CN107862364A - The generation method and system for the individual identification mark that a kind of plain code is combined with password - Google Patents
The generation method and system for the individual identification mark that a kind of plain code is combined with password Download PDFInfo
- Publication number
- CN107862364A CN107862364A CN201711090587.XA CN201711090587A CN107862364A CN 107862364 A CN107862364 A CN 107862364A CN 201711090587 A CN201711090587 A CN 201711090587A CN 107862364 A CN107862364 A CN 107862364A
- Authority
- CN
- China
- Prior art keywords
- mark
- central server
- code
- scanning device
- format
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06103—Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00661—Sensing or measuring mailpieces
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00661—Sensing or measuring mailpieces
- G07B2017/00709—Scanning mailpieces
- G07B2017/00717—Reading barcodes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00741—Cryptography or similar special procedures in a franking system using specific cryptographic algorithms or functions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00822—Cryptography or similar special procedures in a franking system including unique details
- G07B2017/00838—Personal data, i.e. biometrics
Abstract
The generation method and system for the individual identification mark being combined the invention discloses a kind of plain code with password, selection mark format;Image-region by the person identifier image completion of input to mark format;The personal essential information of input is converted into binary numeral, generates final filling content;By the cryptographic zone of final filling fills to mark format;According to the mark format of obtained image-region, cryptographic zone and selection, final mark is generated.Plain code is organically combined with password, plain code facilitates holder directly to carry out nature recognition, the private information of cryptoguard holder, is formed and is identified with privacy protection function and convenient and practical individual identification;Mark generating method can use the combination of a variety of formats, improve the quantity that Different Individual is identified under unit area, meet the requirement of the large-scale application of 1,300,000,000 populations of mark;Multiple fields are can be widely applied to, the individual identification purposes of individual privacy protection is carried out especially under PE.
Description
Technical field
The generation method and system for the individual identification mark being combined the present invention relates to a kind of plain code with password.
Background technology
Current social high speed development, the stream of people, logistics, information flow are extremely flourishing, in the above process, convenient effectively to enter
Row individual identification is to ensure its safe and effective basis.Individual is identified using plain code, leakage of private information will be caused.Especially
The measure that famine is effectively protected to personal information, cause a large amount of personal information by some malicious person persons or machine
Structure is illegally usurped, maliciously used.And there is convenience loss during causing using cipher mark individual, particularly participate in it
In individual, such as help without professional equipment will be unable to be identified.Therefore, it is badly in need of having new technology convenient to carry out to solve this
Individual problem.
The defects of prior art is present be:
First, with the continuous expansion of Quick Response Code application scenarios, it can be accommodated on the premise of recognition efficiency is ensured
Information content starts to become increasingly to have too many difficulties to cope with.Especially when being identified as individual identification, this phenomenon more highlights.
Second, in existing logistics, express waybill, the sensitive privacy letter such as sender, the name of addressee, phone, address
Breath uses plain code, and Direct Mark is on waybill.The exposure of information, it is the serious threat to personal security, gently then easily to individual
It is artificial into unnecessary harassing and wrecking, it is heavy then produce the great person or economic loss, such event are all occurring all the time, be badly in need of
Solved.
3rd, if personal information be encrypted using prior art, courier and consignee will be unable to Direct Recognition,
Cause express delivery sort process and consignee's picking process very inconvenient.Therefore, whether businessman or individual, including logistics
Field can only let alone the leakage of personal information, also privacy information is not encrypted.
The content of the invention
In order to solve the deficiencies in the prior art, the invention provides the individual identification mark that a kind of plain code is combined with password
Generation method, its capacity is big, identification is strong, disclosure satisfy that the irrealizable function of current other technologies institute;
First technical scheme proposed by the present invention:
A kind of generation method for the individual identification mark that plain code is combined with password, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most
Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104)
(101) the mark format of selection, generates final mark, final mark is stored.
The beneficial effect of above-mentioned steps is:Because diverse location, size, shape or sample be present in image-region and cryptographic zone
The permutation and combination of formula, solve the problems, such as to identify capacity, and the personal essential information of input is converted into binary numeral, it is raw
Into final filling content;By final filling fills to the cryptographic zone of mark format, also achieve to personal essential information
Protection, courier only need barcode scanning can complete digital independent, without being manually entered, consignee only needs to see that image must
Know whether be the express delivery of oneself, without ransacing in turn.Both everybody privacy had been protected, and can enough improves the speed of sorting.
The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into
Figure, top is divided into figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code
And outside is figure, is figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is
Code, the lower left corner and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, upper left
Angle and the lower right corner are figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles be figure and remaining
Part is the figure of code and the layout of code;
The beneficial effect of above-mentioned format is:Improve the capacity of mark.
In the case where pattern formula is constant, by the change of the position of figure, the change of the content of the code of personal information, can go out
Existing different mark;
In the case of constant in figure position, by the change of the pattern of figure, the change of the content of the code of personal information, it can go out
Existing different mark;
In the case of the shape invariance of figure, pass through the change of the position of figure, the change of the content of the code of personal information, meeting
There is different marks;
In the case of the size constancy of figure, pass through the change of the shape of figure, the change of the content of the code of personal information, meeting
There is different marks;Above-mentioned example has been presented for the form of a variety of marks, by this permutation and combination, disclosure satisfy that mark
Large Copacity demand.
The personal essential information of the step (102), including:Name, identification card number or cell-phone number;
Personal essential information, the beneficial effect comprising name and cell-phone number are after disclosure satisfy that courier is scanned to code, to lead to
Cell-phone number is crossed to call the consignee of express delivery;
Personal essential information, the beneficial effect comprising identification card number are:It disclosure satisfy that country to delivery industry system of real name
It is required that.
Step (102) the person identifier image, including:Landscape image, facial image, animal painting or self-defining image
Picture.
Person identifier image, including the beneficial effect of custom images is:It disclosure satisfy that the personalized of consumer oneself needs
Ask, it can also enough realizing the expansion of mark capacity by the combination of different images and code.
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, return simultaneously
Step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:The pressure for avoiding repeated registration from being brought to server, also avoids repeated registration
Account influences the uniqueness of mark.
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt lattice
Formula is wrong, while return to step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:By the personal essential information of formatting, normalized data can be obtained, are kept away
Exempt from mistake of the later stage to personal essential information coding-belt.For example X and x in identification card number, this step can be unified for greatly
Write female X.So avoid after being converted into binary numeral, inconsistent phenomenon.
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt lattice
Formula is wrong, while return to step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:By the image of preset format requirement, user is on the one hand avoided using illegal
Or the image being offensive to morality, still further aspect are also the normalized to image, facilitate the progress of subsequent step.
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling of generation
It is the step of execution before content:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;Computing is encrypted
Information, directional information, mark layout information and redundancy check code afterwards generates final filling content by two-dimension code generator.
The beneficial effect of above-mentioned steps is:Personal essential information is carried out to shift encryption and computing encryption, can be to individual
Essential information is effectively encrypted, and avoids illegally being usurped by personal or mechanism, user is caused damage.Still further aspect, direction
Information is filled into final filling content, when being for follow-up identification marking, is capable of the direction of quick identification marking, redundancy
Check code is filled into final filling content, when being for follow-up identification marking, when running into part and tearing to pieces, pollute or block
It still is able to correctly be distinguished.
The effect that the directional information is set is:During convenient reading mark, the position of mark is revolved rapidly
Just, fast and easy identifies switch.
It is described mark layout information set effect be:After being ajusted in home position, can fast resolution go out image-region
And cryptographic zone, accelerate speed and accuracy that mark identifies.
The final filling content is dot matrix Quick Response Code.
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image
Capacity and picture format.
The effect of the requirement of picture format is:By the uniqueness requirement of picture material, the relatively unique of image ensure that
Property, avoid user all with a picture strip come identify oneself express delivery when misrecognition perplex.Pass through the figure of preset format requirement
Picture, it is also the normalized to image on the one hand to avoid user using image that is illegal or being offensive to morality, still further aspect,
Facilitate the progress of subsequent step.
Second technical scheme proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):Identifying whether for the Current Scan of scanning device reception central server feedback is pre- in database
The mark first stored, if so, then scanning device receives the pre-stored validation problem that central server is sent;If not database
In the mark that prestores, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device
The decoded result of central server is received, otherwise, receives authentication failed instruction.
Second technical scheme also includes:Step (206):The cell-phone number that scanning device obtains according to decoding, is dialled
Or SMS is sent, scanning device shows dialing status:Dial, have turned on or hung up, cell-phone number will not show
Show in scanning device.
The beneficial effect of above-mentioned steps is:Coding/decoding method is described from the angle of scanning device, all data checks come from
In central server, avoid cracking leakage by local.Increase verification process, it is ensured that the identity of holder is effective, avoids false claiming existing
As.Validation problem is random and can switch over, and facilitates Dai Lingzhe to carry out for neck.Also various biological identification technologies are can access, with
Improve the security of individual checking.It is to avoid holding in the link as telephone number carries out implicit operation to necessary operation information
The leakage of someone's personal sensitive information, while the operation of aspect user.
3rd technical scheme proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is advance in database
The mark of storage, if so, the pre-stored validation problem that then central server is sent to scanning device;It is if not pre- in database
The mark first stored, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will
The instruction being verified is sent to scanning device, otherwise, sends authentication failed instruction.
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
Can be used in the personal information retrieved, is verified the field of personal uniqueness by central server, such as:Identity card
Number, telephone number etc., a problem are generated at random according to validation problem create-rule, such as:In the 8 to 12nd of identity card
Hold, be sent to scanning device;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, correctly then
Transmission is verified instruction to scanning device, and the incorrect authentication failed that then sends is to scanning device.
The validation problem, including:Word problem or bio-identification checking, bio-identification checking include fingerprint recognition, referred to
Other verification methods such as hand vein recognition or face recognition.
4th technical scheme proposed by the present invention:
Scanning device, computer instruction is stored thereon with, when the computer instruction is run by processor, completes following walk
Suddenly:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identify whether to be prestored in database
Mark, if so, then receiving the pre-stored validation problem that central server is sent;If not the mark prestored in database
Know, then feedback scan failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received
Instructed to authentication failed.
5th technical scheme proposed by the present invention:
Central server, computer instruction is stored thereon with, when the computer instruction is run by processor, completed following
Step:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database,
If so, the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feed back and sweep
Retouch failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission is verified instruction to scanning
Equipment, otherwise, send authentication failed instruction.
The beneficial effect of above-mentioned steps is:Central server is described, due to image-region from cryptographic zone in the presence of different
Position, size, the permutation and combination of shape or pattern, the problem of meeting mark capacity, and by the personal essential information of input
Binary numeral is converted into, generates final filling content;It is also real by the cryptographic zone of final filling fills to mark format
The protection to personal essential information is showed, courier only needs barcode scanning can to complete digital independent, without being manually entered, received
It is the express delivery of oneself that people, which only needs to see that image is just known whether, without ransacing in turn.Both everybody privacy had been protected, and can enough improves
The speed of sorting, but also meet the demand of mark capacity.
6th technical scheme proposed by the present invention:
A kind of generation system for the individual identification mark that plain code is combined with password, including:Memory, processor and deposit
Storage on a memory, and the computer instruction run on a processor, when the computer instruction is run by processor, complete with
Lower step:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most
Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104)
(101) the mark format of selection, generates final mark, final mark is stored.
The beneficial effect of above-mentioned steps is:Whole system is described, because image-region from cryptographic zone has different positions
Put, the permutation and combination of size, shape or pattern, the problem of meeting mark capacity, and the personal essential information of input is turned
Change binary numeral into, generate final filling content;By final filling fills to the cryptographic zone of mark format, also realize
Protection to personal essential information, courier only need barcode scanning can to complete digital independent, without being manually entered, consignee
It is the express delivery of oneself only to need to see that image is just known whether, without ransacing in turn.Both everybody privacy had been protected, and can enough improves point
The speed picked, but also meet the demand of mark capacity.
Compared with prior art, the beneficial effects of the invention are as follows:
1st, it is proposed by the present invention mark be not only will figure and code be combined, it is often more important that, to figure and code position,
Size, style provide diversified collocation selection, and the array of code can also have a variety of changes, so by different figures and
The permutation and combination of different codes, the information content can of the mark of formation meet to identify on the premise of higher recognition efficiency is ensured
The demand of enough Different Individuals;
2nd, the figure in mark proposed by the present invention, can be certainly because its position, size, pattern and shape are all different
Definition, so, if asking for the link of express delivery, express delivery quantity is very more, takes the people of express delivery, can be all without ransacing one by one
Express delivery, without scrutinizing the name on express delivery list one by one, it is only necessary to have a look at image be oneself setting image can
To find the express delivery of oneself at a glance.
3rd, mark proposed by the present invention, as holder, can intuitively recognize mark so as to know the object whether be
Personal belongings.As user, the operation of all links can conveniently be completed without increasing answering for processing by mark
Polygamy.Therefore, both ensured that individual privacy information was not revealed using this identification method, while in turn ensured that the convenience used;
Mark proposed by the present invention, it will effectively contain the leak case of individual privacy information, according to the scale promoted, recognize and used not
Disconnected to expand, protection is also by synchronous expansion.Asked in the leakage of personal information that logistics, delivery industry are expected to solve more than 80%
Topic.
4th, individual privacy information is effectively protected under PE;Identifying transmitter can be by special equipment to mark
Information in knowledge carries out mandate recognition;Mark holder with the naked eye can directly be identified;
5th, plain code is organically combined with password, plain code facilitates holder directly to carry out nature recognition, cryptoguard
The private information of holder, formed and identified with privacy protection function and convenient and practical individual identification;Mark generating method can
Using the combination of a variety of formats, to improve the quantity that Different Individual is identified under unit area, meet 1,300,000,000 populations of mark
The requirement of large-scale application;Multiple fields are can be widely applied to, of individual privacy protection is carried out especially under PE
Body identifies purposes.
Brief description of the drawings
The Figure of description for forming the part of the application is used for providing further understanding of the present application, and the application's shows
Meaning property embodiment and its illustrate be used for explain the application, do not form the improper restriction to the application.
Fig. 1 is the flow chart of the present invention;
Fig. 2 (a)-Fig. 2 (h) is the embodiment of individual identification of the present invention mark;
Fig. 3 is the embodiment of the mark of the present invention;
Fig. 4 is the embodiment of the mark of the present invention.
Embodiment
It is noted that described further below is all exemplary, it is intended to provides further instruction to the application.It is unless another
Indicate, all technologies used herein and scientific terminology are with usual with the application person of an ordinary skill in the technical field
The identical meanings of understanding.
It should be noted that term used herein above is merely to describe embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singulative
It is also intended to include plural form, additionally, it should be understood that, when in this manual using term "comprising" and/or " bag
Include " when, it indicates existing characteristics, step, operation, device, component and/or combinations thereof.
One embodiment proposed by the present invention:
As shown in figure 1, a kind of generation method for the individual identification mark that plain code is combined with password, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
It is described to be identified as square as shown in Fig. 2 (a)-Fig. 2 (h).
The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into
Figure, top is divided into figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code
And outside is figure, is figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is
Code, the lower left corner and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, upper left
Angle and the lower right corner are figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles be figure and remaining
Part is the figure of code and the layout of code;
Step (102):Receive personal essential information and person identifier image;
The personal essential information of the step (102), including:Name, identification card number or cell-phone number;
Step (102) the person identifier image, including:Landscape image, facial image, animal painting or self-defining image
Picture;The custom images, the photo e.g. shot by camera installation or the image voluntarily drawn by mapping software,
Meets the needs of user DIY.
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, return simultaneously
Step (102);Otherwise, into step (103).
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt lattice
Formula is wrong, while return to step (102);Otherwise, into step (103).The preset format requirement of personal essential information, such as:
Name must be Chinese or phonetic, not allow to use the complex form of Chinese characters;Identification card number must be 18, and what it is containing letter must be capital letter
It is female;Cell-phone number must be 11, it is necessary to be numeral;Deng.
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt lattice
Formula is wrong, while return to step (102);Otherwise, into step (103).
Image preset format, such as:Whether the resolution ratio of image, the size of image, the content of image are illegal etc..
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most
Cryptographic zone of the filling fills to mark format eventually;
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling of generation
It is the step of execution before content:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;Computing is encrypted
Information, directional information, mark layout information and redundancy check code afterwards generates final filling content by two-dimension code generator.
The final filling content is point horizontal and vertical parity check code.
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104)
(101) the mark format of selection, generates final mark, final mark is stored.
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image
Capacity and picture format.
Second embodiment proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):Identifying whether for the Current Scan of scanning device reception central server feedback is pre- in database
The mark first stored, if so, then scanning device receives the pre-stored validation problem that central server is sent;If not database
In the mark that prestores, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device
The decoded result of central server is received, otherwise, receives authentication failed instruction.
Second embodiment also includes:Step (206):Scanning device according to the obtained cell-phone number of decoding, dialled or
SMS is sent, scanning device shows dialing status:Dial, have turned on or hung up, cell-phone number will not be shown
In scanning device.
3rd embodiment proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is advance in database
The mark of storage, if so, the pre-stored validation problem that then central server is sent to scanning device;It is if not pre- in database
The mark first stored, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will
The instruction being verified is sent to scanning device, otherwise, sends authentication failed instruction.
The central server, such as can be Cloud Server.
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
Can be used in the personal information retrieved, is verified the field of personal uniqueness by central server, such as:Identity card
Number, telephone number etc., a problem are generated at random according to validation problem create-rule, such as:In the 8 to 12nd of identity card
Hold, be sent to scanning device;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, correctly then
Transmission is verified instruction to scanning device, and the incorrect authentication failed that then sends is to scanning device.
The validation problem, including:Word problem or bio-identification checking, bio-identification checking include fingerprint recognition, referred to
Other verification methods such as hand vein recognition or face recognition.
4th embodiment proposed by the present invention:
Scanning device, computer instruction is stored thereon with, when the computer instruction is run by processor, completes following walk
Suddenly:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identify whether to be prestored in database
Mark, if so, then receiving the pre-stored validation problem that central server is sent;If not the mark prestored in database
Know, then feedback scan failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received
Instructed to authentication failed.
The scanning device, such as:Probe, scanner or the mobile terminal with scan function;
5th embodiment proposed by the present invention:
Central server, computer instruction is stored thereon with, when the computer instruction is run by processor, completed following
Step:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database,
If so, the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feed back and sweep
Retouch failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission is verified instruction to scanning
Equipment, otherwise, send authentication failed instruction.
6th embodiment proposed by the present invention:
A kind of generation system for the individual identification mark that plain code is combined with password, including:Memory, processor and deposit
Storage on a memory, and the computer instruction run on a processor, when the computer instruction is run by processor, complete with
Lower step:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most
Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104)
(101) the mark format of selection, generates final mark, final mark is stored.
As shown in Figure 3 and Figure 4, specific embodiment of the present invention:Fig. 3 illustrates the example of left code right figure, and Fig. 4 is illustrated
The example of code figure below.
It will be understood by those skilled in the art that each module or each step of the invention described above can be filled with general computer
Put to realize, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
Performed in the storage device by computing device, either they are fabricated to respectively each integrated circuit modules or by they
In multiple modules or step be fabricated to single integrated circuit module to realize.The present invention be not restricted to any specific hardware and
The combination of software.
The preferred embodiment of the application is the foregoing is only, is not limited to the application, for the skill of this area
For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair
Change, equivalent substitution, improvement etc., should be included within the protection domain of the application.
Claims (10)
1. a kind of generation method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and cryptographic zone,
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;To finally it fill out
Fills are filled to the cryptographic zone of mark format;
Step (105):The cryptographic zone and step (101) obtained according to step (103) obtained image-region, step (104)
The mark format of selection, generates final mark, and final mark is stored.
2. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that,
The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into figure, upper part
For figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code and outside is
Scheme, be figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is code, lower-left
Angle and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, the upper left corner and the right side
Inferior horn is figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles are figure and remainder is
The figure of code and the layout of code.
3. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that,
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, while return to step
(102);Otherwise, into step (103);
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt form to have
Miss, while return to step (102);Otherwise, into step (103);
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt form to have
Miss, while return to step (102);Otherwise, into step (103).
4. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that,
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling content of generation
Before perform the step of be:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;After computing is encrypted
Information, directional information, mark layout information and redundancy check code generate final filling content by two-dimension code generator;
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image volume
And picture format.
5. a kind of coding/decoding method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):The Current Scan of scanning device reception central server feedback identify whether to be deposited in advance in database
The mark of storage, if so, then scanning device receives the pre-stored validation problem that central server is sent;It is if not pre- in database
The mark first stored, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device receives
To the decoded result of central server, otherwise, authentication failed instruction is received.
6. a kind of coding/decoding method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is prestored in database
Mark, if so, the pre-stored validation problem that then central server is sent to scanning device;If not deposited in advance in database
The mark of storage, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will be verified
The instruction passed through is sent to scanning device, otherwise, sends authentication failed instruction.
7. the coding/decoding method for the individual identification mark that a kind of plain code as claimed in claim 6 is combined with password, it is characterized in that,
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
The field that can be used for verifying personal uniqueness in the personal information retrieved is sent to scanning device by central server;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, and correctly then sends
Instruction is verified to scanning device, the incorrect authentication failed that then sends is to scanning device.
8. scanning device, it is characterized in that, computer instruction is stored thereon with, it is complete when the computer instruction is run by processor
Into following steps:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identifies whether it is the mark prestored in database,
If so, then receive the pre-stored validation problem that central server is sent;If not the mark prestored in database, then instead
Feedback scanning failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received and is tested
Demonstrate,prove failure command.
9. central server, it is characterized in that, computer instruction is stored thereon with, when the computer instruction is run by processor,
Complete following steps:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database, if
It is the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feedback scan
Failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission, which is verified, to be instructed to scanning device,
Otherwise, authentication failed instruction is sent.
10. a kind of generation system for the individual identification mark that plain code is combined with password, it is characterized in that, including:Memory, processing
On a memory, and the computer instruction run on a processor, the computer instruction are run by processor for device and storage
When, complete following steps:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and cryptographic zone,
The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;To finally it fill out
Fills are filled to the cryptographic zone of mark format;
Step (105):The cryptographic zone and step (101) obtained according to step (103) obtained image-region, step (104)
The mark format of selection, generates final mark, and final mark is stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711090587.XA CN107862364B (en) | 2017-11-08 | 2017-11-08 | A kind of generation method and system of the individual identification mark that plain code is combined with password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711090587.XA CN107862364B (en) | 2017-11-08 | 2017-11-08 | A kind of generation method and system of the individual identification mark that plain code is combined with password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107862364A true CN107862364A (en) | 2018-03-30 |
CN107862364B CN107862364B (en) | 2018-09-07 |
Family
ID=61700034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711090587.XA Active CN107862364B (en) | 2017-11-08 | 2017-11-08 | A kind of generation method and system of the individual identification mark that plain code is combined with password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107862364B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109344943A (en) * | 2018-09-30 | 2019-02-15 | 合肥译码智能科技有限公司 | A kind of method of embedded double two-dimensional barcode information secrecy |
CN109948760A (en) * | 2019-03-28 | 2019-06-28 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information demonstrating method and device based on two dimensional code |
CN113312534A (en) * | 2021-05-28 | 2021-08-27 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1618077A (en) * | 2001-11-30 | 2005-05-18 | 国际条形码公司 | System and method for validating a digital image and corresponding data |
CN104036378A (en) * | 2014-06-24 | 2014-09-10 | 吉安市综合物流中心有限公司 | Logistics blind conveying system |
CN105354606A (en) * | 2015-09-30 | 2016-02-24 | 立德高科(昆山)数码科技有限责任公司 | Label formed by two-dimensional code and variable information, generating method and generating system |
CN107016499A (en) * | 2017-03-23 | 2017-08-04 | 国家电网公司 | A kind of substation equipment patrol method recognized based on two-dimentional code encryption |
-
2017
- 2017-11-08 CN CN201711090587.XA patent/CN107862364B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1618077A (en) * | 2001-11-30 | 2005-05-18 | 国际条形码公司 | System and method for validating a digital image and corresponding data |
CN104036378A (en) * | 2014-06-24 | 2014-09-10 | 吉安市综合物流中心有限公司 | Logistics blind conveying system |
CN105354606A (en) * | 2015-09-30 | 2016-02-24 | 立德高科(昆山)数码科技有限责任公司 | Label formed by two-dimensional code and variable information, generating method and generating system |
CN107016499A (en) * | 2017-03-23 | 2017-08-04 | 国家电网公司 | A kind of substation equipment patrol method recognized based on two-dimentional code encryption |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109344943A (en) * | 2018-09-30 | 2019-02-15 | 合肥译码智能科技有限公司 | A kind of method of embedded double two-dimensional barcode information secrecy |
CN109948760A (en) * | 2019-03-28 | 2019-06-28 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information demonstrating method and device based on two dimensional code |
CN113312534A (en) * | 2021-05-28 | 2021-08-27 | 中铁十一局集团第五工程有限公司 | Engineering survey intelligent management platform |
Also Published As
Publication number | Publication date |
---|---|
CN107862364B (en) | 2018-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107862364B (en) | A kind of generation method and system of the individual identification mark that plain code is combined with password | |
US20180219681A1 (en) | Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and id validation methods | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
US20150143483A1 (en) | Device and Method for Identity Authentication Management | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
CN106100850B (en) | Intelligent and safe chip signing messages transmission method and system based on two dimensional code | |
CN105719120A (en) | Method for encrypting privacy information on express waybills | |
JPS5875267A (en) | Method and apparatus for verifying signature of signed message | |
CN109544089A (en) | The method, apparatus and computer equipment of electronic certificate are established based on image recognition | |
CN102340402B (en) | Identity authentication method based on visual cryptography | |
CN105162604A (en) | Feature image identification based verification method and system, and verification server | |
CN103532960A (en) | Text encryption interaction method, encryption method and device, decryption method and device | |
CN106575333A (en) | Transmit an authentication mark | |
CN108010097B (en) | Verification method and verification device for verification code image | |
CN101206542A (en) | Ciphering signature writing pad with press keys and display screen | |
CN104618356B (en) | Auth method and device | |
CN106503527A (en) | A kind of method and apparatus of electronic document fingerprint signature | |
CN106101140B (en) | A kind of method and server of authentification of message | |
CN105897716B (en) | A kind of generation method of website log identifying code | |
CN109075972A (en) | The system and method for certification and the encryption of cipher anti theft | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
CN105912894B (en) | A method of it is anti-fake that passport NO. being used for E-seal printed text | |
CN107644463A (en) | A kind of two-dimensional code scanning Work attendance method | |
JP5778100B2 (en) | Input information authentication apparatus and apparatus program | |
CN110084329A (en) | The set code method of centre letter code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |