick Response Code making, in conjunction with the existing mobile Internet communication technology, ensure that receiving party can assert Information issued source when the information of reception, guarantee that the gateway of information is unique, prevent user from infecting virus when scanning Quick Response Code reception information, reveal individual privacy information, the information security of harm user.
Accompanying drawing explanation
Fig. 1 is flow chart of the present invention.
Embodiment
Now by reference to the accompanying drawings in detail, the specific embodiment of the invention is described in detail:, be exemplified below.
As shown in Figure 1, a kind of based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, comprise cloud management backstage, smart mobile phone, cloud management backstage generates the double-deck Quick Response Code of encryption of information of not giving; Information publisher is encryption double-deck Quick Response Code injection information on cloud management backstage; Receiving party is by using the double-deck Quick Response Code obtaining information of encryption of cell phone software scanning injection information;
(1) to generate the step specific practice of the double-deck Quick Response Code of encryption of information of not giving as follows on described cloud management backstage:
Step S101: by an identity code Quick Response Code and an identifying code Quick Response Code, forms a double-deck Quick Response Code of encryption, wherein using identity code Quick Response Code as ground floor, using identifying code Quick Response Code as the second layer;
Step S102: the double-deck Quick Response Code of the encryption for step S101 generation generates the unique identity of 36 with GUID algorithm, as: f8369b7c-1c2e-4952-834b-1db8b7940144;
Step S103: the double-deck Quick Response Code stochastic generation of the encryption key be made up of 16 bit digital characters generated for step S101, as: 40610422B7A6B52D;
Step S104: the double-deck Quick Response Code stochastic generation of the encryption encryption vector be made up of octet array generated for step S101, as { 0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08};
Step S105: the effective identifying code be made up of 1 letter and 11 bit digital by each identity code Quick Response Code stochastic generation one of step S101, as F73033826340;
Step S106: use DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, effective identifying code in step S105 is encrypted, obtain 32 authorization information code areas be made up of word figure and letter, as E7186245FA40A16FC894F34BBDF5F2D5;
Step S107: use 3DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, the effective identifying code in step S105 is encrypted and intercepts 8 conducts above and effectively verify district, as 9ABtCrcc;
Step S108: use 3DES algorithm, using the key in step S103 as encryption key, using the encryption vector in step S104 as encryption vector, unique identity in step S105 is encrypted, obtain main identifying code district, as: 4QplJfzAesHyExykoLSCc9U5KeKS4TsdpKMZ3ljL4W2JoCVwXNeE5Q==;
Step S109: stochastic generation 8 bit digital, as digital verification code district, as 10515088;
Step S110: to generate the proparea that days, part was identify label district of the reference format of the system time of GUID in step S102, arrange 15 characters for back zone, identify label district with the inverted order self-propagation method of ASCII character value, described character is made up of 26 English alphabets of A-Z and 10 numerals of 0-9.Proparea, identity tag district adds composition identify label district, back zone, identify label district, as: 201208000000000000001;
Step S111: identity code Quick Response Code is divided into content regions, authorization information code area, effectively verifies district, identify label district; Described content regions is made up of the URL(uniform resource locator) of standard; Described authorization information code area is obtained by step S106; Described effective checking district is obtained by step S107; Described identify label district is obtained by step S110, as http://v.vsivs.com/ v=_ E7186245FA40A16FC894F34BBDF5F2D5_9ABtCrcc_20120800000000 0000001;
Step S112: identifying code Quick Response Code is divided into main identifying code district and digital verification code district; Main identifying code district is obtained by step S108, as: E/ZcntB99iZssNkw0FxQrSE2oJo/sDl3bQVM3tqt4QlSwWBwYgodZA==; Digital verification code district is obtained by step S109; 16525500;
(2), described information publisher on cloud management backstage to be that the double-deck Quick Response Code of encryption injects the step specific practice of information as follows:
Step S201: information is being added into cloud management background data base by information publisher;
Step S202: content auditing is carried out to the information that information publisher issues in cloud management backstage, guarantees that the information that information publisher issues does not comprise virus, wooden horse;
Step S203: information publisher is that double-deck Quick Response Code is encrypted in the information applications that will issue on cloud management backstage;
Step S204: cloud management backstage to information publisher by the double-deck Quick Response Code of encryption identify label district from increasing order, the application quantity of match information publisher is carried out distributions and is encrypted double-deck Quick Response Code;
Step S205: information publisher obtains the identify label of the double-deck Quick Response Code of encryption distributed on cloud management backstage, and the information after the examination & verification that will issue is bound with the identify label of the double-deck Quick Response Code of encryption, after binding success, the binding relationship encrypting double-deck Quick Response Code and information will be stored in cloud management background data base;
(3) described receiving party is as follows by the step specific practice of the double-deck Quick Response Code obtaining information of encryption using cell phone software scanning injection information:
Step S301: the double-deck Quick Response Code of encryption of mobile terminal scanning binding information, obtains the authorization information code area off-line decoding of encrypting double-deck Quick Response Code; If off-line decoding is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminding user;
Step S302: if off-line decoding is passed through, then submit the identify label of the double-deck Quick Response Code of encryption and effective verification msg to cloud management background end, after submission, decode to the information that mobile terminal is submitted in cloud management backstage, if line decode does not pass through, then judge that the double-deck Quick Response Code of encryption has personation risk;
Step S303: if cloud management backstage line decode passes through, returns to mobile terminal and encrypts information that double-deck Quick Response Code binds and show to mobile terminal user.
Receiving party is by the second layer of the double-deck Quick Response Code of mobile terminal scanning encryption, and obtain main checking code area and digital verification code district, assert Information issued source, step is as follows:
Step S401: receiving party uses mobile terminal that main checking code area is committed to cloud management backstage, if the device checking of cloud management backstage is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S402: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds mobile terminal user;
Step S403: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified;
Receiving party uses digital verification code district to assert Information issued source by smart mobile phone, and step is as follows:
Step S501: receiving party uses smart mobile phone that digital verification code district is committed to cloud management backstage, if cloud management background authentication is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S502: if cloud management backstage is verified the digital verification code district that smart mobile phone is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds smart phone user;
Step S503: if cloud management backstage is verified the digital verification code district that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified.
Described mobile terminal can also be personal digital assistant or panel computer.
The code system type of Quick Response Code involved in the present invention is Quick Response Code, be called for short QR code, the Integrated predict model new and high technologies such as computer, network service, information coding and Quick Response Code making, in conjunction with the existing mobile Internet communication technology, ensureing that receiving party can assert Information issued source when the information of reception, guarantee that the gateway of information is unique, preventing user from infecting virus when scanning Quick Response Code reception information, reveal individual privacy information, the information security of harm user.

Claims (4)

1. one kind based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, it is characterized in that: comprise cloud management backstage, mobile terminal, cloud management backstage generates the double-deck Quick Response Code of encryption of information of not giving, information publisher is on cloud management backstage for the double-deck Quick Response Code of encryption injects information, and receiving party is by the double-deck Quick Response Code obtaining information of encryption of mobile terminal scanning injection information;
(1) to generate the step of the double-deck Quick Response Code of encryption of information of not giving as follows on described cloud management backstage:
Step S101: an identity code Quick Response Code and an identifying code Quick Response Code are formed a double-deck Quick Response Code of encryption, and wherein identity code Quick Response Code is as ground floor, and identifying code Quick Response Code is as the second layer;
Step S102: the double-deck Quick Response Code of the encryption for step S101 generation generates the unique identity of 36 with GUID algorithm;
Step S103: the double-deck Quick Response Code stochastic generation of the encryption key be made up of 16 bit digital characters generated for step S101;
Step S104: the double-deck Quick Response Code stochastic generation of the encryption encryption vector be made up of octet array generated for step S101;
Step S105: effective identifying code that the described identity code Quick Response Code stochastic generation one of step S101 is made up of 1 letter and 11 bit digital;
Step S106: use DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, the effective identifying code in step S105 is encrypted, obtains the authorization information code area of 32 capitalizations and numeral formation;
Step S107: use 3DES algorithm, with the key in step S103 for encryption key, with the encryption vector in step S104 for encryption vector, the effective identifying code in step S103 is encrypted and intercepts 8 conducts above and effectively verify district;
Step S108: use 3DES algorithm, using the key in step S103 as encryption key, using the encryption vector in step S104 as encryption vector, the unique identity in step S101 is encrypted, obtains main identifying code district;
Step S109: stochastic generation 8 bit digital, as digital verification code district;
Step S110: to generate the proparea that days, part was identify label district of the reference format of the system time of GUID in step S102,15 characters are arranged for back zone, identify label district with the inverted order self-propagation method of ASCII character value, described character is made up of 26 English alphabets of A-Z and 10 numerals of 0-9, and proparea, identify label district adds composition identify label district, back zone, identify label district;
Step S111: identity code Quick Response Code is divided into content regions, authorization information code area, effectively verifies district, identify label district; Described content regions is made up of standard URL(uniform resource locator); Described authorization information code area is obtained by step S106; Described effective checking district is obtained by step S107; Described identify label district is obtained by step S110;
Step S112: identifying code Quick Response Code is divided into main identifying code district and digital verification code district; Main identifying code district is obtained by step S108; Digital verification code district is obtained by step S109;
(2) described information publisher on cloud management backstage to be that the double-deck Quick Response Code of encryption injects the step specific practice of information as follows:
Step S201: information is being added into cloud management background data base by information publisher;
Step S202: content auditing is carried out to the information that information publisher issues in cloud management backstage, guarantees that the information that information publisher issues does not comprise virus, wooden horse;
Step S203: information publisher is that double-deck Quick Response Code is encrypted in the information applications that will issue on cloud management backstage;
Step S204: cloud management backstage to information publisher by the double-deck Quick Response Code of encryption identify label district from increasing order, the application quantity of match information publisher is carried out distributions and is encrypted double-deck Quick Response Code;
Step S205: information publisher obtains the identify label of the double-deck Quick Response Code of encryption distributed on cloud management backstage, and the information after the examination & verification that will issue is bound with the identify label of the double-deck Quick Response Code of encryption, after binding success, the binding relationship encrypting double-deck Quick Response Code and information will be stored in cloud management background data base;
(3) described receiving party is as follows by the step specific practice of the double-deck Quick Response Code obtaining information of encryption of mobile terminal scanning injection information:
Step S301: the double-deck Quick Response Code of encryption of mobile terminal scanning binding information, obtains the authorization information code area off-line decoding of encrypting double-deck Quick Response Code; If off-line decoding is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminding user;
Step S302: if off-line decoding is passed through, then submit the identify label of the double-deck Quick Response Code of encryption and effective verification msg to cloud management background end, after submission, decode to the information that mobile terminal is submitted in cloud management backstage, if line decode does not pass through, then judge that the double-deck Quick Response Code of encryption has personation risk;
Step S303: if cloud management backstage line decode passes through, returns to mobile terminal and encrypts information that double-deck Quick Response Code binds and show to mobile terminal user.
2. as claimed in claim 1 based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, it is characterized in that: described receiving party is by the second layer of the double-deck Quick Response Code of mobile terminal scanning encryption, obtain main checking code area and digital verification code district, assert Information issued source, step is as follows:
Step S401: receiving party uses mobile terminal that main checking code area is committed to cloud management backstage, if cloud management background authentication is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S402: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds mobile terminal user;
Step S403: if cloud management backstage is verified the main checking code area that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified.
3. as claimed in claim 2 based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, it is characterized in that: described receiving party uses digital verification code district to assert Information issued source by mobile terminal, and step is as follows:
Step S501: receiving party uses mobile terminal that digital verification code district is committed to cloud management backstage, if cloud management background authentication is not passed through, then judge that the double-deck Quick Response Code of encryption has personation risk, and return information reminds mobile terminal user;
Step S502: if cloud management backstage is verified the digital verification code district that mobile terminal is submitted to, but checking number of times is greater than 1, then judge that the double-deck Quick Response Code of this encryption was verified, and return information reminds mobile terminal user;
Step S503: if cloud management backstage is verified the digital verification code district that mobile terminal is submitted to and verifies that number of times equals 1, then judge that the double-deck Quick Response Code of encryption is verified.
4. as described in claim 1 or 2 or 3 based on the double-deck Quick Response Code of encryption can the information transferring method in authorization information source, it is characterized in that: described mobile terminal is smart mobile phone, personal digital assistant or panel computer.
CN201510277499.5A 2015-05-27 2015-05-27 A kind of information transferring method that can verify that information source based on the double-deck Quick Response Code of encryption Active CN104994070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510277499.5A CN104994070B (en) 2015-05-27 2015-05-27 A kind of information transferring method that can verify that information source based on the double-deck Quick Response Code of encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510277499.5A CN104994070B (en) 2015-05-27 2015-05-27 A kind of information transferring method that can verify that information source based on the double-deck Quick Response Code of encryption

Publications (2)

Publication Number Publication Date
CN104994070A true CN104994070A (en) 2015-10-21
CN104994070B CN104994070B (en) 2018-04-27

Family

ID=54305822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510277499.5A Active CN104994070B (en) 2015-05-27 2015-05-27 A kind of information transferring method that can verify that information source based on the double-deck Quick Response Code of encryption

Country Status (1)

Country Link
CN (1) CN104994070B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN107846682A (en) * 2017-10-26 2018-03-27 深圳小七科技有限公司 Method and system by from barcode scanning mode to hardware terminal binding information
CN109284973A (en) * 2018-08-24 2019-01-29 吴笑盈 A kind of machinery plant reckons by the piece Working hours management system
CN109344943A (en) * 2018-09-30 2019-02-15 合肥译码智能科技有限公司 A kind of method of embedded double two-dimensional barcode information secrecy
CN110310136A (en) * 2019-07-09 2019-10-08 四川省视频电子有限责任公司 For satellite reception and the real-time positioning source tracing method of decoding device management
CN110446085A (en) * 2019-08-01 2019-11-12 成都品为道电子技术有限公司 Screen control method is thrown, screen control terminal is thrown and throws screen system
CN112465093A (en) * 2020-11-02 2021-03-09 湖南遥昇通信技术有限公司 Double-layer two-dimensional code anti-counterfeiting generation method and verification method
CN112784228A (en) * 2021-01-05 2021-05-11 中交智运有限公司 Identity authentication method and system based on block chain
CN113852587A (en) * 2020-06-28 2021-12-28 山东爱城市网信息技术有限公司 Two-dimensional code remote authorization method and equipment based on encryption algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101165726A (en) * 2006-10-19 2008-04-23 胡乐乐 Method and system for preventing credit card embezzlement
US20080304703A1 (en) * 2006-03-03 2008-12-11 Fuji Xerox Co., Ltd. Image reading apparatus capable of reading infrared and visible images
CN102292735A (en) * 2008-10-28 2011-12-21 西斯·饶 System and method of integrated national citizen identity management and e-governance
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
EP2701112A1 (en) * 2011-04-18 2014-02-26 Wei Xu Method, device and mobile terminal utilizing barcode images for communication
CN104468533A (en) * 2014-11-20 2015-03-25 惠州学院 Information processing method and system based on encrypted two-dimensional code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080304703A1 (en) * 2006-03-03 2008-12-11 Fuji Xerox Co., Ltd. Image reading apparatus capable of reading infrared and visible images
CN101165726A (en) * 2006-10-19 2008-04-23 胡乐乐 Method and system for preventing credit card embezzlement
CN102292735A (en) * 2008-10-28 2011-12-21 西斯·饶 System and method of integrated national citizen identity management and e-governance
EP2701112A1 (en) * 2011-04-18 2014-02-26 Wei Xu Method, device and mobile terminal utilizing barcode images for communication
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
CN104468533A (en) * 2014-11-20 2015-03-25 惠州学院 Information processing method and system based on encrypted two-dimensional code

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN107846682A (en) * 2017-10-26 2018-03-27 深圳小七科技有限公司 Method and system by from barcode scanning mode to hardware terminal binding information
CN109284973A (en) * 2018-08-24 2019-01-29 吴笑盈 A kind of machinery plant reckons by the piece Working hours management system
CN109284973B (en) * 2018-08-24 2022-05-17 吴笑盈 Management system for counting work hours of machinery factory
CN109344943A (en) * 2018-09-30 2019-02-15 合肥译码智能科技有限公司 A kind of method of embedded double two-dimensional barcode information secrecy
CN110310136A (en) * 2019-07-09 2019-10-08 四川省视频电子有限责任公司 For satellite reception and the real-time positioning source tracing method of decoding device management
CN110446085A (en) * 2019-08-01 2019-11-12 成都品为道电子技术有限公司 Screen control method is thrown, screen control terminal is thrown and throws screen system
CN113852587A (en) * 2020-06-28 2021-12-28 山东爱城市网信息技术有限公司 Two-dimensional code remote authorization method and equipment based on encryption algorithm
CN112465093A (en) * 2020-11-02 2021-03-09 湖南遥昇通信技术有限公司 Double-layer two-dimensional code anti-counterfeiting generation method and verification method
CN112784228A (en) * 2021-01-05 2021-05-11 中交智运有限公司 Identity authentication method and system based on block chain

Also Published As

Publication number Publication date
CN104994070B (en) 2018-04-27

Similar Documents

Publication Publication Date Title
CN104994070A (en) Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code
CN105719120B (en) A method of encryption express delivery list privacy information
US10972264B2 (en) Method for realizing network electronic identity identification information protection based on key dispersion calculation
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN105243715B (en) A kind of automatic register method of cell visiting subscriber and system based on dynamic two-dimension code
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN106453268A (en) Method for realizing express privacy protection in the logistics process
Tu et al. Critical risk considerations in auto-ID security: Barcode vs. RFID
CN103415007B (en) A kind of mobile phone two-dimension code safe handling method based on Information hiding
CN202854880U (en) SMS payment system based on fingerprint identification mobile phone
CN104268610A (en) Method for generating and reading graded QR code
US10972465B1 (en) Secure authentication through visual codes containing unique metadata
CN103685255A (en) File encryption method based on two-dimension code scanning
US20220084063A1 (en) Dynamic machine-readable codes
WO2014091252A1 (en) Improvements relating to identifier authentication
Gao et al. LIP‐PA: A Logistics Information Privacy Protection Scheme with Position and Attribute‐Based Access Control on Mobile Devices
CN104463016A (en) Data safety storing method suitable for IC cards and two-dimension codes
US11177959B2 (en) Cryptography method and system for securing data via electronic transmission
US9107065B2 (en) Secure information transfer via bar codes
CN103745368A (en) Method for realizing two-dimension code safe shopping on shopping platform
CN110750735B (en) False event identification method, device, equipment and storage medium based on blockchain network
Wahsheh Secure and usable QR codes
Zhuang et al. Matching in proximity authentication and mobile payment ecosystem: What are we missing?
CN108337233A (en) It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN110535816A (en) A kind of safe data information transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 350002 G45, two floor, 2 floor, cloud block, 528, West Hong Road, Gulou District, Fuzhou, Fujian.

Patentee after: FUZHOU VSIVS INFORMATION TECHNOLOGY CO., LTD.

Address before: 350002 No. 3, east 3, 1 building, Fujian high tech Pioneer Park, 611 Gulou Industrial Zone, Fuzhou, Fujian.

Patentee before: FUZHOU VSIVS INFORMATION TECHNOLOGY CO., LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220411

Address after: 350200 R & D building 2, China southeast big data Industrial Park, No. 2, Hujiang Road, Wenwusha street, Changle District, Fuzhou City, Fujian Province

Patentee after: Fuzhou digital industry Interconnection Technology Co.,Ltd.

Address before: 350002 G45, two floor, 2 floor, cloud block, 528, West Hong Road, Gulou District, Fuzhou, Fujian.

Patentee before: FUZHOU VSIVS INFORMATION TECHNOLOGY Co.,Ltd.