CN107862364A - The generation method and system for the individual identification mark that a kind of plain code is combined with password - Google Patents

The generation method and system for the individual identification mark that a kind of plain code is combined with password Download PDF

Info

Publication number
CN107862364A
CN107862364A CN201711090587.XA CN201711090587A CN107862364A CN 107862364 A CN107862364 A CN 107862364A CN 201711090587 A CN201711090587 A CN 201711090587A CN 107862364 A CN107862364 A CN 107862364A
Authority
CN
China
Prior art keywords
mark
central server
code
scanning device
format
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711090587.XA
Other languages
Chinese (zh)
Other versions
CN107862364B (en
Inventor
王少龙
王浩鲁
王笑旸
王瑷玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711090587.XA priority Critical patent/CN107862364B/en
Publication of CN107862364A publication Critical patent/CN107862364A/en
Application granted granted Critical
Publication of CN107862364B publication Critical patent/CN107862364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00459Details relating to mailpieces in a franking system
    • G07B17/00661Sensing or measuring mailpieces
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00459Details relating to mailpieces in a franking system
    • G07B17/00661Sensing or measuring mailpieces
    • G07B2017/00709Scanning mailpieces
    • G07B2017/00717Reading barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00741Cryptography or similar special procedures in a franking system using specific cryptographic algorithms or functions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00822Cryptography or similar special procedures in a franking system including unique details
    • G07B2017/00838Personal data, i.e. biometrics

Abstract

The generation method and system for the individual identification mark being combined the invention discloses a kind of plain code with password, selection mark format;Image-region by the person identifier image completion of input to mark format;The personal essential information of input is converted into binary numeral, generates final filling content;By the cryptographic zone of final filling fills to mark format;According to the mark format of obtained image-region, cryptographic zone and selection, final mark is generated.Plain code is organically combined with password, plain code facilitates holder directly to carry out nature recognition, the private information of cryptoguard holder, is formed and is identified with privacy protection function and convenient and practical individual identification;Mark generating method can use the combination of a variety of formats, improve the quantity that Different Individual is identified under unit area, meet the requirement of the large-scale application of 1,300,000,000 populations of mark;Multiple fields are can be widely applied to, the individual identification purposes of individual privacy protection is carried out especially under PE.

Description

The generation method and system for the individual identification mark that a kind of plain code is combined with password
Technical field
The generation method and system for the individual identification mark being combined the present invention relates to a kind of plain code with password.
Background technology
Current social high speed development, the stream of people, logistics, information flow are extremely flourishing, in the above process, convenient effectively to enter Row individual identification is to ensure its safe and effective basis.Individual is identified using plain code, leakage of private information will be caused.Especially The measure that famine is effectively protected to personal information, cause a large amount of personal information by some malicious person persons or machine Structure is illegally usurped, maliciously used.And there is convenience loss during causing using cipher mark individual, particularly participate in it In individual, such as help without professional equipment will be unable to be identified.Therefore, it is badly in need of having new technology convenient to carry out to solve this Individual problem.
The defects of prior art is present be:
First, with the continuous expansion of Quick Response Code application scenarios, it can be accommodated on the premise of recognition efficiency is ensured Information content starts to become increasingly to have too many difficulties to cope with.Especially when being identified as individual identification, this phenomenon more highlights.
Second, in existing logistics, express waybill, the sensitive privacy letter such as sender, the name of addressee, phone, address Breath uses plain code, and Direct Mark is on waybill.The exposure of information, it is the serious threat to personal security, gently then easily to individual It is artificial into unnecessary harassing and wrecking, it is heavy then produce the great person or economic loss, such event are all occurring all the time, be badly in need of Solved.
3rd, if personal information be encrypted using prior art, courier and consignee will be unable to Direct Recognition, Cause express delivery sort process and consignee's picking process very inconvenient.Therefore, whether businessman or individual, including logistics Field can only let alone the leakage of personal information, also privacy information is not encrypted.
The content of the invention
In order to solve the deficiencies in the prior art, the invention provides the individual identification mark that a kind of plain code is combined with password Generation method, its capacity is big, identification is strong, disclosure satisfy that the irrealizable function of current other technologies institute;
First technical scheme proposed by the present invention:
A kind of generation method for the individual identification mark that plain code is combined with password, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104) (101) the mark format of selection, generates final mark, final mark is stored.
The beneficial effect of above-mentioned steps is:Because diverse location, size, shape or sample be present in image-region and cryptographic zone The permutation and combination of formula, solve the problems, such as to identify capacity, and the personal essential information of input is converted into binary numeral, it is raw Into final filling content;By final filling fills to the cryptographic zone of mark format, also achieve to personal essential information Protection, courier only need barcode scanning can complete digital independent, without being manually entered, consignee only needs to see that image must Know whether be the express delivery of oneself, without ransacing in turn.Both everybody privacy had been protected, and can enough improves the speed of sorting.
The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into Figure, top is divided into figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code And outside is figure, is figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is Code, the lower left corner and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, upper left Angle and the lower right corner are figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles be figure and remaining Part is the figure of code and the layout of code;
The beneficial effect of above-mentioned format is:Improve the capacity of mark.
In the case where pattern formula is constant, by the change of the position of figure, the change of the content of the code of personal information, can go out Existing different mark;
In the case of constant in figure position, by the change of the pattern of figure, the change of the content of the code of personal information, it can go out Existing different mark;
In the case of the shape invariance of figure, pass through the change of the position of figure, the change of the content of the code of personal information, meeting There is different marks;
In the case of the size constancy of figure, pass through the change of the shape of figure, the change of the content of the code of personal information, meeting There is different marks;Above-mentioned example has been presented for the form of a variety of marks, by this permutation and combination, disclosure satisfy that mark Large Copacity demand.
The personal essential information of the step (102), including:Name, identification card number or cell-phone number;
Personal essential information, the beneficial effect comprising name and cell-phone number are after disclosure satisfy that courier is scanned to code, to lead to Cell-phone number is crossed to call the consignee of express delivery;
Personal essential information, the beneficial effect comprising identification card number are:It disclosure satisfy that country to delivery industry system of real name It is required that.
Step (102) the person identifier image, including:Landscape image, facial image, animal painting or self-defining image Picture.
Person identifier image, including the beneficial effect of custom images is:It disclosure satisfy that the personalized of consumer oneself needs Ask, it can also enough realizing the expansion of mark capacity by the combination of different images and code.
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, return simultaneously Step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:The pressure for avoiding repeated registration from being brought to server, also avoids repeated registration Account influences the uniqueness of mark.
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt lattice Formula is wrong, while return to step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:By the personal essential information of formatting, normalized data can be obtained, are kept away Exempt from mistake of the later stage to personal essential information coding-belt.For example X and x in identification card number, this step can be unified for greatly Write female X.So avoid after being converted into binary numeral, inconsistent phenomenon.
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt lattice Formula is wrong, while return to step (102);Otherwise, into step (103).
The beneficial effect of above-mentioned steps is:By the image of preset format requirement, user is on the one hand avoided using illegal Or the image being offensive to morality, still further aspect are also the normalized to image, facilitate the progress of subsequent step.
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling of generation It is the step of execution before content:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;Computing is encrypted Information, directional information, mark layout information and redundancy check code afterwards generates final filling content by two-dimension code generator.
The beneficial effect of above-mentioned steps is:Personal essential information is carried out to shift encryption and computing encryption, can be to individual Essential information is effectively encrypted, and avoids illegally being usurped by personal or mechanism, user is caused damage.Still further aspect, direction Information is filled into final filling content, when being for follow-up identification marking, is capable of the direction of quick identification marking, redundancy Check code is filled into final filling content, when being for follow-up identification marking, when running into part and tearing to pieces, pollute or block It still is able to correctly be distinguished.
The effect that the directional information is set is:During convenient reading mark, the position of mark is revolved rapidly Just, fast and easy identifies switch.
It is described mark layout information set effect be:After being ajusted in home position, can fast resolution go out image-region And cryptographic zone, accelerate speed and accuracy that mark identifies.
The final filling content is dot matrix Quick Response Code.
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image Capacity and picture format.
The effect of the requirement of picture format is:By the uniqueness requirement of picture material, the relatively unique of image ensure that Property, avoid user all with a picture strip come identify oneself express delivery when misrecognition perplex.Pass through the figure of preset format requirement Picture, it is also the normalized to image on the one hand to avoid user using image that is illegal or being offensive to morality, still further aspect, Facilitate the progress of subsequent step.
Second technical scheme proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):Identifying whether for the Current Scan of scanning device reception central server feedback is pre- in database The mark first stored, if so, then scanning device receives the pre-stored validation problem that central server is sent;If not database In the mark that prestores, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device The decoded result of central server is received, otherwise, receives authentication failed instruction.
Second technical scheme also includes:Step (206):The cell-phone number that scanning device obtains according to decoding, is dialled Or SMS is sent, scanning device shows dialing status:Dial, have turned on or hung up, cell-phone number will not show Show in scanning device.
The beneficial effect of above-mentioned steps is:Coding/decoding method is described from the angle of scanning device, all data checks come from In central server, avoid cracking leakage by local.Increase verification process, it is ensured that the identity of holder is effective, avoids false claiming existing As.Validation problem is random and can switch over, and facilitates Dai Lingzhe to carry out for neck.Also various biological identification technologies are can access, with Improve the security of individual checking.It is to avoid holding in the link as telephone number carries out implicit operation to necessary operation information The leakage of someone's personal sensitive information, while the operation of aspect user.
3rd technical scheme proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is advance in database The mark of storage, if so, the pre-stored validation problem that then central server is sent to scanning device;It is if not pre- in database The mark first stored, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will The instruction being verified is sent to scanning device, otherwise, sends authentication failed instruction.
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
Can be used in the personal information retrieved, is verified the field of personal uniqueness by central server, such as:Identity card Number, telephone number etc., a problem are generated at random according to validation problem create-rule, such as:In the 8 to 12nd of identity card Hold, be sent to scanning device;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, correctly then Transmission is verified instruction to scanning device, and the incorrect authentication failed that then sends is to scanning device.
The validation problem, including:Word problem or bio-identification checking, bio-identification checking include fingerprint recognition, referred to Other verification methods such as hand vein recognition or face recognition.
4th technical scheme proposed by the present invention:
Scanning device, computer instruction is stored thereon with, when the computer instruction is run by processor, completes following walk Suddenly:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identify whether to be prestored in database Mark, if so, then receiving the pre-stored validation problem that central server is sent;If not the mark prestored in database Know, then feedback scan failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received Instructed to authentication failed.
5th technical scheme proposed by the present invention:
Central server, computer instruction is stored thereon with, when the computer instruction is run by processor, completed following Step:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database, If so, the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feed back and sweep Retouch failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission is verified instruction to scanning Equipment, otherwise, send authentication failed instruction.
The beneficial effect of above-mentioned steps is:Central server is described, due to image-region from cryptographic zone in the presence of different Position, size, the permutation and combination of shape or pattern, the problem of meeting mark capacity, and by the personal essential information of input Binary numeral is converted into, generates final filling content;It is also real by the cryptographic zone of final filling fills to mark format The protection to personal essential information is showed, courier only needs barcode scanning can to complete digital independent, without being manually entered, received It is the express delivery of oneself that people, which only needs to see that image is just known whether, without ransacing in turn.Both everybody privacy had been protected, and can enough improves The speed of sorting, but also meet the demand of mark capacity.
6th technical scheme proposed by the present invention:
A kind of generation system for the individual identification mark that plain code is combined with password, including:Memory, processor and deposit Storage on a memory, and the computer instruction run on a processor, when the computer instruction is run by processor, complete with Lower step:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104) (101) the mark format of selection, generates final mark, final mark is stored.
The beneficial effect of above-mentioned steps is:Whole system is described, because image-region from cryptographic zone has different positions Put, the permutation and combination of size, shape or pattern, the problem of meeting mark capacity, and the personal essential information of input is turned Change binary numeral into, generate final filling content;By final filling fills to the cryptographic zone of mark format, also realize Protection to personal essential information, courier only need barcode scanning can to complete digital independent, without being manually entered, consignee It is the express delivery of oneself only to need to see that image is just known whether, without ransacing in turn.Both everybody privacy had been protected, and can enough improves point The speed picked, but also meet the demand of mark capacity.
Compared with prior art, the beneficial effects of the invention are as follows:
1st, it is proposed by the present invention mark be not only will figure and code be combined, it is often more important that, to figure and code position, Size, style provide diversified collocation selection, and the array of code can also have a variety of changes, so by different figures and The permutation and combination of different codes, the information content can of the mark of formation meet to identify on the premise of higher recognition efficiency is ensured The demand of enough Different Individuals;
2nd, the figure in mark proposed by the present invention, can be certainly because its position, size, pattern and shape are all different Definition, so, if asking for the link of express delivery, express delivery quantity is very more, takes the people of express delivery, can be all without ransacing one by one Express delivery, without scrutinizing the name on express delivery list one by one, it is only necessary to have a look at image be oneself setting image can To find the express delivery of oneself at a glance.
3rd, mark proposed by the present invention, as holder, can intuitively recognize mark so as to know the object whether be Personal belongings.As user, the operation of all links can conveniently be completed without increasing answering for processing by mark Polygamy.Therefore, both ensured that individual privacy information was not revealed using this identification method, while in turn ensured that the convenience used; Mark proposed by the present invention, it will effectively contain the leak case of individual privacy information, according to the scale promoted, recognize and used not Disconnected to expand, protection is also by synchronous expansion.Asked in the leakage of personal information that logistics, delivery industry are expected to solve more than 80% Topic.
4th, individual privacy information is effectively protected under PE;Identifying transmitter can be by special equipment to mark Information in knowledge carries out mandate recognition;Mark holder with the naked eye can directly be identified;
5th, plain code is organically combined with password, plain code facilitates holder directly to carry out nature recognition, cryptoguard The private information of holder, formed and identified with privacy protection function and convenient and practical individual identification;Mark generating method can Using the combination of a variety of formats, to improve the quantity that Different Individual is identified under unit area, meet 1,300,000,000 populations of mark The requirement of large-scale application;Multiple fields are can be widely applied to, of individual privacy protection is carried out especially under PE Body identifies purposes.
Brief description of the drawings
The Figure of description for forming the part of the application is used for providing further understanding of the present application, and the application's shows Meaning property embodiment and its illustrate be used for explain the application, do not form the improper restriction to the application.
Fig. 1 is the flow chart of the present invention;
Fig. 2 (a)-Fig. 2 (h) is the embodiment of individual identification of the present invention mark;
Fig. 3 is the embodiment of the mark of the present invention;
Fig. 4 is the embodiment of the mark of the present invention.
Embodiment
It is noted that described further below is all exemplary, it is intended to provides further instruction to the application.It is unless another Indicate, all technologies used herein and scientific terminology are with usual with the application person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singulative It is also intended to include plural form, additionally, it should be understood that, when in this manual using term "comprising" and/or " bag Include " when, it indicates existing characteristics, step, operation, device, component and/or combinations thereof.
One embodiment proposed by the present invention:
As shown in figure 1, a kind of generation method for the individual identification mark that plain code is combined with password, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
It is described to be identified as square as shown in Fig. 2 (a)-Fig. 2 (h).
The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into Figure, top is divided into figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code And outside is figure, is figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is Code, the lower left corner and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, upper left Angle and the lower right corner are figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles be figure and remaining Part is the figure of code and the layout of code;
Step (102):Receive personal essential information and person identifier image;
The personal essential information of the step (102), including:Name, identification card number or cell-phone number;
Step (102) the person identifier image, including:Landscape image, facial image, animal painting or self-defining image Picture;The custom images, the photo e.g. shot by camera installation or the image voluntarily drawn by mapping software, Meets the needs of user DIY.
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, return simultaneously Step (102);Otherwise, into step (103).
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt lattice Formula is wrong, while return to step (102);Otherwise, into step (103).The preset format requirement of personal essential information, such as: Name must be Chinese or phonetic, not allow to use the complex form of Chinese characters;Identification card number must be 18, and what it is containing letter must be capital letter It is female;Cell-phone number must be 11, it is necessary to be numeral;Deng.
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt lattice Formula is wrong, while return to step (102);Otherwise, into step (103).
Image preset format, such as:Whether the resolution ratio of image, the size of image, the content of image are illegal etc..
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most Cryptographic zone of the filling fills to mark format eventually;
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling of generation It is the step of execution before content:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;Computing is encrypted Information, directional information, mark layout information and redundancy check code afterwards generates final filling content by two-dimension code generator.
The final filling content is point horizontal and vertical parity check code.
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104) (101) the mark format of selection, generates final mark, final mark is stored.
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image Capacity and picture format.
Second embodiment proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):Identifying whether for the Current Scan of scanning device reception central server feedback is pre- in database The mark first stored, if so, then scanning device receives the pre-stored validation problem that central server is sent;If not database In the mark that prestores, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device The decoded result of central server is received, otherwise, receives authentication failed instruction.
Second embodiment also includes:Step (206):Scanning device according to the obtained cell-phone number of decoding, dialled or SMS is sent, scanning device shows dialing status:Dial, have turned on or hung up, cell-phone number will not be shown In scanning device.
3rd embodiment proposed by the present invention:
A kind of coding/decoding method for the individual identification mark that plain code is combined with password, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is advance in database The mark of storage, if so, the pre-stored validation problem that then central server is sent to scanning device;It is if not pre- in database The mark first stored, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will The instruction being verified is sent to scanning device, otherwise, sends authentication failed instruction.
The central server, such as can be Cloud Server.
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
Can be used in the personal information retrieved, is verified the field of personal uniqueness by central server, such as:Identity card Number, telephone number etc., a problem are generated at random according to validation problem create-rule, such as:In the 8 to 12nd of identity card Hold, be sent to scanning device;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, correctly then Transmission is verified instruction to scanning device, and the incorrect authentication failed that then sends is to scanning device.
The validation problem, including:Word problem or bio-identification checking, bio-identification checking include fingerprint recognition, referred to Other verification methods such as hand vein recognition or face recognition.
4th embodiment proposed by the present invention:
Scanning device, computer instruction is stored thereon with, when the computer instruction is run by processor, completes following walk Suddenly:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identify whether to be prestored in database Mark, if so, then receiving the pre-stored validation problem that central server is sent;If not the mark prestored in database Know, then feedback scan failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received Instructed to authentication failed.
The scanning device, such as:Probe, scanner or the mobile terminal with scan function;
5th embodiment proposed by the present invention:
Central server, computer instruction is stored thereon with, when the computer instruction is run by processor, completed following Step:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database, If so, the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feed back and sweep Retouch failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission is verified instruction to scanning Equipment, otherwise, send authentication failed instruction.
6th embodiment proposed by the present invention:
A kind of generation system for the individual identification mark that plain code is combined with password, including:Memory, processor and deposit Storage on a memory, and the computer instruction run on a processor, when the computer instruction is run by processor, complete with Lower step:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and password area The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in domain, described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;Will most Cryptographic zone of the filling fills to mark format eventually;
Step (105):The cryptographic zone and step obtained according to step (103) obtained image-region, step (104) (101) the mark format of selection, generates final mark, final mark is stored.
As shown in Figure 3 and Figure 4, specific embodiment of the present invention:Fig. 3 illustrates the example of left code right figure, and Fig. 4 is illustrated The example of code figure below.
It will be understood by those skilled in the art that each module or each step of the invention described above can be filled with general computer Put to realize, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Performed in the storage device by computing device, either they are fabricated to respectively each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.The present invention be not restricted to any specific hardware and The combination of software.
The preferred embodiment of the application is the foregoing is only, is not limited to the application, for the skill of this area For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair Change, equivalent substitution, improvement etc., should be included within the protection domain of the application.

Claims (10)

1. a kind of generation method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and cryptographic zone, The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;To finally it fill out Fills are filled to the cryptographic zone of mark format;
Step (105):The cryptographic zone and step (101) obtained according to step (103) obtained image-region, step (104) The mark format of selection, generates final mark, and final mark is stored.
2. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that, The format, is included but are not limited to:Left part is divided into figure and right part is divided into code, left part is divided into code and right part is divided into figure, upper part For figure and bottom is divided into code, top is divided into code and bottom is divided into figure, inside is figure and outside is code, inside is code and outside is Scheme, be figure up and down and left and right is code, is up and down code and left and right is that figure, the lower left corner and the upper right corner are that figure remainder is code, lower-left Angle and the upper right corner are that a yard remainder is that figure, the upper left corner and the lower right corner are code and the upper left corner and the lower right corner is figure, the upper left corner and the right side Inferior horn is figure and the upper left corner and the lower right corner is code, four angles are code and remainder is figure, four angles are figure and remainder is The figure of code and the layout of code.
3. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that,
The step (102) performs following steps after personal essential information is received:
Judge whether personal essential information has been registered, if being registered, prompt to be registered, while return to step (102);Otherwise, into step (103);
The step (102) also performs following steps after personal essential information is received:
Judge whether personal essential information meets the preset format requirement of personal essential information, if not meeting, prompt form to have Miss, while return to step (102);Otherwise, into step (103);
The step (102) also performs following steps after person identifier image is received:
Judge whether person identifier image meets the preset format requirement of person identifier image, if not meeting, prompt form to have Miss, while return to step (102);Otherwise, into step (103).
4. the generation method for the individual identification mark that a kind of plain code as claimed in claim 1 is combined with password, it is characterized in that,
After the personal essential information of input is converted into binary numeral by the step (104), in the final filling content of generation Before perform the step of be:
Numerical value after conversion is subjected to displacement encryption;The numerical value after encrypting will be shifted and carry out computing encryption;After computing is encrypted Information, directional information, mark layout information and redundancy check code generate final filling content by two-dimension code generator;
The preset format requirement of the person identifier image of the step (105), including:Picture size, picture material, image volume And picture format.
5. a kind of coding/decoding method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (201):Scanning device is scanned to final mark;
Step (202):Scanning result is uploaded to central server by scanning device;
Step (203):The Current Scan of scanning device reception central server feedback identify whether to be deposited in advance in database The mark of storage, if so, then scanning device receives the pre-stored validation problem that central server is sent;It is if not pre- in database The mark first stored, then feedback scan failure information;
Step (204):Scanning device receives the Validation Answer Key of input, and Validation Answer Key is uploaded into central server;
Step (205):Scanning device receives the result of central server feedback, if being verified, scanning device receives To the decoded result of central server, otherwise, authentication failed instruction is received.
6. a kind of coding/decoding method for the individual identification mark that plain code is combined with password, it is characterized in that, including:
Step (301):Central server receives scanning device to final mark scanning result;
Step (302):Identifying whether for the Current Scan that central server feeds back to scanning device is prestored in database Mark, if so, the pre-stored validation problem that then central server is sent to scanning device;If not deposited in advance in database The mark of storage, then feedback scan failure information;
Step (303):Central server receives the Validation Answer Key that scanning device uploads;
Step (304):Central server is to scanning device feedback validation result, if being verified, central server will be verified The instruction passed through is sent to scanning device, otherwise, sends authentication failed instruction.
7. the coding/decoding method for the individual identification mark that a kind of plain code as claimed in claim 6 is combined with password, it is characterized in that,
The decoding:
Central server searches cryptographic zone according to mark format first;
Central server adjusts the direction of cryptographic zone according to directional information;
Central server carries out computing decryption to code content;
Content after central server is decrypted to computing carries out displacement decryption;
The binary numeral shifted after decrypting is converted into the essential information of individual by central server;
Central server is retrieved using personal essential information as keyword to personal identification data storehouse;
Retrieve and successfully then enter verification step, retrieve unsuccessful then feedback decoding failure;
The checking:
The field that can be used for verifying personal uniqueness in the personal information retrieved is sent to scanning device by central server;
Central server receives the problem of scanning device is sent answer;
The problem of central server sends scanning device answer is compared with the content that topic is related to, and correctly then sends Instruction is verified to scanning device, the incorrect authentication failed that then sends is to scanning device.
8. scanning device, it is characterized in that, computer instruction is stored thereon with, it is complete when the computer instruction is run by processor Into following steps:
Step (201):Final mark is scanned;
Step (202):Scanning result is uploaded to central server;
Step (203):Receive the Current Scan of central server feedback identifies whether it is the mark prestored in database, If so, then receive the pre-stored validation problem that central server is sent;If not the mark prestored in database, then instead Feedback scanning failure information;
Step (204):The Validation Answer Key of input is received, and Validation Answer Key is uploaded to central server;
Step (205):The result of central server feedback is received, if being verified, checking is completed, and otherwise, is received and is tested Demonstrate,prove failure command.
9. central server, it is characterized in that, computer instruction is stored thereon with, when the computer instruction is run by processor, Complete following steps:
Step (301):Scanning device is received to final mark scanning result;
Step (302):Identifying whether for the Current Scan fed back to scanning device is the mark prestored in database, if It is the pre-stored validation problem then sent to scanning device;If not the mark prestored in database, then feedback scan Failure information;
Step (303):Receive the Validation Answer Key that scanning device uploads;
Step (304):To scanning device feedback validation result, if being verified, transmission, which is verified, to be instructed to scanning device, Otherwise, authentication failed instruction is sent.
10. a kind of generation system for the individual identification mark that plain code is combined with password, it is characterized in that, including:Memory, processing On a memory, and the computer instruction run on a processor, the computer instruction are run by processor for device and storage When, complete following steps:
Step (101):Mark format is selected according to input instruction;The mark format, including:Image-region and cryptographic zone, The permutation and combination of diverse location, size, shape or pattern with cryptographic zone be present in described image region;
Step (102):Receive personal essential information and person identifier image;
Step (103):Image-region by the person identifier image completion of input to mark format;
Step (104):The personal essential information of input is converted into binary numeral, generates final filling content;To finally it fill out Fills are filled to the cryptographic zone of mark format;
Step (105):The cryptographic zone and step (101) obtained according to step (103) obtained image-region, step (104) The mark format of selection, generates final mark, and final mark is stored.
CN201711090587.XA 2017-11-08 2017-11-08 A kind of generation method and system of the individual identification mark that plain code is combined with password Active CN107862364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711090587.XA CN107862364B (en) 2017-11-08 2017-11-08 A kind of generation method and system of the individual identification mark that plain code is combined with password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711090587.XA CN107862364B (en) 2017-11-08 2017-11-08 A kind of generation method and system of the individual identification mark that plain code is combined with password

Publications (2)

Publication Number Publication Date
CN107862364A true CN107862364A (en) 2018-03-30
CN107862364B CN107862364B (en) 2018-09-07

Family

ID=61700034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711090587.XA Active CN107862364B (en) 2017-11-08 2017-11-08 A kind of generation method and system of the individual identification mark that plain code is combined with password

Country Status (1)

Country Link
CN (1) CN107862364B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109344943A (en) * 2018-09-30 2019-02-15 合肥译码智能科技有限公司 A kind of method of embedded double two-dimensional barcode information secrecy
CN109948760A (en) * 2019-03-28 2019-06-28 尤尼泰克(嘉兴)信息技术有限公司 A kind of information demonstrating method and device based on two dimensional code
CN113312534A (en) * 2021-05-28 2021-08-27 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1618077A (en) * 2001-11-30 2005-05-18 国际条形码公司 System and method for validating a digital image and corresponding data
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system
CN105354606A (en) * 2015-09-30 2016-02-24 立德高科(昆山)数码科技有限责任公司 Label formed by two-dimensional code and variable information, generating method and generating system
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1618077A (en) * 2001-11-30 2005-05-18 国际条形码公司 System and method for validating a digital image and corresponding data
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system
CN105354606A (en) * 2015-09-30 2016-02-24 立德高科(昆山)数码科技有限责任公司 Label formed by two-dimensional code and variable information, generating method and generating system
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109344943A (en) * 2018-09-30 2019-02-15 合肥译码智能科技有限公司 A kind of method of embedded double two-dimensional barcode information secrecy
CN109948760A (en) * 2019-03-28 2019-06-28 尤尼泰克(嘉兴)信息技术有限公司 A kind of information demonstrating method and device based on two dimensional code
CN113312534A (en) * 2021-05-28 2021-08-27 中铁十一局集团第五工程有限公司 Engineering survey intelligent management platform

Also Published As

Publication number Publication date
CN107862364B (en) 2018-09-07

Similar Documents

Publication Publication Date Title
CN107862364B (en) A kind of generation method and system of the individual identification mark that plain code is combined with password
US20180219681A1 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and id validation methods
CN104468531B (en) The authorization method of sensitive data, device and system
US20150143483A1 (en) Device and Method for Identity Authentication Management
CN103929411B (en) Information displaying method, terminal, safety server and system
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN105719120A (en) Method for encrypting privacy information on express waybills
JPS5875267A (en) Method and apparatus for verifying signature of signed message
CN109544089A (en) The method, apparatus and computer equipment of electronic certificate are established based on image recognition
CN102340402B (en) Identity authentication method based on visual cryptography
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
CN106575333A (en) Transmit an authentication mark
CN108010097B (en) Verification method and verification device for verification code image
CN101206542A (en) Ciphering signature writing pad with press keys and display screen
CN104618356B (en) Auth method and device
CN106503527A (en) A kind of method and apparatus of electronic document fingerprint signature
CN106101140B (en) A kind of method and server of authentification of message
CN105897716B (en) A kind of generation method of website log identifying code
CN109075972A (en) The system and method for certification and the encryption of cipher anti theft
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
CN107644463A (en) A kind of two-dimensional code scanning Work attendance method
JP5778100B2 (en) Input information authentication apparatus and apparatus program
CN110084329A (en) The set code method of centre letter code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant