CN107682161B - Offline authentication method and device for two-dimensional code - Google Patents

Offline authentication method and device for two-dimensional code Download PDF

Info

Publication number
CN107682161B
CN107682161B CN201711065660.8A CN201711065660A CN107682161B CN 107682161 B CN107682161 B CN 107682161B CN 201711065660 A CN201711065660 A CN 201711065660A CN 107682161 B CN107682161 B CN 107682161B
Authority
CN
China
Prior art keywords
code
authentication
dimensional code
terminal
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711065660.8A
Other languages
Chinese (zh)
Other versions
CN107682161A (en
Inventor
江卫
谭宁
周剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pci Data Service Co ltd
Original Assignee
Guangzhou Pci Data Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Pci Data Service Co ltd filed Critical Guangzhou Pci Data Service Co ltd
Priority to CN201711065660.8A priority Critical patent/CN107682161B/en
Publication of CN107682161A publication Critical patent/CN107682161A/en
Application granted granted Critical
Publication of CN107682161B publication Critical patent/CN107682161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The embodiment of the invention provides an off-line authentication method and equipment of a two-dimensional code, which are applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the method comprises the following steps: acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code; encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code; judging whether the acquired security code is consistent with the extracted security code; and if the judgment result is consistent, the authentication is passed. Therefore, the authentication key is stored in the authentication terminal in advance, so that the off-line security authentication of the two-dimensional code is realized.

Description

Offline authentication method and device for two-dimensional code
Technical Field
The invention relates to the field of authentication, in particular to an off-line authentication method and equipment for a two-dimensional code.
Background
With the rapid development of the mobile internet, the two-dimensional code technology is increasingly applied to various daily lives. Due to the characteristic of one-way information transmission of the two-dimensional code, online real-time authentication must be networked for verifying the two-dimensional code information, which causes the two-dimensional code verification to be seriously dependent on a network. In places with poor network signals or no network at all, such as remote areas, caves, tunnels and the like, online real-time authentication cannot be performed, and application and popularization of the two-dimensional code are influenced. How to realize the off-line security authentication of the two-dimensional code is a problem which needs to be solved urgently at present.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an off-line authentication method and equipment for a two-dimensional code, and off-line security authentication of the two-dimensional code is realized.
Specifically, the present invention proposes the following specific examples:
the embodiment of the invention provides an off-line authentication method of a two-dimensional code, which is applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the method comprises the following steps:
acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code;
encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code;
judging whether the acquired security code is consistent with the extracted security code;
and if the judgment result is consistent, the authentication is passed.
In a specific embodiment, the method further comprises the following steps:
acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal.
In a specific embodiment, the method further comprises the following steps:
receiving a two-dimension code application request of the two-dimension code display end through the two-dimension code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
In a specific embodiment, if the obtained security code is not consistent with the extracted security code, the authentication is not passed.
In a specific embodiment, the authentication key is stored in a SAM module of the authentication terminal.
The embodiment of the invention also provides the off-line authentication equipment of the two-dimensional code, which is applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the apparatus comprises:
the extraction module is used for acquiring the two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal and extracting the security code in the two-dimensional code;
the acquisition module is used for encrypting the two-dimensional code through the authentication key in the authentication terminal so as to acquire a security code;
the judging module is used for judging whether the acquired security code is consistent with the extracted security code;
and the authentication module is used for passing the authentication when the judgment result is consistent.
In a specific embodiment, the method further comprises the following steps:
the storage module is used for acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal.
In a specific embodiment, the method further comprises the following steps:
the security code module is used for receiving a two-dimensional code application request of the two-dimensional code display end through the two-dimensional code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
In a specific embodiment, the authentication module is further configured to: and when the acquired security code is inconsistent with the extracted security code, the authentication is not passed.
In a specific embodiment, the authentication key is stored in a SAM module of the authentication terminal.
Therefore, the embodiment of the invention provides an off-line authentication method and equipment for a two-dimensional code, which are applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the method comprises the following steps: acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code; encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code; judging whether the acquired security code is consistent with the extracted security code; and if the judgment result is consistent, the authentication is passed. Therefore, the authentication key is stored in the authentication terminal in advance, so that the off-line security authentication of the two-dimensional code is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of an offline authentication method for a two-dimensional code according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an offline authentication method for a two-dimensional code according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a process of performing encryption processing by using a secret key in an offline authentication method for a two-dimensional code according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an offline authentication device for a two-dimensional code according to an embodiment of the present invention.
Detailed Description
Various embodiments of the present disclosure will be described more fully hereinafter. The present disclosure is capable of various embodiments and of modifications and variations therein. However, it should be understood that: there is no intention to limit the various embodiments of the disclosure to the specific embodiments disclosed herein, but rather, the disclosure is to cover all modifications, equivalents, and/or alternatives falling within the spirit and scope of the various embodiments of the disclosure.
Hereinafter, the term "includes" or "may include" used in various embodiments of the present disclosure indicates the presence of the disclosed functions, operations, or elements, and does not limit the addition of one or more functions, operations, or elements. Furthermore, as used in various embodiments of the present disclosure, the terms "comprising," "having," and their derivatives, are intended to be only representative of the particular features, integers, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the existence of, or adding to one or more other features, integers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the disclosure, the expression "or" at least one of a or/and B "includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present disclosure may modify various constituent elements in the various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present disclosure.
It should be noted that: if it is described that one constituent element is "connected" to another constituent element, the first constituent element may be directly connected to the second constituent element, and a third constituent element may be "connected" between the first constituent element and the second constituent element. In contrast, when one constituent element is "directly connected" to another constituent element, it is understood that there is no third constituent element between the first constituent element and the second constituent element.
The term "user" used in various embodiments of the present disclosure may indicate a person using an electronic device or a device using an electronic device (e.g., an artificial intelligence electronic device).
The terminology used in the various embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the present disclosure. As used herein, the singular forms are intended to include the plural forms as well, unless the context clearly indicates otherwise. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the various embodiments of the present disclosure belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined in various embodiments of the present disclosure.
Example 1
The embodiment 1 of the invention discloses an off-line authentication method of a two-dimensional code, which is applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; as shown in fig. 1, the method includes:
step 101, acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code;
102, encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code;
step 103, judging whether the acquired security code is consistent with the extracted security code;
and 104, if the judgment result is consistent, the authentication is passed.
In a specific embodiment, as shown in fig. 2, in a specific application scenario, the method for two-dimensional code validity offline authentication based on the SAM secure key of the smart IC card includes the following steps:
1. issuing an authentication key to the terminal equipment: the key for authentication is issued to the terminal device in advance.
2. Saving the authentication key in the SAM: the SAM is a security module, and the key is stored in the SAM to avoid the key leakage.
3. Applying for a two-dimensional code: and the mobile phone client initiates a two-dimension code application to the two-dimension code management system.
4. Request to generate a security code for a two-dimensional code: and the two-dimension code management system initiates the application of the two-dimension code security code to the terminal management system.
5. Generating a security code: the terminal management system uses the authentication key to encrypt the two-dimensional code data to generate a security code
6. Returning a security code: the terminal management system returns the generated security code to the two-dimensional code management system 7, returns the two-dimensional code with the security code: the two-dimension code management system generates a two-dimension code with a security code by using the original two-dimension code and the security code, and returns the two-dimension code to the mobile phone client.
8. And displaying the two-dimension code: and when the user consumes, the two-dimension code is displayed by using the mobile phone.
9. Code scanning and consumption by the terminal: and the terminal scans the two-dimensional code displayed by the mobile phone of the user and reads information.
10. And (3) authentication: and the terminal equipment uses the authentication key stored in the SAM module to perform encryption operation on the two-dimensional code information to obtain a new security code, and compares the security code with the security code of the two-dimensional code band, if the two-dimensional code is the same as the security code, the authentication is successful, and if the two-dimensional code is not the same as the security code, the authentication is failed.
In a specific embodiment, as shown in fig. 2, the method further comprises:
acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal.
In a specific embodiment, the method further comprises the following steps:
receiving a two-dimension code application request of the two-dimension code display end through the two-dimension code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
Specifically, as shown in fig. 3, a security key of the SAM of the smart IC card is taken as an example, where the security key refers to a key stored in the SAM and is used to verify the validity of data exchanged with the terminal. Security code: the value obtained by encrypting the data by using the key, and the same key and data can determine a unique value. That is, the key: a string of data participating in encryption operation cannot be leaked to the outside in the processes of generation and storage.
In a specific embodiment, if the obtained security code is not consistent with the extracted security code, the authentication is not passed.
In a specific embodiment, the authentication key is stored in a SAM module of the authentication terminal.
Specifically, SAM: the terminal is called a Security Access module, namely a Security control module, can store a secret key and an encryption and decryption algorithm inside, is generally installed on a smart card terminal device, is used as Security control of a smart card terminal, realizes the legitimacy authentication between the terminal and an IC card, and can be widely applied to the application fields of city one-card, enterprise one-card, identity recognition, Security control, small-amount consumption and the like. The intelligent IC card SAM security key: refers to a key stored in the SAM for verifying the validity of data exchanged with the terminal. Security code: the value obtained by encrypting the data by using the key, and the same key and data can determine a unique value. And (3) secret key: a string of data participating in encryption operation cannot be leaked to the outside in the processes of generation and storage. )
The problem of two-dimensional code security authentication is solved under an offline environment by utilizing the existing intelligent IC card SAM terminal equipment. Because the prior intelligent IC card SAM terminal equipment is deployed in a large range in real life, such as bus-mounted card swiping equipment, the invention realizes the off-line authentication of the two-dimensional code by utilizing the prior infrastructure, thereby not only ensuring the safety, but also avoiding the repeated construction and popularization of the safety facility of the code scanning terminal.
Specifically, 1, the mobile phone applying for the two-dimensional code may also use a common desktop computer, a tablet computer, a notebook computer, or other devices that can be connected to the two-dimensional code management system.
2. The mobile phone with the security code can be received and displayed by using a common desktop computer, a tablet computer and a notebook computer, and even the two-dimensional code can be printed on paper or other printable materials.
3. The two-dimensional code management system and the terminal management system may be independent of each other, or may be a combined system including the functions of the two systems but not limited to them.
4. The encryption algorithm for generating the two-dimension code security code and the authentication two-dimension code can be the DES and AES algorithms which are internationally common, and can also be the SM4 algorithm which is the national standard, and is not limited to a certain specific algorithm.
Example 2
The embodiment 2 of the invention also provides an off-line authentication device of the two-dimensional code, which is applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; as shown in fig. 4, the apparatus includes:
the extraction module 201 is configured to acquire, through the authentication terminal, a two-dimensional code to be authenticated on the two-dimensional code display end, and extract a security code in the two-dimensional code;
an obtaining module 202, configured to encrypt the two-dimensional code through the authentication key in the authentication terminal to obtain a security code;
the judging module 203 is used for judging whether the acquired security code is consistent with the extracted security code;
and the authentication module 204 is used for passing the authentication when the judgment result is consistent.
In a specific embodiment, the method further comprises the following steps:
the storage module is used for acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal.
In a specific embodiment, the method further comprises the following steps:
the security code module is used for receiving a two-dimensional code application request of the two-dimensional code display end through the two-dimensional code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
In a specific embodiment, the authentication module is further configured to: and when the acquired security code is inconsistent with the extracted security code, the authentication is not passed.
In a specific embodiment, the authentication key is stored in a SAM module of the authentication terminal.
Example 3
The embodiment 3 of the invention discloses a computer storage medium, wherein a computer program is stored in the computer storage medium, and the computer program is applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; as shown in fig. 1, the computer program is configured to perform the following processes:
the process A comprises the steps of obtaining a two-dimensional code to be authenticated on a two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code;
the process B is to encrypt the two-dimensional code through the authentication key in the authentication terminal to obtain a security code;
the process C judges whether the acquired security code is consistent with the extracted security code;
and D, if the judgment result is consistent, the authentication is passed.
In a specific embodiment, the method further comprises:
acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal.
In a specific embodiment, the computer program is further configured to perform the following process:
receiving a two-dimension code application request of the two-dimension code display end through the two-dimension code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
In a specific embodiment, the computer program is further configured to perform the following process: and if the acquired security code is inconsistent with the extracted security code, the authentication is not passed.
In a specific embodiment, the authentication key is stored in a SAM module of the authentication terminal.
Therefore, the embodiment of the invention provides an off-line authentication method and equipment for a two-dimensional code, which are applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the method comprises the following steps: acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code; encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code; judging whether the acquired security code is consistent with the extracted security code; and if the judgment result is consistent, the authentication is passed. Therefore, the authentication key is stored in the authentication terminal in advance, so that the off-line security authentication of the two-dimensional code is realized.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present invention.
Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above-mentioned invention numbers are merely for description and do not represent the merits of the implementation scenarios.
The above disclosure is only a few specific implementation scenarios of the present invention, however, the present invention is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.

Claims (8)

1. The off-line authentication method of the two-dimensional code is characterized by being applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the method comprises the following steps:
acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal;
acquiring a two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal, and extracting a security code in the two-dimensional code;
encrypting the two-dimensional code through the authentication key in the authentication terminal to obtain a security code;
judging whether the acquired security code is consistent with the extracted security code;
and if the judgment result is consistent, the authentication is passed.
2. The off-line authentication method of the two-dimensional code according to claim 1, further comprising:
receiving a two-dimension code application request of the two-dimension code display end through the two-dimension code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
3. The off-line authentication method of the two-dimensional code as claimed in claim 1, wherein if the obtained security code is not identical to the extracted security code, the authentication is not passed.
4. The offline authentication method of two-dimensional code according to claim 1, wherein said authentication key is stored in a SAM module of said authentication terminal.
5. The off-line authentication equipment of the two-dimensional code is characterized by being applied to a system comprising a two-dimensional code display end, a two-dimensional code system, a terminal management system and an authentication terminal, wherein an authentication key is stored in the authentication terminal; the apparatus comprises:
the storage module is used for acquiring an authentication key issued by the terminal management system through the authentication terminal;
storing the authentication key on the authentication terminal;
the extraction module is used for acquiring the two-dimensional code to be authenticated on the two-dimensional code display end through the authentication terminal and extracting the security code in the two-dimensional code;
the acquisition module is used for encrypting the two-dimensional code through the authentication key in the authentication terminal so as to acquire a security code;
the judging module is used for judging whether the acquired security code is consistent with the extracted security code;
and the authentication module is used for passing the authentication when the judgment result is consistent.
6. The offline authentication device for two-dimensional codes according to claim 5, further comprising:
the security code module is used for receiving a two-dimensional code application request of the two-dimensional code display end through the two-dimensional code system;
generating a two-dimensional code based on the two-dimensional code application request through the two-dimensional code system, and requesting a security code corresponding to the generated two-dimensional code from the terminal management system;
encrypting the generated two-dimensional code through the terminal management system based on the authentication key to generate a security code, and feeding back the generated security code to the two-dimensional code system;
the two-dimension code system feeds back the two-dimension code containing the safety code to the two-dimension code display end based on the generated two-dimension code and the generated safety code.
7. The offline authentication device for two-dimensional codes according to claim 5, wherein said authentication module is further configured to: and when the acquired security code is inconsistent with the extracted security code, the authentication is not passed.
8. The offline authentication device for two-dimensional codes according to claim 5, wherein said authentication key is stored in a SAM module of said authentication terminal.
CN201711065660.8A 2017-11-02 2017-11-02 Offline authentication method and device for two-dimensional code Active CN107682161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711065660.8A CN107682161B (en) 2017-11-02 2017-11-02 Offline authentication method and device for two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711065660.8A CN107682161B (en) 2017-11-02 2017-11-02 Offline authentication method and device for two-dimensional code

Publications (2)

Publication Number Publication Date
CN107682161A CN107682161A (en) 2018-02-09
CN107682161B true CN107682161B (en) 2020-12-22

Family

ID=61145825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711065660.8A Active CN107682161B (en) 2017-11-02 2017-11-02 Offline authentication method and device for two-dimensional code

Country Status (1)

Country Link
CN (1) CN107682161B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900302A (en) * 2018-06-19 2018-11-27 广州佳都数据服务有限公司 Two dimensional code generation, generates terminal and authenticating device at authentication method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046870A (en) * 2006-04-27 2007-10-03 陈龙军 Method for raising safety of transaction process using two-dimensional code for identifying local cipher
CN102750510A (en) * 2012-06-19 2012-10-24 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN106096951A (en) * 2016-06-16 2016-11-09 广州地理研究所 Off-line barcode scanning method of payment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106875179A (en) * 2017-02-03 2017-06-20 杭州小步科技有限公司 A kind of offline Quick Response Code method of payment and its system
CN106934437A (en) * 2015-12-29 2017-07-07 成都英黎科技有限公司 A kind of dynamic two-dimension code location coding and the method and system of checking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140282923A1 (en) * 2013-03-14 2014-09-18 Motorola Mobility Llc Device security utilizing continually changing qr codes

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046870A (en) * 2006-04-27 2007-10-03 陈龙军 Method for raising safety of transaction process using two-dimensional code for identifying local cipher
CN102750510A (en) * 2012-06-19 2012-10-24 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN106934437A (en) * 2015-12-29 2017-07-07 成都英黎科技有限公司 A kind of dynamic two-dimension code location coding and the method and system of checking
CN106096951A (en) * 2016-06-16 2016-11-09 广州地理研究所 Off-line barcode scanning method of payment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106875179A (en) * 2017-02-03 2017-06-20 杭州小步科技有限公司 A kind of offline Quick Response Code method of payment and its system

Also Published As

Publication number Publication date
CN107682161A (en) 2018-02-09

Similar Documents

Publication Publication Date Title
US10681025B2 (en) Systems and methods for securely managing biometric data
CN102255917B (en) Method, system and device for updating and synchronizing keys of dynamic token
CN107302435B (en) Identity information processing method and system and corresponding server
US20160012272A1 (en) Fingerprint authentication system and a fingerprint authentication method based on nfc
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
CN110598433B (en) Block chain-based anti-fake information processing method and device
CN103957105A (en) Use identity authentication method and SIM card
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
US11251941B2 (en) Managing cryptographic keys based on identity information
CN113792307A (en) Seal management method and device and electronic equipment
CN107682161B (en) Offline authentication method and device for two-dimensional code
KR20210134214A (en) Contactless card with multiple rotating security keys
CN104462926A (en) Intelligent card identity recognition method and system
CN111552822A (en) User information report generation method based on block chain node communication
CN112910837B (en) Identity authentication method and system based on communication network and readable storage medium thereof
CN109960459A (en) A kind of data-storage system
CN114244518A (en) Digital signature confusion encryption method and device, computer equipment and storage medium
GB2556625A (en) Secure enrolment of biometric data
Mohamed et al. Protecting wireless data transmission in mobile application systems using digital watermarking technique
CN104732137A (en) Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes
CN114091632B (en) Combined service processing method and system
KR102196347B1 (en) System for electronic payment and method for operating the same
CN202309732U (en) Device for executing digital signature of symmetric key
CN102222248A (en) Dynamic monitoring method and system for RFID (radio frequency identification device) data reading-writing
CN116128508A (en) Transaction certificate generation method and device, processor and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant