CN108777617A - A kind of safe two-dimensional code generation method of expansible structuring and system - Google Patents
A kind of safe two-dimensional code generation method of expansible structuring and system Download PDFInfo
- Publication number
- CN108777617A CN108777617A CN201810342521.3A CN201810342521A CN108777617A CN 108777617 A CN108777617 A CN 108777617A CN 201810342521 A CN201810342521 A CN 201810342521A CN 108777617 A CN108777617 A CN 108777617A
- Authority
- CN
- China
- Prior art keywords
- quick response
- response code
- area
- sdk
- party application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Abstract
The present invention provides a kind of safe two-dimensional code generation method of expansible structuring, and third-party application obtains Quick Response Code SDK;Quick Response Code SDK generates Quick Response Code, third-party application displaying or storage Quick Response Code, and the Quick Response Code includes an area, 2nd area, 3rd area and 4th area, one area is version number and transaction business code, 2nd area includes public information, and 3rd area is encrypted area, and 4th area is expansion area;The present invention also provides a kind of safe Quick Response Codes of expansible structuring to generate system, improves the safety of Quick Response Code, and improve the safety of Quick Response Code application scenarios.
Description
Technical field
The present invention relates to a kind of safe two-dimensional code generation method of expansible structuring and systems.
Background technology
Instantly the very fast development in internet, the advantages such as high efficiency, convenience, the low cost of Quick Response Code, allows the common people to have practised
The convenient service for life mode based on Quick Response Code has been used to it, but Quick Response Code usually used at present is each business customized two
Code structure is tieed up, arbitrariness is also big for business, and obstacle is caused for the interaction of information and the intercommunication of business, while being unable to effective guarantee two dimension
Code information exchange and service security may cause transaction data to be tampered or user information leakage equivalent risk.
There is likely to be following problems for existing planar bar code technology:
1, application scenarios safety is not high, and the safety measure of QR code content is insufficient;
2, it only needs to meet own service demand, the solidification of QR code content format can not flexible expansion;
3, Quick Response Code related capabilities are only used for itself operation system, can not externally announce unified Quick Response Code correlation energy
Power.
Invention content
The technical problem to be solved in the present invention, be to provide a kind of safe two-dimensional code generation method of expansible structuring with
And system, the safety of Quick Response Code is improved, and improve the safety of Quick Response Code application scenarios.
What one of present invention was realized in:A kind of safe two-dimensional code generation method of expansible structuring, including:
Step 1, third-party application obtain Quick Response Code SDK;
Step 2, Quick Response Code SDK generate Quick Response Code, and third-party application displaying or storage Quick Response Code, the Quick Response Code include
One area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, institute
It is encrypted area to state 3rd area, and 4th area is expansion area.
Further, further include that step a, third-party application are obtained by Quick Response Code SDK between the step 1 and step 2
Symmetric key, digital certificate and OTP seeds.
Further, the step a is specially further:Third-party application applies for symmetric key by Quick Response Code SDK, two
Code SDK and server-side arranging key are tieed up, symmetric key is encrypted server-side using arranging key later, is sent to two later
Code SDK is tieed up, after Quick Response Code SDK is decrypted, sends symmetric key value third-party application;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK
Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later
Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK
It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key
Seed.
Further, the step 2 is specially further:Quick Response Code SDK obtains viewdata and private data, can
Two-dimension code pattern is generated depending on data;Private data is set according to the graphics calculations method of setting in the two-dimension code pattern later
Graphics field carry out figure layer rewriting, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code
Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter
Breath, 3rd area are encrypted area, and 4th area is expansion area.
Further, in the step 2 by private data according to the graphics calculations method of setting in the two-dimension code pattern
The graphics field of setting carries out figure layer rewriting, completes Quick Response Code generation and is specially further:Generation is encrypted in private data
Ciphertext, the ciphertext carry out figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set
It writes, completes Quick Response Code and generate.
What the two of the present invention were realized in:A kind of safe Quick Response Code generation system of expansible structuring, including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Generation module, Quick Response Code SDK generate Quick Response Code, third-party application displaying or storage Quick Response Code, the Quick Response Code
Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter
Breath, 3rd area are encrypted area, and 4th area is expansion area.
Further, further include that data acquisition module, third-party application are logical between the SDK acquisition modules and generation module
It crosses Quick Response Code SDK and obtains symmetric key, digital certificate and OTP seeds.
Further, the data acquisition module is specially further:Third-party application is symmetrical by Quick Response Code SDK applications
Key, Quick Response Code SDK and server-side arranging key, later server-side symmetric key is encrypted using arranging key, later
It is sent to Quick Response Code SDK, after Quick Response Code SDK is decrypted, sends symmetric key value third-party application;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK
Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later
Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK
It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key
Seed.
Further, the generation module is specially further:Quick Response Code SDK obtains viewdata and private data,
Viewdata is generated into two-dimension code pattern;Later by private data according to the graphics calculations method of setting in the two-dimension code pattern
The graphics field of setting carries out figure layer rewriting, completes Quick Response Code and generates, third-party application displaying or storage Quick Response Code, and described two
It includes an area, 2nd area, 3rd area and 4th area to tie up code, and an area is version number and transaction business code, and 2nd area includes public affairs
Information is opened, 3rd area is encrypted area, and 4th area is expansion area.
Further, in the generation module by private data according to the graphics calculations method of setting in the Quick Response Code figure
The graphics field of shape setting carries out figure layer rewriting, completes Quick Response Code generation and is specially further:Life is encrypted in private data
At ciphertext, the ciphertext carries out figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set
It writes, completes Quick Response Code and generate.
The invention has the advantages that:1, it externally exports Quick Response Code ability so that other third party systems can be applied
Access uses Quick Response Code ability, is not necessarily to repeated construction.2, it improves the safety of Quick Response Code application scenarios.3, stronger extension
Property meets the individual business demand of the third-party application of access.
Description of the drawings
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the method for the present invention execution flow chart.
Fig. 2 is the safe Quick Response Code application system schematic diagram of expandable structureization of the specific embodiment of the invention.
Fig. 3 is that the third-party application of the specific embodiment of the invention uses Quick Response Code application system access procedure flow chart.
Specific implementation mode
As shown in Figure 1, the safe two-dimensional code generation method of structuring that the present invention is expansible, including:
Step 1, third-party application obtain Quick Response Code SDK;
Step a, third-party application applies for symmetric key, Quick Response Code SDK and server-side arranging key by Quick Response Code SDK,
Symmetric key is encrypted server-side using arranging key later, is sent to Quick Response Code SDK later, and Quick Response Code SDK is solved
After close, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK
Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later
Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK
It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key
Seed;
Step 2, Quick Response Code SDK obtain viewdata and private data, and viewdata is generated two-dimension code pattern;Later
Generation ciphertext is encrypted in private data, the ciphertext is set according to the graphics calculations method of setting in the two-dimension code pattern
Graphics field carry out figure layer rewriting, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code
Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter
Breath, 3rd area are encrypted area, and 4th area is expansion area.
Quick Response Code in the present invention according to demand can be extended its region, can be with more than four area.
What the two of the present invention were realized in:A kind of safe Quick Response Code generation system of expansible structuring, including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Data acquisition module, third-party application apply for that symmetric key, Quick Response Code SDK are assisted with server-side by Quick Response Code SDK
Quotient's key, later server-side symmetric key is encrypted using arranging key, be sent to Quick Response Code SDK, Quick Response Code SDK later
After being decrypted, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK
Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later
Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK
It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key
Seed, the OTP seeds are for generating OTP passwords;
Generation module, Quick Response Code SDK obtain viewdata and private data, viewdata are generated two-dimension code pattern;
Generation ciphertext is encrypted in private data later, the ciphertext is according to the graphics calculations method of setting in the two-dimension code pattern
The graphics field of setting carries out figure layer rewriting, completes Quick Response Code and generates, third-party application displaying or storage Quick Response Code, and described two
It includes an area, 2nd area, 3rd area and 4th area to tie up code, and an area is version number and transaction business code, and 2nd area includes public affairs
Information is opened, 3rd area is encrypted area, and 4th area is expansion area.
A kind of specific implementation mode of the present invention:
As shown in Fig. 2, the logic of each significant components interacts in the safe Quick Response Code applied system design of expandable structureization
Relationship.
Third-party application will use Quick Response Code application system ability, it is necessary first to initiate registration in systems.Get phase
The permission and Credential parameters of pass.
Third-party application is registered after the approval, get corresponding ability open SDK and with its application integration.Third is answered
With by calling SDK correlation techniques to use Quick Response Code application system ability.
Some row initializations are carried out to SDK using before SDK.After calling sdk initial methods, sdk can be answered from Quick Response Code
Digital certificate and OTP seeds are obtained with system.
The method for calling SDK production Quick Response Codes, you can realize the generation of Quick Response Code.Since QR code content is structuring
, its permission third party's business is to be passed to the service parameter of itself generating.
Expandable structure QR code content format is defined as follows:
As shown in figure 3, flow is as follows:
Third application will use Quick Response Code ability, first have to carry out register flow path.Then SDK can be just got to carry out subsequently
Integrated work.
It is recommended that third-party application carries out secret key negotiation with Quick Response Code application system in starting application process and obtains number
Certificate, to ensure the safety of its communication process.And digital certificate takes part in signature process when producing QR code content.
3) suggest that in process of user login, OTP seed applications are carried out to Quick Response Code application system for third-party application.OTP
Seed is the important factor for producing OTP passwords and the important component of QR code content.
The flow for generating Quick Response Code is as follows:
1) user initiates to generate Quick Response Code request, is passed to " public information area " when initiating request as needed and " business expands
The content of exhibition section ".
2) SDK generates disposal password (+2 challenging values of 6 disposal passwords), and and user's registration using OTP seeds
When the user identifier combination producing OTP codes that distribute, add version number, generate first area's content.
3) first area's content of generation is merged with " public information area " and " operation expanding area " content that user is passed to, and
It is calculated by Encryption Algorithm and generates " encrypted area " (third area) content.
4) " encrypted area " content is inserted between third area and the 4th area, forms complete QR code content, and generate figure
Piece.Here is a QR code content example:
01,3500100630388791982742872
35010***2542, old * *, 1360***580
5E86B5BAFD1EC178E050007F01000525
http://110.88.128.3/dc/download
Although specific embodiments of the present invention have been described above, those familiar with the art should manage
Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this
The technical staff in field modification and variation equivalent made by the spirit according to the present invention, should all cover the present invention's
In scope of the claimed protection.
Claims (10)
1. a kind of safe two-dimensional code generation method of expansible structuring, it is characterised in that:Including:
Step 1, third-party application obtain Quick Response Code SDK;
Step 2, Quick Response Code SDK generate Quick Response Code, third-party application displaying or storage Quick Response Code, and the Quick Response Code includes one
Area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, described
3rd area are encrypted area, and 4th area is expansion area.
2. a kind of safe two-dimensional code generation method of expansible structuring according to claim 1, it is characterised in that:It is described
Further include between step 1 and step 2 step a, third-party application by Quick Response Code SDK obtain symmetric key, digital certificate and
OTP seeds.
3. a kind of safe two-dimensional code generation method of expansible structuring according to claim 2, it is characterised in that:It is described
Step a is specially further:Third-party application applies for that symmetric key, Quick Response Code SDK are negotiated close with server-side by Quick Response Code SDK
Key, later server-side symmetric key is encrypted using arranging key, be sent to Quick Response Code SDK later, Quick Response Code SDK by its
After decryption, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side are encrypted digital certificate using symmetric key by Quick Response Code SDK,
Third-party application is sent to by Quick Response Code SDK later, third-party application stores number card after being decrypted using symmetric key
Book;
Third-party application applies for that OTP seeds, server-side are encrypted OTP seeds using symmetric key by Quick Response Code SDK, it
Third-party application is sent to by Quick Response Code SDK afterwards, third-party application stores OTP seeds after being decrypted using symmetric key.
4. a kind of safe two-dimensional code generation method of expansible structuring according to claim 1, it is characterised in that:It is described
Step 2 is specially further:Quick Response Code SDK obtains viewdata and private data, and viewdata is generated two-dimension code pattern;
Private data is subjected to figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set later
Write, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code include an area, 2nd area, 3rd area with
And 4th areas, an area are version number and transaction business code, 2nd area includes public information, and 3rd area is encrypted area,
4th area is expansion area.
5. a kind of safe two-dimensional code generation method of expansible structuring according to claim 4, it is characterised in that:It is described
Private data is subjected to figure layer according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set in step 2
It rewrites, completing Quick Response Code generation is specially further:Generation ciphertext is encrypted in private data, the ciphertext is according to setting
Graphics calculations method carries out figure layer rewriting in the graphics field that the two-dimension code pattern is set, and completes Quick Response Code and generates.
6. a kind of safe Quick Response Code of expansible structuring generates system, it is characterised in that:Including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Generation module, Quick Response Code SDK generate Quick Response Code, and third-party application displaying or storage Quick Response Code, the Quick Response Code include
One area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, institute
It is encrypted area to state 3rd area, and 4th area is expansion area.
7. the safe Quick Response Code of a kind of expansible structuring according to claim 6 generates system, it is characterised in that:It is described
Further include between SDK acquisition modules and generation module data acquisition module, third-party application obtained by Quick Response Code SDK it is symmetrical close
Key, digital certificate and OTP seeds.
8. the safe Quick Response Code of a kind of expansible structuring according to claim 7 generates system, it is characterised in that:It is described
Data acquisition module is specially further:Third-party application applies for symmetric key, Quick Response Code SDK and service by Quick Response Code SDK
Arranging key is held, symmetric key is encrypted server-side using arranging key later, is sent to Quick Response Code SDK later, two dimension
After code SDK is decrypted, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side are encrypted digital certificate using symmetric key by Quick Response Code SDK,
Third-party application is sent to by Quick Response Code SDK later, third-party application stores number card after being decrypted using symmetric key
Book;
Third-party application applies for that OTP seeds, server-side are encrypted OTP seeds using symmetric key by Quick Response Code SDK, it
Third-party application is sent to by Quick Response Code SDK afterwards, third-party application stores OTP seeds after being decrypted using symmetric key.
9. the safe Quick Response Code of a kind of expansible structuring according to claim 6 generates system, it is characterised in that:It is described
Generation module is specially further:Quick Response Code SDK obtains viewdata and private data, and viewdata is generated Quick Response Code figure
Shape;Private data is subjected to figure layer according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set later
It rewrites, completes Quick Response Code and generate, third-party application displaying or storage Quick Response Code, the Quick Response Code includes an area, 2nd area, 3rd area
And 4th areas, an area are version number and transaction business code, 2nd area includes public information, and 3rd area is encryption
Area, 4th area are expansion area.
10. the safe Quick Response Code of a kind of expansible structuring according to claim 9 generates system, it is characterised in that:Institute
State in generation module by private data according to the graphics calculations method of setting the graphics field that the two-dimension code pattern is set into
Row figure layer is rewritten, and is completed Quick Response Code generation and is specially further:Private data is encrypted generation ciphertext, the ciphertext according to
The graphics calculations method of setting carries out figure layer rewriting in the graphics field that the two-dimension code pattern is set, and completes Quick Response Code and generates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810342521.3A CN108777617B (en) | 2018-04-17 | 2018-04-17 | Extensible structured security two-dimensional code generation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810342521.3A CN108777617B (en) | 2018-04-17 | 2018-04-17 | Extensible structured security two-dimensional code generation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108777617A true CN108777617A (en) | 2018-11-09 |
CN108777617B CN108777617B (en) | 2021-04-06 |
Family
ID=64033942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810342521.3A Active CN108777617B (en) | 2018-04-17 | 2018-04-17 | Extensible structured security two-dimensional code generation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108777617B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007261166A (en) * | 2006-03-29 | 2007-10-11 | Oki Electric Ind Co Ltd | Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device |
CN104301747A (en) * | 2014-10-30 | 2015-01-21 | 杭州宽云视讯科技有限公司 | Generating method for digital TV dynamic video stream carrying two-dimensional code labels |
CN105656922A (en) * | 2016-02-04 | 2016-06-08 | 腾讯科技(深圳)有限公司 | Login method and device of application program and intelligent equipment |
CN105989522A (en) * | 2015-03-16 | 2016-10-05 | 三星电子株式会社 | Payment additional service information processing method and electronic device for supporting the same |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
-
2018
- 2018-04-17 CN CN201810342521.3A patent/CN108777617B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007261166A (en) * | 2006-03-29 | 2007-10-11 | Oki Electric Ind Co Ltd | Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device |
CN104301747A (en) * | 2014-10-30 | 2015-01-21 | 杭州宽云视讯科技有限公司 | Generating method for digital TV dynamic video stream carrying two-dimensional code labels |
CN105989522A (en) * | 2015-03-16 | 2016-10-05 | 三星电子株式会社 | Payment additional service information processing method and electronic device for supporting the same |
CN105656922A (en) * | 2016-02-04 | 2016-06-08 | 腾讯科技(深圳)有限公司 | Login method and device of application program and intelligent equipment |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
Also Published As
Publication number | Publication date |
---|---|
CN108777617B (en) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018046008A1 (en) | Storage design method of blockchain encrypted radio frequency chip | |
JP6692234B2 (en) | System and method for issuing security domain key management using global platform specifications | |
US20180144114A1 (en) | Securing Blockchain Transactions Against Cyberattacks | |
CN114070614B (en) | Identity authentication method, apparatus, device, storage medium and computer program product | |
CN101807994A (en) | Method and system for application data transmission of IC card | |
CN101741565A (en) | Method and system for transmitting IC (integrated circuit)-card application data | |
CN112653553B (en) | Internet of things equipment identity management system | |
WO2015117212A1 (en) | Solution for generating and issuing security codes with guaranteed issuer authenticity and origin | |
TW202137199A (en) | Method of authenticating biological payment device, apparatus, electronic device, and computer-readable medium | |
JP4823704B2 (en) | Authentication system, authentication information delegation method and security device in the same system | |
EP3984161A1 (en) | Cryptographic key generation using external entropy generation | |
CN104899737B (en) | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method | |
CN110716724A (en) | Method and device for realizing privacy block chain based on FPGA | |
CN106953731A (en) | The authentication method and system of a kind of terminal management person | |
Lenz et al. | Towards cross-domain eID by using agile mobile authentication | |
CN108777617A (en) | A kind of safe two-dimensional code generation method of expansible structuring and system | |
CN107563743B (en) | Method and system for improving POS transaction safety | |
TWI621029B (en) | Personal identity authentication method and system using graphic lock | |
CN106060022A (en) | Encryption equipment configuration method and system | |
Huang et al. | A user authentication scheme based on fingerprint and USIM card | |
CN113285950B (en) | Encryption card-based key transmission and storage method | |
TWI623849B (en) | Electronic file security system and method | |
TW201714128A (en) | Payment identification system and method for Internet of Things apparatus analyzing purchase request provided by Internet of Things apparatus through symmetrical encryption key shared with Internet of Things apparatus for generating intelligent device signature | |
TW202213131A (en) | System for using authentication mechanism of fast identity online to enable certificate and method thereof | |
IT201900015701A1 (en) | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR SECURE IDENTIFICATION OF DISCONNECTED OBJECTS AND THEIR LOCATIONS. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |