CN106803116A - A kind of method and device for generating Asset Tag - Google Patents

A kind of method and device for generating Asset Tag Download PDF

Info

Publication number
CN106803116A
CN106803116A CN201710095515.8A CN201710095515A CN106803116A CN 106803116 A CN106803116 A CN 106803116A CN 201710095515 A CN201710095515 A CN 201710095515A CN 106803116 A CN106803116 A CN 106803116A
Authority
CN
China
Prior art keywords
assets information
image
code
asset
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710095515.8A
Other languages
Chinese (zh)
Inventor
张红亮
史艳庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Inspur Hi Tech Investment and Development Co Ltd
Original Assignee
Jinan Inspur Hi Tech Investment and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Inspur Hi Tech Investment and Development Co Ltd filed Critical Jinan Inspur Hi Tech Investment and Development Co Ltd
Priority to CN201710095515.8A priority Critical patent/CN106803116A/en
Publication of CN106803116A publication Critical patent/CN106803116A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides it is a kind of generate Asset Tag method and device, the method, including:Obtain the assets information of desired asset;According to the assets information, the image in 2 D code of the desired asset is generated;According to the image in 2 D code, the Asset Tag of the desired asset is generated.The invention provides a kind of method and device for generating Asset Tag, more assets information can be included in Asset Tag.

Description

A kind of method and device for generating Asset Tag
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and device for generating Asset Tag.
Background technology
Asset Tag is attached in fixed assets, for the label of Division identification fixed assets.
In the prior art, the assets such as title, classification, the belonging department of corresponding assets are generally comprised in Asset Tag Information.These information are during printing or hand-written mode are presented in Asset Tag in the form of the word.For example, computer room Can include on one Asset Tag of computer:Entitled computer, classification are:Office assets, department are computer room etc..
Visible by foregoing description, in the prior art, the assets information included in Asset Tag is less.
The content of the invention
The embodiment of the invention provides it is a kind of generate Asset Tag method and device, can in Asset Tag include compared with Many assets informations.
On the one hand, a kind of method for generating Asset Tag is the embodiment of the invention provides, including:
Obtain the assets information of desired asset;
According to the assets information, the image in 2 D code of the desired asset is generated;
According to the image in 2 D code, the Asset Tag of the desired asset is generated.
Further, it is described according to the assets information, the image in 2 D code of the desired asset is generated, including:
The assets information is encrypted, the first ciphertext is generated;
According to first ciphertext, the image in 2 D code is generated so that in Quick Response Code described in first user terminal recognition During image, when the first user terminal can decrypt first ciphertext, institute can be shown in the first user terminal Assets information is stated, when the first user terminal can not decrypt first ciphertext, can not be shown in the first user terminal Show the assets information.
Further, it is described according to the assets information, the image in 2 D code of the desired asset is generated, including:
The first secrecy assets information and the second secrecy assets information are proposed from the assets information of the desired asset;
The second secrecy assets information is encrypted, the second ciphertext is generated;
According to second ciphertext and the first secrecy assets information, the image in 2 D code is generated so that second When user terminal recognizes the image in 2 D code, when the second user terminal cannot decrypt second ciphertext, described The first secrecy assets information is shown in second user terminal, when the second user terminal can decrypt second ciphertext When, the first secrecy assets information and the second secrecy assets information are shown in the second user terminal.
Further, after the assets information for obtaining desired asset, further include:
Ostensible assets information is extracted from the assets information of the desired asset;
It is described that the Asset Tag of the desired asset is generated according to the image in 2 D code, including:
The ostensible assets information and the image in 2 D code are presented in the Asset Tag of the desired asset.
Further, described according to the assets information, after the image in 2 D code of the generation desired asset, in institute Before stating the Asset Tag that the desired asset is generated according to the image in 2 D code, further include:
According to the assets information of the desired asset, the desired asset information in the image in 2 D code is verified, When by verifying, perform described according to the image in 2 D code, generate the Asset Tag of the desired asset, when not over During verification, execution is returned to described according to the assets information, the image in 2 D code of the generation desired asset.
On the other hand, a kind of device for generating Asset Tag is the embodiment of the invention provides, including:
Acquiring unit, the assets information for obtaining desired asset;
Image generation unit, for according to the assets information, generating the image in 2 D code of the desired asset;
Label generation unit, for according to the image in 2 D code, generating the Asset Tag of the desired asset.
Further, described image generation unit, including:
First encryption sub-unit operable, for being encrypted to the assets information, generates the first ciphertext;
First image generates subelement, for according to first ciphertext, generating the image in 2 D code so that first When user terminal recognizes the image in 2 D code, when the first user terminal can decrypt first ciphertext, described First user terminal can show the assets information, when the first user terminal can not decrypt first ciphertext, The first user terminal can not show the assets information.
Further, described image generation unit, including:
Security information extraction unit, for proposed from the assets information of the desired asset the first secrecy assets information and Second secrecy assets information;
Second encryption sub-unit operable, for being encrypted to the second secrecy assets information, generates the second ciphertext;
Second image generates subelement, for according to the ciphertext and the first secrecy assets information, generation described two Dimension code image so that in image in 2 D code described in second user terminal recognition, when the second user terminal cannot decrypt institute When stating the second ciphertext, the first secrecy assets information is shown in the second user terminal, when the second user terminal When can decrypt second ciphertext, the first secrecy assets information and described second are shown in the second user terminal Secrecy assets information.
Further, the device is further included:
Public information extraction unit, for extracting ostensible assets information from the assets information of the desired asset;
The label generation unit, it is described for the ostensible assets information and the image in 2 D code to be presented in In the Asset Tag of desired asset.
Further, the device is further included:
Verification unit, for the assets information according to the desired asset, to the desired asset in the image in 2 D code Information is verified, and when by verifying, triggers the label generation unit, when not over verification, triggers described image Generation unit.
In embodiments of the present invention, image in 2 D code is generated according to assets information, target is preserved by image in 2 D code The assets information of assets, image in 2 D code is illustrated in the Asset Tag of desired asset so that the information on Asset Tag is no longer Limited by Asset Tag size, Asset Tag is used as an entrance so that user is by recognizing the two dimension on Asset Tag Code image is obtained in that more assets informations, realizes in Asset Tag comprising more assets information.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of the method for generation Asset Tag that one embodiment of the invention is provided;
Fig. 2 is the flow chart of the method for another generation Asset Tag that one embodiment of the invention is provided;
Fig. 3 is a kind of schematic diagram of the device of generation Asset Tag that one embodiment of the invention is provided;
Fig. 4 is the schematic diagram of the device of another generation Asset Tag that one embodiment of the invention is provided;
Fig. 5 is the schematic diagram of the device of another generation Asset Tag that one embodiment of the invention is provided;
Fig. 6 is the schematic diagram of the device of another generation Asset Tag that one embodiment of the invention is provided.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments, based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained on the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, the embodiment of the invention provides a kind of method for generating Asset Tag, the method can include following Step:
Step 101:Obtain the assets information of desired asset;
Step 102:According to the assets information, the image in 2 D code of the desired asset is generated;
Step 103:According to the image in 2 D code, the Asset Tag of the desired asset is generated.
In embodiments of the present invention, image in 2 D code is generated according to assets information, target is preserved by image in 2 D code The assets information of assets, image in 2 D code is illustrated in the Asset Tag of desired asset so that the information on Asset Tag is no longer Limited by Asset Tag size, Asset Tag is used as an entrance so that user is by recognizing the two dimension on Asset Tag Code image is obtained in that more assets informations, realizes in Asset Tag comprising more assets information.
It is in an embodiment of the present invention, described that the image in 2 D code of the desired asset is generated according to the assets information, Including:
The assets information is encrypted, the first ciphertext is generated;
According to first ciphertext, the image in 2 D code is generated so that in Quick Response Code described in first user terminal recognition During image, when the first user terminal can decrypt first ciphertext, institute can be shown in the first user terminal Assets information is stated, when the first user terminal can not decrypt first ciphertext, can not be shown in the first user terminal Show the assets information.
In embodiments of the present invention, the assets information to the desired asset on Asset Tag is encrypted, it is ensured that money Product information can only be obtained by the user with decryption capabilities, and the safety of assets information can be ensured by the embodiment.
It is in an embodiment of the present invention, described that the image in 2 D code of the desired asset is generated according to the assets information, Including:
The first secrecy assets information and the second secrecy assets information are proposed from the assets information of the desired asset;
The second secrecy assets information is encrypted, the second ciphertext is generated;
According to second ciphertext and the first secrecy assets information, the image in 2 D code is generated so that second When user terminal recognizes the image in 2 D code, when the second user terminal cannot decrypt second ciphertext, described The first secrecy assets information is shown in second user terminal, when the second user terminal can decrypt second ciphertext When, the first secrecy assets information and the second secrecy assets information are shown in the second user terminal.
In embodiments of the present invention, assets information be divide into the first secrecy assets information and the second secrecy assets information, User, can be with according to whether having decryption capabilities and determining whether to obtain when image in 2 D code is recognized by user terminal Whole assets informations, even if user terminal does not have a decryption capabilities, user can also fetching portion assets information, meet user's Portion requirements so that the assets information on Asset Tag can more neatly meet the demand of user.
In an embodiment of the present invention, after the assets information for obtaining desired asset, further include:
Ostensible assets information is extracted from the assets information of the desired asset;
It is described that the Asset Tag of the desired asset is generated according to the image in 2 D code, including:
The ostensible assets information and the image in 2 D code are presented in the Asset Tag of the desired asset.
In embodiments of the present invention, in Asset Tag in addition to image in 2 D code, also text information, even if user is not Scanning image in 2 D code also can assets information of the fetching portion on desired asset so that Asset Tag is more flexible.
In an embodiment of the present invention, the Quick Response Code figure of the desired asset is generated according to the assets information described As after, described according to the image in 2 D code, before generating the Asset Tag of the desired asset, further include:
According to the assets information of the desired asset, the desired asset information in the image in 2 D code is verified, When by verifying, perform described according to the image in 2 D code, generate the Asset Tag of the desired asset, when not over During verification, execution is returned to described according to the assets information, the image in 2 D code of the generation desired asset.
In embodiments of the present invention, by the verification to image in 2 D code, it is ensured that the assets letter in image in 2 D code Breath is consistent with the original assets information of desired asset.Avoid in image in 2 D code is caused during generating image in 2 D code Assets information situation about making a mistake.Specific checking procedure can be accomplished by the following way:Identification image in 2 D code, obtains Take the assets information in image in 2 D code;Assets information in image in 2 D code is believed with the assets of the desired asset for obtaining before Breath is compared, and determines whether the assets information in image in 2 D code is accurate, if it is, by verification, otherwise, not by school Test.
As shown in Fig. 2 the embodiment of the invention provides a kind of method for generating Asset Tag, the method can include following Step:
Step 201:Obtain the assets information of desired asset.
Specifically, desired asset can be obtained from the physical assets information list of the assets information for preserving multiple assets Assets information, it is also possible to from physical assets information list obtain multiple assets assets information, subsequently multiple assets are entered Row batch processing, the Asset Tag of Mass production each assets.
In addition, can include the identification card number of desired asset in the assets information of desired asset, the identification card number is this The unique mark of desired asset.
Step 202:Proposed from the assets information of desired asset the first secrecy assets information, the second secrecy assets information and Ostensible assets information.
Assets information is divided into three classes, is presented in Asset Tag by three kinds of different modes respectively, to meet not With the demand of user.
For example, the assets information of scanner includes:Entitled scanner, model purple light 153, classification are provided for office Product, department are Integrated Dept., the buying date is on January 1st, 2015, asset number is 100234.For the assets letter of the scanner Breath, ostensible assets information includes:Entitled scanner, the first secrecy assets information includes:Model purple light 153, classification It is office assets, the second secrecy assets information includes:Department is Integrated Dept., purchases the date for January 1, asset number in 2015 It is 100234.
Step 203:Second secrecy assets information is encrypted, the second ciphertext is generated.
Specifically, can be encrypted by hybrid algorithm.
For example, for the assets information of scanner, the second secrecy assets information includes:Department is Integrated Dept., buying Date be on January 1st, 2015, asset number be 100234.The second secrecy assets information is encrypted.
Step 204:According to the second ciphertext and the first secrecy assets information, image in 2 D code is generated.
Step 205:Ostensible assets information and image in 2 D code are presented in the Asset Tag of desired asset.
Specifically, when user terminal recognizes image in 2 D code, when user terminal cannot decrypt the second ciphertext, in user The first secrecy assets information is shown in terminal, when user terminal can decrypt the second ciphertext, first is shown on the subscriber terminal Secrecy assets information and the second secrecy assets information.
For example, for the Asset Tag of scanner, the Asset Tag includes image in 2 D code and entitled scanner. User sees that the Asset Tag can obtain the assets for scanner, and user is scanned image in 2 D code and can be obtained by user terminal Take the assets information of more scanners.
After step 204, before step 205, can also include:According to the assets information of desired asset, to two dimension Desired asset information in code image is verified, and when by verifying, performs step 205, when not over verification, is returned Perform step 204.
For example, for scanner, if department in identifying image in 2 D code is supervision section, and obtain before Department is different Integrated Dept., then not over verification.Each assets information only in image in 2 D code is identified is therewith When the assets information of the scanner of preceding acquisition is consistent, just by verification.
After the Asset Tag of generation desired asset, can also include:The Asset Tag of desired asset is printed, is being carried out During batch processing, can be with the Asset Tag of each assets of bulk print.
After image in 2 D code is generated, the image in 2 D code that user can be generated with preview, user can be broadcast by panel Put, mouse touches double mode preview image in 2 D code.
The Asset Tag of embodiment of the present invention generation supports that Intelligent mobile equipment is made an inventory physical assets, association label body in kind Part mark, checks message details in kind.User can scan each assets by that can decrypt the mobile device of image in 2 D code Asset Tag obtain the assets information of each assets.
In embodiments of the present invention, after the image in 2 D code of generation desired asset, may further include:Generation mesh The label record of assets is marked, the label record can be realized by table 1:
Table 1
As shown in Figure 3, Figure 4, the embodiment of the invention provides a kind of device for generating Asset Tag.Device embodiment can be with Realized by software, it is also possible to realized by way of hardware or software and hardware combining.From for hardware view, as shown in figure 3, A kind of hardware structure diagram of equipment where a kind of device for generating Asset Tag provided in an embodiment of the present invention, except Fig. 3 institutes Outside the processor, internal memory, network interface and the nonvolatile memory that show, the equipment in embodiment where device is generally also Other hardware can be included, be such as responsible for the forwarding chip for the treatment of message.As a example by implemented in software, as shown in figure 4, as one Device on individual logical meaning, is to be referred to corresponding computer program in nonvolatile memory by the CPU of equipment where it Order runs what is formed in reading internal memory.A kind of device of generation Asset Tag that the present embodiment is provided, including:
Acquiring unit 401, the assets information for obtaining desired asset;
Image generation unit 402, for according to the assets information, generating the image in 2 D code of the desired asset;
Label generation unit 403, for according to the image in 2 D code, generating the Asset Tag of the desired asset.
In an embodiment of the present invention, described image generation unit, including:
First encryption sub-unit operable, for being encrypted to the assets information, generates the first ciphertext;
First image generates subelement, for according to first ciphertext, generating the image in 2 D code so that first When user terminal recognizes the image in 2 D code, when the first user terminal can decrypt first ciphertext, described First user terminal can show the assets information, when the first user terminal can not decrypt first ciphertext, The first user terminal can not show the assets information.
In an embodiment of the present invention, described image generation unit, including:
Security information extraction unit, for proposed from the assets information of the desired asset the first secrecy assets information and Second secrecy assets information;
Second encryption sub-unit operable, for being encrypted to the second secrecy assets information, generates the second ciphertext;
Second image generates subelement, for according to the ciphertext and the first secrecy assets information, generation described two Dimension code image so that in image in 2 D code described in second user terminal recognition, when the second user terminal cannot decrypt institute When stating the second ciphertext, the first secrecy assets information is shown in the second user terminal, when the second user terminal When can decrypt second ciphertext, the first secrecy assets information and described second are shown in the second user terminal Secrecy assets information.
As shown in figure 5, in an embodiment of the present invention, the device is further included:
Public information extraction unit 501, for extracting ostensible assets letter from the assets information of the desired asset Breath;
The label generation unit 403, for the ostensible assets information and the image in 2 D code to be presented in In the Asset Tag of the desired asset.
As shown in fig. 6, in an embodiment of the present invention, the device is further included:
Verification unit 601, for the assets information according to the desired asset, to the target money in the image in 2 D code Product information is verified, and when by verifying, triggers the label generation unit 403, and when not over verification, triggering is described Image generation unit 402.
A kind of computer-readable recording medium, including execute instruction are the embodiment of the invention provides, when the computing device of storage control During the execute instruction, the method that the storage control performs any one generation Asset Tag in the embodiment of the present invention.
A kind of storage control is the embodiment of the invention provides, including:Processor, memory and bus;
The memory is used to store execute instruction, and the processor is connected with the memory by the bus, when When the storage control runs, the execute instruction of memory storage described in the computing device, so that the storage The method that controller performs any one generation Asset Tag in the embodiment of the present invention.
The contents such as the information exchange between each unit, implementation procedure in said apparatus, due to implementing with the inventive method Example is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
Each embodiment of the invention at least has the advantages that:
1st, in embodiments of the present invention, image in 2 D code is generated according to assets information, mesh is preserved by image in 2 D code The assets information of assets is marked, image in 2 D code is illustrated in the Asset Tag of desired asset so that the information on Asset Tag is not Limited by Asset Tag size again, Asset Tag is used as an entrance so that user is by recognizing two on Asset Tag Dimension code image is obtained in that more assets informations, realizes in Asset Tag comprising more assets information.
2nd, in embodiments of the present invention, the assets information to the desired asset on Asset Tag is encrypted, it is ensured that Assets information can only be obtained by the user with decryption capabilities, and the safety of assets information can be ensured by the embodiment.
3rd, in embodiments of the present invention, assets information be divide into the first secrecy assets information and the second secrecy assets letter Breath, user, can be with according to whether have decryption capabilities and determine whether can when image in 2 D code is recognized by user terminal Whole assets informations are obtained, even if user terminal does not have decryption capabilities, user can also fetching portion assets information, satisfaction use The portion requirements at family so that the assets information on Asset Tag can more neatly meet the demand of user.
4th, in embodiments of the present invention, in Asset Tag in addition to image in 2 D code, also text information, even if user Not scanning image in 2 D code also can assets information of the fetching portion on desired asset so that Asset Tag is more flexible.
It should be noted that herein, such as first and second etc relational terms are used merely to an entity Or operation makes a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating Any this actual relation or order.And, term " including ", "comprising" or its any other variant be intended to it is non- It is exclusive to include, so that process, method, article or equipment including a series of key elements not only include those key elements, But also other key elements including being not expressly set out, or also include by this process, method, article or equipment are solid Some key elements.In the absence of more restrictions, the key element limited by sentence " including ", does not arrange Except also there is other identical factor in the process including the key element, method, article or equipment.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in the storage medium of embodied on computer readable, the program Upon execution, the step of including above method embodiment is performed;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
It is last it should be noted that:Presently preferred embodiments of the present invention is the foregoing is only, skill of the invention is merely to illustrate Art scheme, is not intended to limit the scope of the present invention.All any modifications made within the spirit and principles in the present invention, Equivalent, improvement etc., are all contained in protection scope of the present invention.

Claims (10)

1. it is a kind of generate Asset Tag method, it is characterised in that including:
Obtain the assets information of desired asset;
According to the assets information, the image in 2 D code of the desired asset is generated;
According to the image in 2 D code, the Asset Tag of the desired asset is generated.
2. method according to claim 1, it is characterised in that
It is described that the image in 2 D code of the desired asset is generated according to the assets information, including:
The assets information is encrypted, the first ciphertext is generated;
According to first ciphertext, the image in 2 D code is generated so that in image in 2 D code described in first user terminal recognition When, when the first user terminal can decrypt first ciphertext, the money can be shown in the first user terminal Product information, when the first user terminal can not decrypt first ciphertext, institute can not be shown in the first user terminal State assets information.
3. method according to claim 1, it is characterised in that
It is described that the image in 2 D code of the desired asset is generated according to the assets information, including:
The first secrecy assets information and the second secrecy assets information are proposed from the assets information of the desired asset;
The second secrecy assets information is encrypted, the second ciphertext is generated;
According to second ciphertext and the first secrecy assets information, the image in 2 D code is generated so that in second user Described in terminal recognition during image in 2 D code, when the second user terminal cannot decrypt second ciphertext, described second The first secrecy assets information is shown on user terminal, when the second user terminal can decrypt second ciphertext, The first secrecy assets information and the second secrecy assets information are shown in the second user terminal.
4. method according to claim 1, it is characterised in that
After the assets information for obtaining desired asset, further include:
Ostensible assets information is extracted from the assets information of the desired asset;
It is described that the Asset Tag of the desired asset is generated according to the image in 2 D code, including:
The ostensible assets information and the image in 2 D code are presented in the Asset Tag of the desired asset.
5. according to any described method in claim 1-4, it is characterised in that
Described according to the assets information, after the image in 2 D code of the generation desired asset, described according to described two Dimension code image, before generating the Asset Tag of the desired asset, further includes:
According to the assets information of the desired asset, the desired asset information in the image in 2 D code is verified, when logical When crossing verification, perform described according to the image in 2 D code, the Asset Tag of the generation desired asset, when not over verification When, return to execution described according to the assets information, the image in 2 D code of the generation desired asset.
6. it is a kind of generate Asset Tag device, it is characterised in that including:
Acquiring unit, the assets information for obtaining desired asset;
Image generation unit, for according to the assets information, generating the image in 2 D code of the desired asset;
Label generation unit, for according to the image in 2 D code, generating the Asset Tag of the desired asset.
7. device according to claim 6, it is characterised in that
Described image generation unit, including:
First encryption sub-unit operable, for being encrypted to the assets information, generates the first ciphertext;
First image generates subelement, for according to first ciphertext, generating the image in 2 D code so that in first user Described in terminal recognition during image in 2 D code, when the first user terminal can decrypt first ciphertext, described first User terminal can show the assets information, when the first user terminal can not decrypt first ciphertext, described First user terminal can not show the assets information.
8. device according to claim 6, it is characterised in that
Described image generation unit, including:
Security information extraction unit, for proposing the first secrecy assets information and second from the assets information of the desired asset Secrecy assets information;
Second encryption sub-unit operable, for being encrypted to the second secrecy assets information, generates the second ciphertext;
Second image generates subelement, for according to the ciphertext and the first secrecy assets information, generating the Quick Response Code Image so that in image in 2 D code described in second user terminal recognition, when the second user terminal cannot decrypt described During two ciphertexts, the first secrecy assets information is shown in the second user terminal, when the second user terminal can When decrypting second ciphertext, the first secrecy assets information and second secrecy are shown in the second user terminal Assets information.
9. device according to claim 6, it is characterised in that
Further include:
Public information extraction unit, for extracting ostensible assets information from the assets information of the desired asset;
The label generation unit, for the ostensible assets information and the image in 2 D code to be presented in into the target In the Asset Tag of assets.
10. according to any described device in claim 6-9, it is characterised in that
Further include:
Verification unit, for the assets information according to the desired asset, to the desired asset information in the image in 2 D code Verified, when by verifying, triggered the label generation unit, when not over verification, triggering described image generation Unit.
CN201710095515.8A 2017-02-22 2017-02-22 A kind of method and device for generating Asset Tag Pending CN106803116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710095515.8A CN106803116A (en) 2017-02-22 2017-02-22 A kind of method and device for generating Asset Tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710095515.8A CN106803116A (en) 2017-02-22 2017-02-22 A kind of method and device for generating Asset Tag

Publications (1)

Publication Number Publication Date
CN106803116A true CN106803116A (en) 2017-06-06

Family

ID=58987512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710095515.8A Pending CN106803116A (en) 2017-02-22 2017-02-22 A kind of method and device for generating Asset Tag

Country Status (1)

Country Link
CN (1) CN106803116A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171287A (en) * 2017-12-12 2018-06-15 国网安徽省电力公司滁州供电公司 Measuring equipment assets check and management system based on two-dimentional code encryption and concealed anti-false
CN108229609A (en) * 2017-12-29 2018-06-29 杭州清本科技有限公司 Purpose balance management method and device, computer storage media
CN110009079A (en) * 2019-04-17 2019-07-12 尤尼泰克(嘉兴)信息技术有限公司 A kind of label identification method and equipment based on two dimensional code
CN114004318A (en) * 2020-07-28 2022-02-01 国网天津市电力公司 Novel low pressure identification label based on terminal integration is joined in marriage in marketing
CN114640438A (en) * 2022-03-21 2022-06-17 重庆市规划和自然资源信息中心 Full-factor informatization management method based on informatization assets

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203149998U (en) * 2012-12-27 2013-08-21 深圳市世合科技有限公司 Bi-layer two-dimensional code label
WO2015146021A1 (en) * 2014-03-24 2015-10-01 株式会社デンソー Two-dimensional code generation device and two-dimensional code generation program product
CN106203556A (en) * 2016-07-18 2016-12-07 智能唯识科技(深圳)有限公司 A kind of method and device of reading electronic labels information
CN106203215A (en) * 2016-07-06 2016-12-07 国家电网公司 Quick Response Code application process and system for Application of Power Metering Instruments

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203149998U (en) * 2012-12-27 2013-08-21 深圳市世合科技有限公司 Bi-layer two-dimensional code label
WO2015146021A1 (en) * 2014-03-24 2015-10-01 株式会社デンソー Two-dimensional code generation device and two-dimensional code generation program product
CN106203215A (en) * 2016-07-06 2016-12-07 国家电网公司 Quick Response Code application process and system for Application of Power Metering Instruments
CN106203556A (en) * 2016-07-18 2016-12-07 智能唯识科技(深圳)有限公司 A kind of method and device of reading electronic labels information

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171287A (en) * 2017-12-12 2018-06-15 国网安徽省电力公司滁州供电公司 Measuring equipment assets check and management system based on two-dimentional code encryption and concealed anti-false
CN108229609A (en) * 2017-12-29 2018-06-29 杭州清本科技有限公司 Purpose balance management method and device, computer storage media
CN110009079A (en) * 2019-04-17 2019-07-12 尤尼泰克(嘉兴)信息技术有限公司 A kind of label identification method and equipment based on two dimensional code
CN114004318A (en) * 2020-07-28 2022-02-01 国网天津市电力公司 Novel low pressure identification label based on terminal integration is joined in marriage in marketing
CN114640438A (en) * 2022-03-21 2022-06-17 重庆市规划和自然资源信息中心 Full-factor informatization management method based on informatization assets
CN114640438B (en) * 2022-03-21 2023-09-22 重庆市规划和自然资源信息中心 Full-element informatization management method based on informationized asset

Similar Documents

Publication Publication Date Title
CN106803116A (en) A kind of method and device for generating Asset Tag
CN107239666B (en) Method and system for desensitizing medical image data
US11210510B2 (en) Storing anonymized identifiers instead of personally identifiable information
EP3869385B1 (en) Method for extracting structural data from image, apparatus and device
CN103294746B (en) For the method and system for going identification in visual media data
WO2022105179A1 (en) Biological feature image recognition method and apparatus, and electronic device and readable storage medium
CN110097329A (en) Signal auditing method, device, equipment and computer readable storage medium
CN103761221B (en) System and method for identifying sensitive text messages
JP6795195B2 (en) Character type estimation system, character type estimation method, and character type estimation program
CN107451643A (en) Generation, recognition methods and the device of dynamic two-dimension code
US10867170B2 (en) System and method of identifying an image containing an identification document
Du Mobile payment recognition technology based on face detection algorithm
CN113887438A (en) Watermark detection method, device, equipment and medium for face image
US11495338B1 (en) Methods and systems for redistributing medication
CN113888675A (en) Method, system, apparatus, and medium for generating a document image
CN113190310B (en) Verification code design method based on random position object semantic recognition
CA2942366A1 (en) Pharmacy authentication methods and systems
CN111783725A (en) Face recognition method, face recognition device and storage medium
CN105786415A (en) File printing encryption method and device
CN114329030A (en) Information processing method and device, computer equipment and storage medium
KR102221684B1 (en) Multiclass classification apparatus, method thereof and computer readable medium having computer program recorded therefor
CN113837751A (en) Transaction implementation method and device for digital currency
CN109726625A (en) Anti- face identification method, device, terminal device and storage medium
CN104408631A (en) Application method of anti-counterfeit labels
Chithra et al. Deep learning-based facial deepfake detection using mobilenetv2 and vgg16

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170606