CN108777617A - A kind of safe two-dimensional code generation method of expansible structuring and system - Google Patents

A kind of safe two-dimensional code generation method of expansible structuring and system Download PDF

Info

Publication number
CN108777617A
CN108777617A CN201810342521.3A CN201810342521A CN108777617A CN 108777617 A CN108777617 A CN 108777617A CN 201810342521 A CN201810342521 A CN 201810342521A CN 108777617 A CN108777617 A CN 108777617A
Authority
CN
China
Prior art keywords
quick response
response code
area
sdk
party application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810342521.3A
Other languages
Chinese (zh)
Other versions
CN108777617B (en
Inventor
林龙
李钻达
范启庭
赵子彬
林乐然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New World (fujian) Public Service Co Ltd
Original Assignee
New World (fujian) Public Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New World (fujian) Public Service Co Ltd filed Critical New World (fujian) Public Service Co Ltd
Priority to CN201810342521.3A priority Critical patent/CN108777617B/en
Publication of CN108777617A publication Critical patent/CN108777617A/en
Application granted granted Critical
Publication of CN108777617B publication Critical patent/CN108777617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The present invention provides a kind of safe two-dimensional code generation method of expansible structuring, and third-party application obtains Quick Response Code SDK;Quick Response Code SDK generates Quick Response Code, third-party application displaying or storage Quick Response Code, and the Quick Response Code includes an area, 2nd area, 3rd area and 4th area, one area is version number and transaction business code, 2nd area includes public information, and 3rd area is encrypted area, and 4th area is expansion area;The present invention also provides a kind of safe Quick Response Codes of expansible structuring to generate system, improves the safety of Quick Response Code, and improve the safety of Quick Response Code application scenarios.

Description

A kind of safe two-dimensional code generation method of expansible structuring and system
Technical field
The present invention relates to a kind of safe two-dimensional code generation method of expansible structuring and systems.
Background technology
Instantly the very fast development in internet, the advantages such as high efficiency, convenience, the low cost of Quick Response Code, allows the common people to have practised The convenient service for life mode based on Quick Response Code has been used to it, but Quick Response Code usually used at present is each business customized two Code structure is tieed up, arbitrariness is also big for business, and obstacle is caused for the interaction of information and the intercommunication of business, while being unable to effective guarantee two dimension Code information exchange and service security may cause transaction data to be tampered or user information leakage equivalent risk.
There is likely to be following problems for existing planar bar code technology:
1, application scenarios safety is not high, and the safety measure of QR code content is insufficient;
2, it only needs to meet own service demand, the solidification of QR code content format can not flexible expansion;
3, Quick Response Code related capabilities are only used for itself operation system, can not externally announce unified Quick Response Code correlation energy Power.
Invention content
The technical problem to be solved in the present invention, be to provide a kind of safe two-dimensional code generation method of expansible structuring with And system, the safety of Quick Response Code is improved, and improve the safety of Quick Response Code application scenarios.
What one of present invention was realized in:A kind of safe two-dimensional code generation method of expansible structuring, including:
Step 1, third-party application obtain Quick Response Code SDK;
Step 2, Quick Response Code SDK generate Quick Response Code, and third-party application displaying or storage Quick Response Code, the Quick Response Code include One area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, institute It is encrypted area to state 3rd area, and 4th area is expansion area.
Further, further include that step a, third-party application are obtained by Quick Response Code SDK between the step 1 and step 2 Symmetric key, digital certificate and OTP seeds.
Further, the step a is specially further:Third-party application applies for symmetric key by Quick Response Code SDK, two Code SDK and server-side arranging key are tieed up, symmetric key is encrypted server-side using arranging key later, is sent to two later Code SDK is tieed up, after Quick Response Code SDK is decrypted, sends symmetric key value third-party application;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key Seed.
Further, the step 2 is specially further:Quick Response Code SDK obtains viewdata and private data, can Two-dimension code pattern is generated depending on data;Private data is set according to the graphics calculations method of setting in the two-dimension code pattern later Graphics field carry out figure layer rewriting, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter Breath, 3rd area are encrypted area, and 4th area is expansion area.
Further, in the step 2 by private data according to the graphics calculations method of setting in the two-dimension code pattern The graphics field of setting carries out figure layer rewriting, completes Quick Response Code generation and is specially further:Generation is encrypted in private data Ciphertext, the ciphertext carry out figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set It writes, completes Quick Response Code and generate.
What the two of the present invention were realized in:A kind of safe Quick Response Code generation system of expansible structuring, including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Generation module, Quick Response Code SDK generate Quick Response Code, third-party application displaying or storage Quick Response Code, the Quick Response Code Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter Breath, 3rd area are encrypted area, and 4th area is expansion area.
Further, further include that data acquisition module, third-party application are logical between the SDK acquisition modules and generation module It crosses Quick Response Code SDK and obtains symmetric key, digital certificate and OTP seeds.
Further, the data acquisition module is specially further:Third-party application is symmetrical by Quick Response Code SDK applications Key, Quick Response Code SDK and server-side arranging key, later server-side symmetric key is encrypted using arranging key, later It is sent to Quick Response Code SDK, after Quick Response Code SDK is decrypted, sends symmetric key value third-party application;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key Seed.
Further, the generation module is specially further:Quick Response Code SDK obtains viewdata and private data, Viewdata is generated into two-dimension code pattern;Later by private data according to the graphics calculations method of setting in the two-dimension code pattern The graphics field of setting carries out figure layer rewriting, completes Quick Response Code and generates, third-party application displaying or storage Quick Response Code, and described two It includes an area, 2nd area, 3rd area and 4th area to tie up code, and an area is version number and transaction business code, and 2nd area includes public affairs Information is opened, 3rd area is encrypted area, and 4th area is expansion area.
Further, in the generation module by private data according to the graphics calculations method of setting in the Quick Response Code figure The graphics field of shape setting carries out figure layer rewriting, completes Quick Response Code generation and is specially further:Life is encrypted in private data At ciphertext, the ciphertext carries out figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set It writes, completes Quick Response Code and generate.
The invention has the advantages that:1, it externally exports Quick Response Code ability so that other third party systems can be applied Access uses Quick Response Code ability, is not necessarily to repeated construction.2, it improves the safety of Quick Response Code application scenarios.3, stronger extension Property meets the individual business demand of the third-party application of access.
Description of the drawings
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the method for the present invention execution flow chart.
Fig. 2 is the safe Quick Response Code application system schematic diagram of expandable structureization of the specific embodiment of the invention.
Fig. 3 is that the third-party application of the specific embodiment of the invention uses Quick Response Code application system access procedure flow chart.
Specific implementation mode
As shown in Figure 1, the safe two-dimensional code generation method of structuring that the present invention is expansible, including:
Step 1, third-party application obtain Quick Response Code SDK;
Step a, third-party application applies for symmetric key, Quick Response Code SDK and server-side arranging key by Quick Response Code SDK, Symmetric key is encrypted server-side using arranging key later, is sent to Quick Response Code SDK later, and Quick Response Code SDK is solved After close, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key Seed;
Step 2, Quick Response Code SDK obtain viewdata and private data, and viewdata is generated two-dimension code pattern;Later Generation ciphertext is encrypted in private data, the ciphertext is set according to the graphics calculations method of setting in the two-dimension code pattern Graphics field carry out figure layer rewriting, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code Including an area, 2nd area, 3rd area and 4th area, an area is version number and transaction business code, and 2nd area includes open letter Breath, 3rd area are encrypted area, and 4th area is expansion area.
Quick Response Code in the present invention according to demand can be extended its region, can be with more than four area.
What the two of the present invention were realized in:A kind of safe Quick Response Code generation system of expansible structuring, including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Data acquisition module, third-party application apply for that symmetric key, Quick Response Code SDK are assisted with server-side by Quick Response Code SDK Quotient's key, later server-side symmetric key is encrypted using arranging key, be sent to Quick Response Code SDK, Quick Response Code SDK later After being decrypted, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side carry out digital certificate using symmetric key by Quick Response Code SDK Encryption, is sent to third-party application, third-party application stores number after being decrypted using symmetric key by Quick Response Code SDK later Word certificate;
Third-party application applies for that OTP seeds, server-side add OTP seeds using symmetric key by Quick Response Code SDK It is close, third-party application is sent to by Quick Response Code SDK later, third-party application stores OTP after being decrypted using symmetric key Seed, the OTP seeds are for generating OTP passwords;
Generation module, Quick Response Code SDK obtain viewdata and private data, viewdata are generated two-dimension code pattern; Generation ciphertext is encrypted in private data later, the ciphertext is according to the graphics calculations method of setting in the two-dimension code pattern The graphics field of setting carries out figure layer rewriting, completes Quick Response Code and generates, third-party application displaying or storage Quick Response Code, and described two It includes an area, 2nd area, 3rd area and 4th area to tie up code, and an area is version number and transaction business code, and 2nd area includes public affairs Information is opened, 3rd area is encrypted area, and 4th area is expansion area.
A kind of specific implementation mode of the present invention:
As shown in Fig. 2, the logic of each significant components interacts in the safe Quick Response Code applied system design of expandable structureization Relationship.
Third-party application will use Quick Response Code application system ability, it is necessary first to initiate registration in systems.Get phase The permission and Credential parameters of pass.
Third-party application is registered after the approval, get corresponding ability open SDK and with its application integration.Third is answered With by calling SDK correlation techniques to use Quick Response Code application system ability.
Some row initializations are carried out to SDK using before SDK.After calling sdk initial methods, sdk can be answered from Quick Response Code Digital certificate and OTP seeds are obtained with system.
The method for calling SDK production Quick Response Codes, you can realize the generation of Quick Response Code.Since QR code content is structuring , its permission third party's business is to be passed to the service parameter of itself generating.
Expandable structure QR code content format is defined as follows:
As shown in figure 3, flow is as follows:
Third application will use Quick Response Code ability, first have to carry out register flow path.Then SDK can be just got to carry out subsequently Integrated work.
It is recommended that third-party application carries out secret key negotiation with Quick Response Code application system in starting application process and obtains number Certificate, to ensure the safety of its communication process.And digital certificate takes part in signature process when producing QR code content.
3) suggest that in process of user login, OTP seed applications are carried out to Quick Response Code application system for third-party application.OTP Seed is the important factor for producing OTP passwords and the important component of QR code content.
The flow for generating Quick Response Code is as follows:
1) user initiates to generate Quick Response Code request, is passed to " public information area " when initiating request as needed and " business expands The content of exhibition section ".
2) SDK generates disposal password (+2 challenging values of 6 disposal passwords), and and user's registration using OTP seeds When the user identifier combination producing OTP codes that distribute, add version number, generate first area's content.
3) first area's content of generation is merged with " public information area " and " operation expanding area " content that user is passed to, and It is calculated by Encryption Algorithm and generates " encrypted area " (third area) content.
4) " encrypted area " content is inserted between third area and the 4th area, forms complete QR code content, and generate figure Piece.Here is a QR code content example:
01,3500100630388791982742872
35010***2542, old * *, 1360***580
5E86B5BAFD1EC178E050007F01000525
http://110.88.128.3/dc/download
Although specific embodiments of the present invention have been described above, those familiar with the art should manage Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this The technical staff in field modification and variation equivalent made by the spirit according to the present invention, should all cover the present invention's In scope of the claimed protection.

Claims (10)

1. a kind of safe two-dimensional code generation method of expansible structuring, it is characterised in that:Including:
Step 1, third-party application obtain Quick Response Code SDK;
Step 2, Quick Response Code SDK generate Quick Response Code, third-party application displaying or storage Quick Response Code, and the Quick Response Code includes one Area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, described 3rd area are encrypted area, and 4th area is expansion area.
2. a kind of safe two-dimensional code generation method of expansible structuring according to claim 1, it is characterised in that:It is described Further include between step 1 and step 2 step a, third-party application by Quick Response Code SDK obtain symmetric key, digital certificate and OTP seeds.
3. a kind of safe two-dimensional code generation method of expansible structuring according to claim 2, it is characterised in that:It is described Step a is specially further:Third-party application applies for that symmetric key, Quick Response Code SDK are negotiated close with server-side by Quick Response Code SDK Key, later server-side symmetric key is encrypted using arranging key, be sent to Quick Response Code SDK later, Quick Response Code SDK by its After decryption, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side are encrypted digital certificate using symmetric key by Quick Response Code SDK, Third-party application is sent to by Quick Response Code SDK later, third-party application stores number card after being decrypted using symmetric key Book;
Third-party application applies for that OTP seeds, server-side are encrypted OTP seeds using symmetric key by Quick Response Code SDK, it Third-party application is sent to by Quick Response Code SDK afterwards, third-party application stores OTP seeds after being decrypted using symmetric key.
4. a kind of safe two-dimensional code generation method of expansible structuring according to claim 1, it is characterised in that:It is described Step 2 is specially further:Quick Response Code SDK obtains viewdata and private data, and viewdata is generated two-dimension code pattern; Private data is subjected to figure layer weight according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set later Write, complete Quick Response Code generate, third-party application displaying or storage Quick Response Code, the Quick Response Code include an area, 2nd area, 3rd area with And 4th areas, an area are version number and transaction business code, 2nd area includes public information, and 3rd area is encrypted area, 4th area is expansion area.
5. a kind of safe two-dimensional code generation method of expansible structuring according to claim 4, it is characterised in that:It is described Private data is subjected to figure layer according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set in step 2 It rewrites, completing Quick Response Code generation is specially further:Generation ciphertext is encrypted in private data, the ciphertext is according to setting Graphics calculations method carries out figure layer rewriting in the graphics field that the two-dimension code pattern is set, and completes Quick Response Code and generates.
6. a kind of safe Quick Response Code of expansible structuring generates system, it is characterised in that:Including:
SDK acquisition modules, third-party application obtain Quick Response Code SDK;
Generation module, Quick Response Code SDK generate Quick Response Code, and third-party application displaying or storage Quick Response Code, the Quick Response Code include One area, 2nd area, 3rd area and 4th area, an area are version number and transaction business code, and 2nd area includes public information, institute It is encrypted area to state 3rd area, and 4th area is expansion area.
7. the safe Quick Response Code of a kind of expansible structuring according to claim 6 generates system, it is characterised in that:It is described Further include between SDK acquisition modules and generation module data acquisition module, third-party application obtained by Quick Response Code SDK it is symmetrical close Key, digital certificate and OTP seeds.
8. the safe Quick Response Code of a kind of expansible structuring according to claim 7 generates system, it is characterised in that:It is described Data acquisition module is specially further:Third-party application applies for symmetric key, Quick Response Code SDK and service by Quick Response Code SDK Arranging key is held, symmetric key is encrypted server-side using arranging key later, is sent to Quick Response Code SDK later, two dimension After code SDK is decrypted, symmetric key value third-party application is sent;
Third-party application applies for that digital certificate, server-side are encrypted digital certificate using symmetric key by Quick Response Code SDK, Third-party application is sent to by Quick Response Code SDK later, third-party application stores number card after being decrypted using symmetric key Book;
Third-party application applies for that OTP seeds, server-side are encrypted OTP seeds using symmetric key by Quick Response Code SDK, it Third-party application is sent to by Quick Response Code SDK afterwards, third-party application stores OTP seeds after being decrypted using symmetric key.
9. the safe Quick Response Code of a kind of expansible structuring according to claim 6 generates system, it is characterised in that:It is described Generation module is specially further:Quick Response Code SDK obtains viewdata and private data, and viewdata is generated Quick Response Code figure Shape;Private data is subjected to figure layer according to the graphics calculations method of setting in the graphics field that the two-dimension code pattern is set later It rewrites, completes Quick Response Code and generate, third-party application displaying or storage Quick Response Code, the Quick Response Code includes an area, 2nd area, 3rd area And 4th areas, an area are version number and transaction business code, 2nd area includes public information, and 3rd area is encryption Area, 4th area are expansion area.
10. the safe Quick Response Code of a kind of expansible structuring according to claim 9 generates system, it is characterised in that:Institute State in generation module by private data according to the graphics calculations method of setting the graphics field that the two-dimension code pattern is set into Row figure layer is rewritten, and is completed Quick Response Code generation and is specially further:Private data is encrypted generation ciphertext, the ciphertext according to The graphics calculations method of setting carries out figure layer rewriting in the graphics field that the two-dimension code pattern is set, and completes Quick Response Code and generates.
CN201810342521.3A 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system Active CN108777617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810342521.3A CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810342521.3A CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Publications (2)

Publication Number Publication Date
CN108777617A true CN108777617A (en) 2018-11-09
CN108777617B CN108777617B (en) 2021-04-06

Family

ID=64033942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810342521.3A Active CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Country Status (1)

Country Link
CN (1) CN108777617B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007261166A (en) * 2006-03-29 2007-10-11 Oki Electric Ind Co Ltd Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device
CN104301747A (en) * 2014-10-30 2015-01-21 杭州宽云视讯科技有限公司 Generating method for digital TV dynamic video stream carrying two-dimensional code labels
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN105989522A (en) * 2015-03-16 2016-10-05 三星电子株式会社 Payment additional service information processing method and electronic device for supporting the same
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007261166A (en) * 2006-03-29 2007-10-11 Oki Electric Ind Co Ltd Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device
CN104301747A (en) * 2014-10-30 2015-01-21 杭州宽云视讯科技有限公司 Generating method for digital TV dynamic video stream carrying two-dimensional code labels
CN105989522A (en) * 2015-03-16 2016-10-05 三星电子株式会社 Payment additional service information processing method and electronic device for supporting the same
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Also Published As

Publication number Publication date
CN108777617B (en) 2021-04-06

Similar Documents

Publication Publication Date Title
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
JP6692234B2 (en) System and method for issuing security domain key management using global platform specifications
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
CN114070614B (en) Identity authentication method, apparatus, device, storage medium and computer program product
CN101807994A (en) Method and system for application data transmission of IC card
CN101741565A (en) Method and system for transmitting IC (integrated circuit)-card application data
CN112653553B (en) Internet of things equipment identity management system
WO2015117212A1 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
TW202137199A (en) Method of authenticating biological payment device, apparatus, electronic device, and computer-readable medium
JP4823704B2 (en) Authentication system, authentication information delegation method and security device in the same system
EP3984161A1 (en) Cryptographic key generation using external entropy generation
CN104899737B (en) Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN110716724A (en) Method and device for realizing privacy block chain based on FPGA
CN106953731A (en) The authentication method and system of a kind of terminal management person
Lenz et al. Towards cross-domain eID by using agile mobile authentication
CN108777617A (en) A kind of safe two-dimensional code generation method of expansible structuring and system
CN107563743B (en) Method and system for improving POS transaction safety
TWI621029B (en) Personal identity authentication method and system using graphic lock
CN106060022A (en) Encryption equipment configuration method and system
Huang et al. A user authentication scheme based on fingerprint and USIM card
CN113285950B (en) Encryption card-based key transmission and storage method
TWI623849B (en) Electronic file security system and method
TW201714128A (en) Payment identification system and method for Internet of Things apparatus analyzing purchase request provided by Internet of Things apparatus through symmetrical encryption key shared with Internet of Things apparatus for generating intelligent device signature
TW202213131A (en) System for using authentication mechanism of fast identity online to enable certificate and method thereof
IT201900015701A1 (en) COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR SECURE IDENTIFICATION OF DISCONNECTED OBJECTS AND THEIR LOCATIONS.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant