CN107342854A - The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information - Google Patents

The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information Download PDF

Info

Publication number
CN107342854A
CN107342854A CN201710470605.0A CN201710470605A CN107342854A CN 107342854 A CN107342854 A CN 107342854A CN 201710470605 A CN201710470605 A CN 201710470605A CN 107342854 A CN107342854 A CN 107342854A
Authority
CN
China
Prior art keywords
byte
quick response
response code
data
gate inhibition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710470605.0A
Other languages
Chinese (zh)
Inventor
赖辉龙
陈水明
范孜文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU GOGENIUS TECHNOLOGY Co Ltd
Original Assignee
HANGZHOU GOGENIUS TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU GOGENIUS TECHNOLOGY Co Ltd filed Critical HANGZHOU GOGENIUS TECHNOLOGY Co Ltd
Priority to CN201710470605.0A priority Critical patent/CN107342854A/en
Publication of CN107342854A publication Critical patent/CN107342854A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/40Indexing scheme relating to groups G07C9/20 - G07C9/29
    • G07C2209/41Indexing scheme relating to groups G07C9/20 - G07C9/29 with means for the generation of identity documents

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information, and 31 byte binary data are generated by the data of sign hexadecimal value;After generating 31 byte binary data, 32 new byte datas are obtained by Quick Response Code encryption keys via aes algorithm, and 32 byte data encoded via BASE64 to obtain recognizable character string, finally utilize the text string generation Quick Response Code.The beneficial effects of the invention are as follows:Solve with unencryption or the unsafe factor such as easily expose, be imitated the Quick Response Code that generates without the personal information of other any processing, allow user safely, feel at ease the Quick Response Code of generation must be shared with into anyone, and without concerned about personal privacy leakage the problem of.

Description

The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
Technical field
The present invention relates to encryption and decryption technology field, and in particular to a kind of encrypting and decrypting method of gate inhibition's Quick Response Code authority information And intelligent access control system.
Background technology
Among prior art, two-dimensional bar code/Quick Response Code (2-dimensional bar code) is to exist according to certain rules Plane (on two-dimensional directional) is distributed chequered with black and white geometric figure and carrys out recording data information.It is deposited as a kind of brand-new information Storage, transmission and identification technology, many countries have used it for all trades and professions, including the department such as public security, diplomacy, military affairs comes to each The management of the department such as the management of class certificate, customs, the tax to all kinds of forms and bill etc., while Quick Response Code is also in internet branch The field of paying is risen, and is widely used.
The extensive use of Quick Response Code has benefited from the popularization and application of mobile intelligent terminal equipment, and Quick Response Code, which starts to extend to, to be swept The new business model fields such as code is unlocked, shared bicycle, people have also received Quick Response Code as a kind of side for identifying and verifying Formula carries out the processing of various affairs.
Use of the Quick Response Code among gate control system is also to improve a kind of means of Consumer's Experience, and it can be not only user Itself provides a kind of new Information Authentication mode, can also must conveniently be shared with friend's relatives use.But at the same time also band Carry out some unsafe factors, because the Quick Response Code generated with pure personal information is easily imitated, while also to authority Auditing system proposes higher requirement.
The content of the invention
In view of this, it is an object of the invention to provide a kind of gate inhibition's two dimension code weight that authority information can be encrypted The encrypting and decrypting method and intelligent access control system of limit information, to solve the skill that Quick Response Code existing for prior art is easily imitated Art problem, improve its security performance.
The technical solution of the present invention is to provide a kind of encrypting and decrypting of gate inhibition's Quick Response Code authority information of following steps Method, comprise the following steps:
31 byte binary data are generated by the data of sign hexadecimal value;
After generating 31 byte binary data, 32 new words are obtained by Quick Response Code encryption keys via aes algorithm Joint number evidence, and 32 byte data is encoded via BASE64, the text string generation Quick Response Code that will finally be obtained after coding.
Preferably, described refer to that terminal device obtains from server via aes algorithm by Quick Response Code encryption keys 7 byte AES keys are taken, 7 described byte AES keys are converted to by 14 hexadecimal numbers, and the 7 byte AES key leads to Cross SHA256 generation 256bit keys.
Preferably, the specific generating mode of 32 byte data is as follows:Terminal device obtains 32 from server UUID character strings, are converted to 16 byte U8 form UUID data, and splicing additional data generates 31 byte U8 initial data and used AEC256CBC and 256bit AES keys encrypt the byte U8 encryption datas of 31 byte U8 Raw Data Generations 32.
Preferably, readable Quick Response Code character string is generated using 32 byte U8 encryption datas described in Base64 direct codings, Quick Response Code text string generation Quick Response Code.
Preferably, the encipher-decipher method also includes:Dissection process Quick Response Code flow:
Gate inhibition's main frame obtains the two-dimentional byte AES key of code encryption 7 from server, is passed through by the 7 byte AES key SHA256 generates 256bit keys, and the multifunctional card reader connected by gate inhibition's main frame obtains Quick Response Code character string, uses Base64 decodes Quick Response Code character string, and decrypting 32 byte U8 encryption datas using AEC256CBC and 256bit AES keys generates 31 byte U8 initial data split out 16 byte U8 form UUID data according to protocol version;16 byte U8 form UUID data turn It is changed to 32 UUID character strings.
Another technical solution of the present invention is to provide a kind of intelligent access control system of following structure, based on above-mentioned Encipher-decipher method, including:
Server, for storing 7 byte AES keys and 32 UUID character strings;
Terminal device, the 7 byte AES key and 32 UUID character strings are obtained from server, and after being encrypted, By Quick Response Code text string generation Quick Response Code;
Gate inhibition's main frame, the 7 byte AES key is obtained from server, and the multifunctional card reader being connected through obtains Quick Response Code character string is taken, so as to be decrypted, to obtain the personal information included in terminal device, and completes Information Authentication Afterwards, judge whether to open the door.
Using the method for the present invention, compared with prior art, there is advantages below:Intelligent mobile terminal software of the present invention is adopted Personal authority information is encrypted with specified Crypted password and cipher mode, encrypted content now is not limited only to individual Information, in addition to some other complementary data, then generate Quick Response Code using it;Tested when carrying out authority using the Quick Response Code During card, gate inhibition's main frame reads the Quick Response Code from front end card reader, then will using identical password and corresponding manner of decryption It is reduced to original authority information, finally judges that holder is according to the personal authority of the information and other ancillary informations It is no to be allowed to pass through.Auxiliary information can be used for carrying out period limitation etc. to personal authority.The beneficial effects of the invention are as follows:Solution Determine with unencryption or easily exposed, be imitated the Quick Response Code that generates without the personal information of other any processing etc. no Safety factor so that user can safely, feel at ease the Quick Response Code of generation must be shared with into anyone, and do not have to concerned about personal privacy The problem of leakage.
Brief description of the drawings
Fig. 1 is the principle schematic of intelligent access control system of the present invention.
Embodiment
The preferred embodiments of the present invention are described in detail below in conjunction with accompanying drawing, but the present invention is not restricted to these Embodiment.The present invention covers any replacement made in the spirit and scope of the present invention, modification, equivalent method and scheme.
Thoroughly understand in order that the public has to the present invention, be described in detail in present invention below preferred embodiment specific Details, and description without these details can also understand the present invention completely for a person skilled in the art.
More specifically description is of the invention by way of example referring to the drawings in the following passage.It should be noted that accompanying drawing is adopted Non- accurately ratio is used with more simplified form and, only to convenience, lucidly aid in illustrating the embodiment of the present invention Purpose.
As shown in figure 1, the principle of the intelligent access control system of the present invention is illustrated, based on above-mentioned encipher-decipher method, including:
Server, for storing 7 byte AES keys and 32 UUID character strings;
Terminal device, the 7 byte AES key and 32 UUID character strings are obtained from server, and after being encrypted, By Quick Response Code text string generation Quick Response Code;
Gate inhibition's main frame, the 7 byte AES key is obtained from server, and the multifunctional card reader being connected through obtains Quick Response Code character string is taken, so as to be decrypted, to obtain the personal information included in terminal device, and completes Information Authentication Afterwards, judge whether to open the door.
The encrypting and decrypting method of described gate inhibition's Quick Response Code authority information, comprises the following steps:
31 byte binary data are generated by the data of sign hexadecimal value;List below is shown hexadecimal Value:
Position Length Definition Explanation
0 1 Version Quick Response Code protocol version, it is at present 0x01
1 6 Time Quick Response Code generates time, YYMMDDHHMMSS
7 1 It is reserved Reserve bytes
8 16 UUID User's unique identification ID
24 7 Key Quick Response Code encryption key
After generating 31 byte binary data, 32 new words are obtained by Quick Response Code encryption keys via aes algorithm Joint number evidence, and 32 byte data is encoded via BASE64, will finally it encode obtained recognizable data generation Quick Response Code.
Described to be referred to via aes algorithm by Quick Response Code encryption keys, terminal device obtains 7 bytes from server AES key, 7 described byte AES keys are converted to by 14 hexadecimal numbers, and the 7 byte AES key passes through SHA256 Generate 256bit keys.
The specific generating mode of 32 byte data is as follows:Terminal device obtains 32 UUID character strings from server, Be converted to 16 byte U8 form UUID data, splicing additional data generate 31 byte U8 initial data using AEC256CBC and 256bit AES keys encrypt the byte U8 encryption datas of 31 byte U8 Raw Data Generations 32.
Readable Quick Response Code character string, Quick Response Code character are generated using 32 byte U8 encryption datas described in Base64 direct codings Concatenate into Quick Response Code.
The encipher-decipher method also includes:Dissection process Quick Response Code flow:
Gate inhibition's main frame obtains the two-dimentional byte AES key of code encryption 7 from server, is passed through by the 7 byte AES key SHA256 generates 256bit keys, and the multifunctional card reader connected by gate inhibition's main frame obtains Quick Response Code character string, uses Base64 decodes Quick Response Code character string, and decrypting 32 byte U8 encryption datas using AEC256CBC and 256bit AES keys generates 31 byte U8 initial data
16 byte U8 form UUID data are split out according to protocol version;16 byte U8 form UUID data are converted to 32 UUID character strings.
Although embodiment is separately illustrated and illustrated above, it is related to the common technology in part, in ordinary skill Personnel apparently, can be replaced and integrate between the embodiments, be related to one of embodiment and the content recorded is not known, then Refer to another embodiment on the books.
Embodiments described above, the restriction to the technical scheme protection domain is not formed.It is any in above-mentioned implementation Modifications, equivalent substitutions and improvements made within the spirit and principle of mode etc., should be included in the protection model of the technical scheme Within enclosing.

Claims (6)

1. a kind of encrypting and decrypting method of gate inhibition's Quick Response Code authority information, comprises the following steps:
31 byte binary data are generated by the data of sign hexadecimal value;
After generating 31 byte binary data, 32 new byte numbers are obtained by Quick Response Code encryption keys via aes algorithm According to, and 32 byte data is converted into recognizable character string;
Last mobile terminal will use the text string generation Quick Response Code.
2. the encrypting and decrypting method of gate inhibition's Quick Response Code authority information according to claim 1, it is characterised in that:It is described via Aes algorithm refers to that terminal device obtains 7 byte AES keys, 7 described words from server by Quick Response Code encryption keys Section AES key is converted to by 14 hexadecimal numbers, and the 7 byte AES key generates 256bit keys by SHA256.
3. according to the encrypting and decrypting method of gate inhibition's Quick Response Code authority information of claim 1 or 2, it is characterised in that:32 word The specific generating mode of joint number evidence is as follows:Terminal device obtains 32 UUID character strings from server, is converted to 16 byte U8 lattice Formula UUID data, splicing additional data generate 31 byte U8 initial data and use AEC256CBC and 256bitAES keys encryption 31 The byte U8 encryption datas of byte U8 Raw Data Generations 32.
4. the encrypting and decrypting method of gate inhibition's Quick Response Code authority information according to claim 3, it is characterised in that:Use The recognizable Quick Response Code character string of 32 byte U8 encryption datas generation described in Base64 direct codings, Quick Response Code text string generation two dimension Code.
5. the encrypting and decrypting method of gate inhibition's Quick Response Code authority information according to claim 4, it is characterised in that:Described plus solution Decryption method also includes:Dissection process Quick Response Code flow:
Gate inhibition's main frame obtains the two-dimentional byte AES key of code encryption 7 from server, is given birth to by the 7 byte AES key by SHA256 Into 256bit keys, the multifunctional card reader connected by gate inhibition's main frame is obtained Quick Response Code character string, decoded using Base64 Quick Response Code character string, it is original to generate 31 byte U8 using the byte U8 encryption datas of AEC256CBC and 256bitAES secret key decryptions 32 Data
16 byte U8 form UUID data are split out according to protocol version;16 byte U8 form UUID data are converted to 32 UUID Character string.
A kind of 6. intelligent access control system, based on any one encipher-decipher method of claim 1-5, it is characterised in that:Including:
Server, for storing 7 byte AES keys and 32 UUID character strings;
Terminal device, the 7 byte AES key and 32 UUID character strings are obtained from server, and after being encrypted, by two Dimension code character concatenates into Quick Response Code;
Gate inhibition's main frame, the 7 byte AES key is obtained from server, and the multifunctional card reader being connected through obtains two Code character string is tieed up, so as to be decrypted, to obtain the personal information included in terminal device, and after Information Authentication is completed, Judge whether to open the door.
CN201710470605.0A 2017-06-20 2017-06-20 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information Pending CN107342854A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710470605.0A CN107342854A (en) 2017-06-20 2017-06-20 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710470605.0A CN107342854A (en) 2017-06-20 2017-06-20 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information

Publications (1)

Publication Number Publication Date
CN107342854A true CN107342854A (en) 2017-11-10

Family

ID=60221550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710470605.0A Pending CN107342854A (en) 2017-06-20 2017-06-20 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information

Country Status (1)

Country Link
CN (1) CN107342854A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN109002875A (en) * 2018-06-04 2018-12-14 上海德必创新科技发展有限公司 Two dimensional code encryption method, two dimensional code Transmission system and storage medium
CN109145635A (en) * 2018-07-17 2019-01-04 广州师盛展览有限公司 The method and device that two dimensional code chest card is encapsulated with rights encryption
CN109379351A (en) * 2018-09-30 2019-02-22 武汉斗鱼网络科技有限公司 A kind of two dimensional code encryption method, storage medium, equipment and system
CN111160505A (en) * 2020-03-24 2020-05-15 绿漫科技有限公司 Method for realizing universal two-dimension code of smart community
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof
CN112884957A (en) * 2021-01-14 2021-06-01 广西筑波智慧科技有限公司 Campus one-card identity code generation system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717056A (en) * 2013-12-11 2015-06-17 中国移动通信集团安徽有限公司 Two-dimensional code encryption and decryption method and encryption and decryption device
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Intelligent access control method and system
CN105139491A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone access control system based on encrypted two-dimensional code
CN205230158U (en) * 2015-11-30 2016-05-11 刘奇 Access control system based on two -dimensional code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717056A (en) * 2013-12-11 2015-06-17 中国移动通信集团安徽有限公司 Two-dimensional code encryption and decryption method and encryption and decryption device
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Intelligent access control method and system
CN105139491A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone access control system based on encrypted two-dimensional code
CN205230158U (en) * 2015-11-30 2016-05-11 刘奇 Access control system based on two -dimensional code

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108001067A (en) * 2017-12-06 2018-05-08 上海格尔安全科技有限公司 A kind of electronics pass and its awarding method and verification method based on PKI technologies
CN109002875A (en) * 2018-06-04 2018-12-14 上海德必创新科技发展有限公司 Two dimensional code encryption method, two dimensional code Transmission system and storage medium
CN109002875B (en) * 2018-06-04 2020-06-12 上海德必创新科技发展有限公司 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN109145635A (en) * 2018-07-17 2019-01-04 广州师盛展览有限公司 The method and device that two dimensional code chest card is encapsulated with rights encryption
CN109379351A (en) * 2018-09-30 2019-02-22 武汉斗鱼网络科技有限公司 A kind of two dimensional code encryption method, storage medium, equipment and system
CN109379351B (en) * 2018-09-30 2021-04-27 武汉斗鱼网络科技有限公司 Two-dimensional code encryption method, storage medium, equipment and system
CN111160505A (en) * 2020-03-24 2020-05-15 绿漫科技有限公司 Method for realizing universal two-dimension code of smart community
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof
CN112884957A (en) * 2021-01-14 2021-06-01 广西筑波智慧科技有限公司 Campus one-card identity code generation system and method

Similar Documents

Publication Publication Date Title
CN107342854A (en) The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
US8565436B2 (en) Secure self managed data (SSMD)
CN106203168B (en) Database security accesses system
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN106067205B (en) A kind of gate inhibition's method for authenticating and device
EP3814964B1 (en) Apparatus and method for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature
US11979500B2 (en) Data format-preserving encryption, tokenization, and access control for vaultless systems and methods
CN107992923A (en) A kind of QR Quick Response Codes generation and the method read
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN112332975A (en) Internet of things equipment secure communication method and system
CN106327723A (en) mPOS transaction system based on intelligent platform
CN104123777B (en) A kind of gate inhibition's remote-authorization method
CN106203137B (en) A kind of classified papers access safety system
CN106792669A (en) Information of mobile terminal encryption method and device based on Hybrid Encryption algorithm
CN103093137A (en) File safe distribution method based on universal series bus (USB) flash disk
CN116108410A (en) Identity credential generation method and device
CN105577376A (en) Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device
CN111866547B (en) Novel video tamper-proofing method
CN109413299A (en) Linear canonical transform and chaos Double random phase dual image encryption method
CN107682156A (en) A kind of encryption communication method and device based on SM9 algorithms
CN111200617A (en) Network real-name authentication method and system
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN107633178B (en) File protection system and method based on Android device
WO2001035253A1 (en) Legal-based or fiduciary-based data management process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171110

RJ01 Rejection of invention patent application after publication