CN107979458A - A kind of two-dimensional bar data ciphering method - Google Patents

A kind of two-dimensional bar data ciphering method Download PDF

Info

Publication number
CN107979458A
CN107979458A CN201610922335.8A CN201610922335A CN107979458A CN 107979458 A CN107979458 A CN 107979458A CN 201610922335 A CN201610922335 A CN 201610922335A CN 107979458 A CN107979458 A CN 107979458A
Authority
CN
China
Prior art keywords
random number
dimensional bar
scattering parameter
bar
ciphering method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610922335.8A
Other languages
Chinese (zh)
Inventor
王佳
贾俊锋
宋�莹
李志善
王舆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN201610922335.8A priority Critical patent/CN107979458A/en
Publication of CN107979458A publication Critical patent/CN107979458A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of two-dimensional bar data ciphering method, wherein, including:Quick Response Code generating process includes:A random number is generated, and according to generating random number scattering parameter, bar code key is obtained by root key encryption scattering parameter;The data of two-dimensional bar carrying are needed using the encryption of bar code key;According to two-dimensional bar coding rule, random number and encrypted data encoding are formed into two-dimensional bar graphical symbol, and export;Quick Response Code, which picks up read procedure, to be included:Two-dimensional bar graphical symbol is distinguished, separates random number and encrypted data;According to generating random number scattering parameter, bar code key is obtained using scattering parameter, and Quick Response Code is decrypted using bar code key;Read the two-dimensional code data after decryption.Two-dimensional bar data ciphering method of the present invention, improves the security that information is transmitted in two-dimensional bar carrying, expands the use scope of two-dimensional bar.

Description

A kind of two-dimensional bar data ciphering method
Technical field
The present invention relates to a kind of encryption method, more particularly to a kind of two-dimensional bar data ciphering method.
Background technology
In automatic identification field, two-dimensional bar since relativity of information is big, it is of low cost the advantages that, be widely used in thing Some business informations are transmitted in the automatic identification of product and carrying.Since some business informations of two-dimensional bar carrying may relate to work The business secret of commercial business's industry, information or data therefore, it is necessary to be carried to two-dimensional bar carry out cryptoguard, could be extensive Two-dimensional bar is promoted and applied to carry transmission business information.
Existing two-dimensional bar data guard method is to use simple encryption technology.What one two-dimensional bar carried Data are cracked, and the data of other two-dimensional bar carryings can be caused to be cracked.In addition, the encryption of two-dimensional bar data is conciliate It is close to be usually not separated by so that the producer of two-dimensional bar cannot control the making of two-dimensional bar, and two-dimensional bar is easy It is counterfeit.
The content of the invention
It is an object of the invention to provide a kind of two-dimensional bar data ciphering method, for solving the above-mentioned prior art Problem.
A kind of two-dimensional bar data ciphering method of the present invention, wherein, including:Quick Response Code generating process includes:Generation one A random number, and according to generating random number scattering parameter, bar code key is obtained by root key encryption scattering parameter;Use bar The encryption of shape code key needs the data that two-dimensional bar carries;According to two-dimensional bar coding rule, after random number and encryption Data encoding form two-dimensional bar graphical symbol, and export;Quick Response Code, which picks up read procedure, to be included:Distinguish two-dimensional bar figure Symbol, separates random number and encrypted data;According to generating random number scattering parameter, it is close to obtain bar code using scattering parameter Key, and Quick Response Code is decrypted using bar code key;Read the two-dimensional code data after decryption.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, one random number of the generation, And according to generating random number scattering parameter, obtaining bar code key by root key encryption scattering parameter includes:By two-dimentional bar shaped In the root key injection smart card of code application system, the first random number is generated, which is subjected to certain operations, generation After second random number, as scattering parameter, by the scattering parameter, disperse the corresponding multiple keys of two-dimensional bar;
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, which is carried out Certain operations, the second random number of generation include:Each bit of first random number is negated, is obtained after being attached to the first random number Two random numbers.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, Quick Response Code picks up the root of read procedure According to generating random number scattering parameter, bar code key is obtained using scattering parameter, including:Two-dimensional bar graphical symbol is distinguished, First random number and encrypted data;First random number is subjected to the certain operations, to generate second random number, and is made For scattering parameter, by the scattering parameter, disperse the corresponding multiple keys of two-dimensional bar.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, Quick Response Code picks up the root of read procedure According to generating random number scattering parameter, bar code key is obtained using scattering parameter, including:Two-dimensional bar graphical symbol is distinguished, First random number and encrypted data;Each bit of first random number is negated, second is obtained after being attached to the first random number Random number, for the second random number as scattering parameter, the scattering parameter, disperses the corresponding multiple keys of two-dimensional bar.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, further include:Utilize PSAM intelligence Card is used as encryption device.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, further include:Utilize PSAM intelligence Card generation random number.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, further include:First random number For the random number of 64 bits.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, which is 128 ratios Special random number.
One embodiment of two-dimensional bar data ciphering method according to the present invention, wherein, when picking up reading, first by root key Inject in PSAM smart cards.
The beneficial effect of the two-dimensional bar data ciphering method of the present invention is, each two-dimensional bar is generated not Same data encryption key, the data of a two-dimensional bar carrying are cracked, and can cause the number of other two-dimensional bars carryings According to being cracked.The encryption and decryption of two-dimensional bar data use the encryption device of difference in functionality, the producer of two-dimensional bar The making of two-dimensional bar can be controlled, prevents that two-dimensional bar is counterfeit.Improve the peace that information is transmitted in two-dimensional bar carrying Quan Xing, expands the use scope of two-dimensional bar.
Brief description of the drawings
Fig. 1 is a kind of flow chart of two-dimensional bar data ciphering method of the present invention.
Embodiment
To make the purpose of the present invention, content and advantage clearer, with reference to the accompanying drawings and examples, to the present invention's Embodiment is described in further detail.
Fig. 1 is a kind of flow chart of two-dimensional bar data ciphering method of the present invention, as shown in Figure 1, present invention one kind two The step of tieing up bar code data encryption method includes:
Step 1, two-dimensional bar is made using cryptographic technique;
Step 2, two-dimensional bar is distinguished using cryptographic technique.
The step 1 includes:
Step 11:By the use of conventional PSAM smart cards as encryption device, by the root key of two-dimensional bar application system Inject in PSAM smart cards, the corresponding multiple keys of multiple Quick Response Codes are disperseed by the root key, the attribute of the root key is " to add It is close " and scattering parameter is required, specifically include:
The random number of 64 bit (8 byte) is generated using PSAM smart cards, each bit of random number is negated, it is attached After former random number, the scattering parameter of 128 bits (16 byte) is obtained, using PSAM smart cards, uses two-dimensional bar application The root key encryption scattering parameter of system obtains bar code key;
Step 12:The number of two-dimensional bar carrying is needed using the bar code key encryption of generation using PSAM smart cards According to;
Step 13:According to two-dimensional bar coding rule, random number and encrypted data encoding are formed into two-dimentional bar shaped Code graphical symbol, and print out.
The step 2 includes:
Step 21:Using conventional two-dimensional bar recognizing apparatus, two-dimensional bar graphical symbol is distinguished, separates 64 bits Random number and encrypted data;
Step 22:By the use of conventional PSAM smart cards as decryption device, in advance by the root of two-dimensional bar application system In key injection PSAM smart cards, the corresponding multiple keys of multiple Quick Response Codes are disperseed by the root key, by key to two dimension Code is decrypted, and the attribute of the root key for " decryption " and requires scattering parameter, specifically includes:
The each bit for the random number isolated is negated, after being attached to former random number, obtains point of 128 bits (16 byte) Parameter is dissipated, using PSAM smart cards, it is close to obtain bar code using the root key encryption scattering parameter of two-dimensional bar application system Key;
Step 23:Utilize the encrypted data isolated using PSAM smart cards using bar code secret key decryption and defeated Go out.
For another embodiment, the random number of generation can be carried out to other computings, to generate scattering parameter, example Can such as take a variety of computing modes of other Boolean calculations, above fact Example by way of example only, actually this area skill Art personnel can be in a manner of carrying out computing as needed selection.
A kind of two-dimensional bar data ciphering method of the present invention generates each two-dimensional bar one single bar shaped Code key, a two-dimensional bar, which is cracked, does not interfere with other two-dimensional bars, improves the safety of two-dimensional bar data Property, and the encryption device of two-dimensional bar data and decryption device are separated, it is ensured that user can control two-dimensional bar Make, contribute to industrial and commercial enterprises and transmitted using two-dimensional bar the trade secret information of enterprise.
The beneficial effects of the present invention are, generate different data encryption keys to each two-dimensional bar, one two The data of dimension bar code carrying are cracked, and the data of other two-dimensional bar carryings can be caused to be cracked.Two-dimensional bar data Encryption and decryption using the encryption device of difference in functionality, the producer of two-dimensional bar can control the system of two-dimensional bar Make, prevent that two-dimensional bar is counterfeit.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, some improvement and deformation can also be made, these are improved and deformation Also it should be regarded as protection scope of the present invention.

Claims (10)

  1. A kind of 1. two-dimensional bar data ciphering method, it is characterised in that including:
    Quick Response Code generating process includes:
    A random number is generated, and according to generating random number scattering parameter, bar code is obtained by root key encryption scattering parameter Key;
    The data of two-dimensional bar carrying are needed using the encryption of bar code key;
    According to two-dimensional bar coding rule, random number and encrypted data encoding are formed into two-dimensional bar graphical symbol, And export;
    Quick Response Code, which picks up read procedure, to be included:
    Two-dimensional bar graphical symbol is distinguished, separates random number and encrypted data;
    According to generating random number scattering parameter, bar code key is obtained using scattering parameter, and using bar code key to two dimension Code is decrypted;Read the two-dimensional code data after decryption.
  2. 2. two-dimensional bar data ciphering method as claimed in claim 1, it is characterised in that one random number of the generation, And according to generating random number scattering parameter, obtaining bar code key by root key encryption scattering parameter includes:By two-dimentional bar shaped In the root key injection smart card of code application system, the first random number is generated, which is subjected to certain operations, generation After second random number, as scattering parameter, by the scattering parameter, disperse the corresponding multiple keys of two-dimensional bar.
  3. 3. two-dimensional bar data ciphering method as claimed in claim 2, it is characterised in that carry out first random number special Determine computing, the second random number of generation includes:Each bit of first random number is negated, second is obtained after being attached to the first random number Random number.
  4. 4. two-dimensional bar data ciphering method as claimed in claim 2, it is characterised in that Quick Response Code picks up the basis of read procedure Generating random number scattering parameter, bar code key is obtained using scattering parameter, including:Two-dimensional bar graphical symbol is distinguished, the One random number and encrypted data;
    First random number is subjected to the certain operations, to generate second random number, and is used as scattering parameter, it is scattered by this Parameter, disperses the corresponding multiple keys of two-dimensional bar.
  5. 5. two-dimensional bar data ciphering method as claimed in claim 3, it is characterised in that Quick Response Code picks up the basis of read procedure Generating random number scattering parameter, bar code key is obtained using scattering parameter, including:Two-dimensional bar graphical symbol is distinguished, the One random number and encrypted data;
    Each bit of first random number is negated, the second random number, the second random number conduct are obtained after being attached to the first random number Scattering parameter, the scattering parameter, disperses the corresponding multiple keys of two-dimensional bar.
  6. 6. two-dimensional bar data ciphering method as claimed in claim 2, it is characterised in that further include:Utilize PSAM intelligence Card is used as encryption device.
  7. 7. two-dimensional bar data ciphering method as claimed in claim 2, it is characterised in that further include:Utilize PSAM intelligence Card generation random number.
  8. 8. two-dimensional bar data ciphering method as claimed in claim 2, it is characterised in that further include:First random number For the random number of 64 bits.
  9. 9. two-dimensional bar data ciphering method as claimed in claim 1, it is characterised in that second random number compares for 128 Special random number.
  10. 10. two-dimensional bar data ciphering method as claimed in claim 1, it is characterised in that when picking up reading, first by root key Inject in PSAM smart cards.
CN201610922335.8A 2016-10-25 2016-10-25 A kind of two-dimensional bar data ciphering method Pending CN107979458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610922335.8A CN107979458A (en) 2016-10-25 2016-10-25 A kind of two-dimensional bar data ciphering method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610922335.8A CN107979458A (en) 2016-10-25 2016-10-25 A kind of two-dimensional bar data ciphering method

Publications (1)

Publication Number Publication Date
CN107979458A true CN107979458A (en) 2018-05-01

Family

ID=62004761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610922335.8A Pending CN107979458A (en) 2016-10-25 2016-10-25 A kind of two-dimensional bar data ciphering method

Country Status (1)

Country Link
CN (1) CN107979458A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods
CN108960385A (en) * 2018-06-29 2018-12-07 苏州酷豆物联科技有限公司 Two dimensional code generation and verification method and system based on the encryption of multiple code key
CN111899360A (en) * 2020-07-27 2020-11-06 山东中车同力达智能机械有限公司 Intelligent stereo garage cloud payment system and method thereof
CN112036525A (en) * 2020-07-27 2020-12-04 中国科学院大学宁波华美医院 Method, device, equipment and storage medium for preventing abandoned medical edge tool from being stolen

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131764A (en) * 2006-12-11 2008-02-27 北京双得利科工贸有限责任公司 Pre-payment method and system used for digital measuring instrument
CN103441851A (en) * 2013-08-23 2013-12-11 成都卫士通信息产业股份有限公司 Method for allowing terminal equipment to have access to VPN equipment
US20140067678A1 (en) * 2012-09-02 2014-03-06 Mpayme Ltd. Dispute code system for secure mobile payment
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES
CN104717056A (en) * 2013-12-11 2015-06-17 中国移动通信集团安徽有限公司 Two-dimensional code encryption and decryption method and encryption and decryption device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131764A (en) * 2006-12-11 2008-02-27 北京双得利科工贸有限责任公司 Pre-payment method and system used for digital measuring instrument
US20140067678A1 (en) * 2012-09-02 2014-03-06 Mpayme Ltd. Dispute code system for secure mobile payment
CN103441851A (en) * 2013-08-23 2013-12-11 成都卫士通信息产业股份有限公司 Method for allowing terminal equipment to have access to VPN equipment
CN104717056A (en) * 2013-12-11 2015-06-17 中国移动通信集团安徽有限公司 Two-dimensional code encryption and decryption method and encryption and decryption device
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694429A (en) * 2018-05-11 2018-10-23 张玉 A kind of generation method of Quick Response Code and recognition methods
CN108694429B (en) * 2018-05-11 2021-03-02 张玉 Two-dimensional code generation method and identification method
CN108960385A (en) * 2018-06-29 2018-12-07 苏州酷豆物联科技有限公司 Two dimensional code generation and verification method and system based on the encryption of multiple code key
CN111899360A (en) * 2020-07-27 2020-11-06 山东中车同力达智能机械有限公司 Intelligent stereo garage cloud payment system and method thereof
CN112036525A (en) * 2020-07-27 2020-12-04 中国科学院大学宁波华美医院 Method, device, equipment and storage medium for preventing abandoned medical edge tool from being stolen
CN112036525B (en) * 2020-07-27 2022-06-10 中国科学院大学宁波华美医院 Method, device, equipment and storage medium for preventing abandoned medical edge tool from being stolen

Similar Documents

Publication Publication Date Title
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
CN110710155A (en) Progressive key encryption algorithm
CN101295343A (en) Two-dimensional code multi-enciphering anti-fake printing method
CN107979458A (en) A kind of two-dimensional bar data ciphering method
CN105450419B (en) Improve the methods, devices and systems of biometric identification security
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN101859351B (en) System and method for ensuring safe read of data stored in storage
CN103345601A (en) Identity recording and verification system based on radio frequency
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN105184590A (en) Laser on-line efficient etching and product anti-fake traceability system applied to steels
CN107784207A (en) Display methods, device, equipment and the storage medium at financial APP interfaces
CN104376465A (en) Safe mobile payment method
CN109165531B (en) AES mask method, electronic equipment and storage medium
EP2910042B1 (en) Secure information transfer via bar codes
CN106712952B (en) Radio frequency tag security identification method and system
CN105577361A (en) Information processing method and device thereof
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN103971245A (en) Combined encryption system for commodity electronic forgery proofing
DE102004059391B4 (en) Crypto-wireless-tag
CN105678185A (en) Data security protection method and intelligent terminal management system
CN107343002A (en) A kind of exchange method and system of data transmission unit and remote terminal
CN110232296B (en) System for encrypted communication between RFID (radio frequency identification) tag and reader-writer
CN104243136A (en) Radio frequency identification anti-fake verification method for leader personnel dossier management
CN103152167A (en) Intelligent card PIN (personal identification number) encrypted transmission method and intelligent card PIN encrypted transmission system
CN107222311A (en) A kind of processing system of multiple communication verification identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180501

WD01 Invention patent application deemed withdrawn after publication