CN108777617B - Extensible structured security two-dimensional code generation method and system - Google Patents

Extensible structured security two-dimensional code generation method and system Download PDF

Info

Publication number
CN108777617B
CN108777617B CN201810342521.3A CN201810342521A CN108777617B CN 108777617 B CN108777617 B CN 108777617B CN 201810342521 A CN201810342521 A CN 201810342521A CN 108777617 B CN108777617 B CN 108777617B
Authority
CN
China
Prior art keywords
dimensional code
area
sdk
party application
symmetric key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810342521.3A
Other languages
Chinese (zh)
Other versions
CN108777617A (en
Inventor
林龙
李钻达
范启庭
赵子彬
林乐然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Newland Fujian Public Service Co ltd
Original Assignee
Newland Fujian Public Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newland Fujian Public Service Co ltd filed Critical Newland Fujian Public Service Co ltd
Priority to CN201810342521.3A priority Critical patent/CN108777617B/en
Publication of CN108777617A publication Critical patent/CN108777617A/en
Application granted granted Critical
Publication of CN108777617B publication Critical patent/CN108777617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The invention provides an extensible structured safe two-dimensional code generation method.A third party application acquires a two-dimensional code (SDK); the method comprises the steps that a two-dimensional code is generated by a two-dimensional code SDK, a third party application displays or stores the two-dimensional code, the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area; the invention also provides an extensible structured safe two-dimensional code generation system, which improves the safety of the two-dimensional code and the safety of the two-dimensional code application scene.

Description

Extensible structured security two-dimensional code generation method and system
Technical Field
The invention relates to an extensible structured security two-dimensional code generation method and system.
Background
The internet is developed rapidly, and the two-dimension codes have the advantages of high efficiency, convenience, low cost and the like, so that people are used to a convenient life service mode based on the two-dimension codes, but the two-dimension codes commonly used at present are two-dimension code structures self-defined by each service, the service randomness is high, obstacles are caused to information interaction and service intercommunication, meanwhile, the two-dimension code information interaction and service safety cannot be effectively guaranteed, and risks such as falsification of transaction data or user information leakage can be caused.
The existing two-dimensional code technology may also have the following problems:
1. the safety of the application scene is not high, and the safety measures of the two-dimension code content are insufficient;
2. only the service requirements of the user need to be met, and the two-dimension code content format is solidified and cannot be flexibly expanded;
3. the two-dimension code correlation capability is only used by a self service system, and the uniform two-dimension code correlation capability cannot be published to the outside.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an extensible structured secure two-dimensional code generation method and system, so that the security of a two-dimensional code is improved, and the security of a two-dimensional code application scene is improved.
One of the present invention is realized by: an extensible structured security two-dimensional code generation method comprises the following steps:
step 1, a third party application acquires a two-dimensional code SDK;
and 2, generating a two-dimensional code by the two-dimensional code SDK, and displaying or storing the two-dimensional code by a third party application, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
Further, step a is included between step 1 and step 2, the third party application obtains the symmetric key, the digital certificate and the OTP seed through the two-dimensional code SDK.
Further, the step a is further specifically: the third party application applies for a symmetric key through the two-dimensional code SDK, the two-dimensional code SDK negotiates a key with the server side, then the server side encrypts the symmetric key by using the negotiated key and sends the encrypted symmetric key to the two-dimensional code SDK, and the two-dimensional code SDK decrypts the encrypted symmetric key and sends the symmetric key to the third party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seeds through the two-dimensional code SDK, the server side encrypts the OTP seeds through the symmetric key and then sends the OTP seeds to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the OTP seeds through the symmetric key and then stores the OTP seeds.
Further, the step 2 is further specifically: the two-dimension code SDK acquires visual data and private data, and generates a two-dimension code graph from the visual data; and then, carrying out layer rewriting on the private data in a graph area set by the two-dimensional code graph according to a set graph calculation method, completing two-dimensional code generation, and displaying or storing the two-dimensional code by a third party application, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
Further, in step 2, performing layer rewriting on the private data in a graph area set by the two-dimensional code graph according to a set graph calculation method, and completing the generation of the two-dimensional code is further specifically: and encrypting the private data to generate a ciphertext, and performing layer rewriting on the ciphertext in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete the generation of the two-dimensional code.
The second invention is realized by the following steps: an extensible structured secure two-dimensional code generation system, comprising:
the SDK acquisition module is used for acquiring the two-dimensional code SDK by a third-party application;
the system comprises a generating module, a two-dimension code SDK and a third party application, wherein the two-dimension code SDK generates a two-dimension code, the third party application displays or stores the two-dimension code, the two-dimension code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
Further, a data acquisition module is further included between the SDK acquisition module and the generation module, and the third-party application acquires the symmetric key, the digital certificate and the OTP seed through the two-dimensional code SDK.
Further, the data obtaining module is further specifically: the third party application applies for a symmetric key through the two-dimensional code SDK, the two-dimensional code SDK negotiates a key with the server side, then the server side encrypts the symmetric key by using the negotiated key and sends the encrypted symmetric key to the two-dimensional code SDK, and the two-dimensional code SDK decrypts the encrypted symmetric key and sends the symmetric key to the third party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seeds through the two-dimensional code SDK, the server side encrypts the OTP seeds through the symmetric key and then sends the OTP seeds to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the OTP seeds through the symmetric key and then stores the OTP seeds.
Further, the generating module is further specifically: the two-dimension code SDK acquires visual data and private data, and generates a two-dimension code graph from the visual data; and then, carrying out layer rewriting on the private data in a graph area set by the two-dimensional code graph according to a set graph calculation method, completing two-dimensional code generation, and displaying or storing the two-dimensional code by a third party application, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
Further, the generating module performs layer rewriting on the private data in a graph area set by the two-dimensional code graph according to a set graph calculation method, and the completing of the two-dimensional code generation further specifically includes: and encrypting the private data to generate a ciphertext, and performing layer rewriting on the ciphertext in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete the generation of the two-dimensional code.
The invention has the following advantages: 1. the two-dimension code output method has the capability of outputting the two-dimension code externally, so that other third-party systems can apply for accessing the capability of using the two-dimension code without repeated construction. 2. The safety of the two-dimensional code application scene is improved. 3. The strong expansibility meets the personalized service requirement of the accessed third-party application.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic diagram of an extensible structured security two-dimensional code application system according to an embodiment of the present invention.
Fig. 3 is a flowchart of an access process of a third-party application using a two-dimensional code application system according to an embodiment of the present invention.
Detailed Description
As shown in fig. 1, the method for generating an extensible structured secure two-dimensional code of the present invention includes:
step 1, a third party application acquires a two-dimensional code SDK;
step a, a third party application applies for a symmetric key through a two-dimensional code SDK, the two-dimensional code SDK negotiates a key with a server side, then the server side encrypts the symmetric key by using the negotiated key and sends the encrypted symmetric key to the two-dimensional code SDK, and the two-dimensional code SDK decrypts the encrypted symmetric key and sends the symmetric key to the third party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seeds through the two-dimensional code SDK, the server side encrypts the OTP seeds through the symmetric key and then sends the OTP seeds to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the OTP seeds through the symmetric key and then stores the OTP seeds;
step 2, the two-dimension code SDK acquires visual data and privacy data, and generates a two-dimension code graph from the visual data; and then encrypting the private data to generate a ciphertext, wherein the ciphertext performs layer rewriting in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete two-dimensional code generation, and a third party application displays or stores the two-dimensional code, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
The two-dimensional code can expand the area thereof according to the requirement, and can be more than four areas.
The second invention is realized by the following steps: an extensible structured secure two-dimensional code generation system, comprising:
the SDK acquisition module is used for acquiring the two-dimensional code SDK by a third-party application;
the data acquisition module is used for applying for a symmetric key by a third-party application through the two-dimensional code SDK, negotiating the key with the server side by the two-dimensional code SDK, encrypting the symmetric key by using the negotiated key by the server side, then sending the encrypted symmetric key to the two-dimensional code SDK, decrypting the encrypted symmetric key by the two-dimensional code SDK, and sending the symmetric key to the third-party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seed through the two-dimensional code SDK, the server side encrypts the OTP seed through the symmetric key and then sends the OTP seed to the third-party application through the two-dimensional code SDK, the third-party application decrypts the OTP seed through the symmetric key and then stores the OTP seed, and the OTP seed is used for generating an OTP password;
the generation module is used for acquiring visual data and privacy data by the two-dimensional code SDK and generating a two-dimensional code graph from the visual data; and then encrypting the private data to generate a ciphertext, wherein the ciphertext performs layer rewriting in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete two-dimensional code generation, and a third party application displays or stores the two-dimensional code, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
One specific embodiment of the present invention:
as shown in fig. 2, the logical interaction relationship of each important component in the design of the extensible structured secure two-dimensional code application system.
To use the two-dimensional code application system capability, a third party application first needs to initiate registration in the system. And acquiring related authority and certificate parameters.
And after the registration and verification of the third-party application are passed, acquiring the corresponding capacity open SDK and integrating the capacity open SDK with the application of the capacity open SDK. The third application uses the two-dimensional code application system capability by calling the SDK related method.
Some column initialization of the SDK is performed before the SDK is used. After calling sdk the initialization method, sdk obtains the digital certificate and the OTP seed from the two-dimensional code application system.
And calling the method for producing the two-dimensional code by the SDK to generate the two-dimensional code. Since the two-dimension code content is structured, the method allows the third-party service to generate service parameters which are transmitted into the third-party service.
The content format of the extensible structured two-dimensional code is defined as follows:
Figure GDA0002902990580000061
Figure GDA0002902990580000071
Figure GDA0002902990580000081
as shown in fig. 3, the flow is as follows:
the third application uses the two-dimension code capability and firstly performs a registration process. And then the SDK can be obtained for subsequent integration work.
And the third party application is proposed to perform key negotiation with the two-dimensional code application system and acquire the digital certificate in the application starting process, so that the safety of the communication process of the third party application is ensured. And the digital certificate participates in the signature process when the two-dimension code content is produced.
3) And suggesting that the third party application applies for the OTP seeds to the two-dimensional code application system in the user login process. The OTP seed is an important factor for producing the OTP password and is also an important component of the content of the two-dimensional code.
The process of generating the two-dimensional code is as follows:
1) the user initiates a request for generating the two-dimension code, and the content of the 'public information area' and the 'service expansion area' is transmitted as required when the request is initiated.
2) The SDK generates a one-time password (6-bit one-time password + 2-bit challenge value) by using the OTP seed, and generates an OTP code by combining the OTP code with a user identifier distributed during user registration, and then generates first region content by adding a version number.
3) And combining the generated content of the first area with the content of the 'public information area' and the 'service expansion area' transmitted by the user, and calculating and generating the content of the 'encryption area' (third area) through an encryption algorithm.
4) And inserting the content of the 'encryption area' between the third area and the fourth area to form complete two-dimensional code content and generate a picture. The following is an example of two-dimensional code content:
01,3500100630388791982742872
35010 × 2542, chen × 1360 × 580
5E86B5BAFD1EC178E050007F01000525
http://110.88.128.3/dc/download
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (6)

1. An extensible structured security two-dimensional code generation method is characterized in that: the method comprises the following steps:
step 1, a third party application acquires a two-dimensional code SDK;
step 2, the two-dimension code SDK acquires visual data and privacy data, and generates a two-dimension code graph from the visual data; and then encrypting the private data to generate a ciphertext, wherein the ciphertext performs layer rewriting in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete two-dimensional code generation, and a third party application displays or stores the two-dimensional code, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
2. The method for generating extensible structured security two-dimensional code according to claim 1, wherein: step a, the third party application obtains the symmetric key, the digital certificate and the OTP seed through the two-dimensional code SDK.
3. The method for generating extensible structured security two-dimensional code according to claim 2, wherein: the step a is further specifically as follows: the third party application applies for a symmetric key through the two-dimensional code SDK, the two-dimensional code SDK negotiates a key with the server side, then the server side encrypts the symmetric key by using the negotiated key and sends the encrypted symmetric key to the two-dimensional code SDK, and the two-dimensional code SDK decrypts the encrypted symmetric key and sends the symmetric key to the third party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seeds through the two-dimensional code SDK, the server side encrypts the OTP seeds through the symmetric key and then sends the OTP seeds to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the OTP seeds through the symmetric key and then stores the OTP seeds.
4. An extensible structured security two-dimensional code generation system is characterized in that: the method comprises the following steps:
the SDK acquisition module is used for acquiring the two-dimensional code SDK by a third-party application;
the generation module is used for acquiring visual data and privacy data by the two-dimensional code SDK and generating a two-dimensional code graph from the visual data; and then encrypting the private data to generate a ciphertext, wherein the ciphertext performs layer rewriting in a graph area set by the two-dimensional code graph according to a set graph calculation method to complete two-dimensional code generation, and a third party application displays or stores the two-dimensional code, wherein the two-dimensional code comprises a first area, a second area, a third area and a fourth area, the first area is a version number and a transaction service code, the second area comprises public information, the third area is an encryption area, and the fourth area is an expansion area.
5. The system of claim 4, wherein the system comprises: the data acquisition module and the third party application are arranged between the SDK acquisition module and the generation module and acquire the symmetric key, the digital certificate and the OTP seed through the two-dimensional code SDK.
6. The system of claim 5, wherein the system comprises: the data acquisition module is further specifically: the third party application applies for a symmetric key through the two-dimensional code SDK, the two-dimensional code SDK negotiates a key with the server side, then the server side encrypts the symmetric key by using the negotiated key and sends the encrypted symmetric key to the two-dimensional code SDK, and the two-dimensional code SDK decrypts the encrypted symmetric key and sends the symmetric key to the third party application;
the third-party application applies for the digital certificate through the two-dimensional code SDK, the server side encrypts the digital certificate through the symmetric key and then sends the encrypted digital certificate to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the digital certificate through the symmetric key and then stores the decrypted digital certificate;
the third-party application applies for the OTP seeds through the two-dimensional code SDK, the server side encrypts the OTP seeds through the symmetric key and then sends the OTP seeds to the third-party application through the two-dimensional code SDK, and the third-party application decrypts the OTP seeds through the symmetric key and then stores the OTP seeds.
CN201810342521.3A 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system Active CN108777617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810342521.3A CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810342521.3A CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Publications (2)

Publication Number Publication Date
CN108777617A CN108777617A (en) 2018-11-09
CN108777617B true CN108777617B (en) 2021-04-06

Family

ID=64033942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810342521.3A Active CN108777617B (en) 2018-04-17 2018-04-17 Extensible structured security two-dimensional code generation method and system

Country Status (1)

Country Link
CN (1) CN108777617B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007261166A (en) * 2006-03-29 2007-10-11 Oki Electric Ind Co Ltd Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device
CN104301747A (en) * 2014-10-30 2015-01-21 杭州宽云视讯科技有限公司 Generating method for digital TV dynamic video stream carrying two-dimensional code labels
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN105989522A (en) * 2015-03-16 2016-10-05 三星电子株式会社 Payment additional service information processing method and electronic device for supporting the same
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007261166A (en) * 2006-03-29 2007-10-11 Oki Electric Ind Co Ltd Printing checking sheet preparing device, printing checking sheet, preparing method for printing checking sheet, computer program, and two-dimensional code preparing device
CN104301747A (en) * 2014-10-30 2015-01-21 杭州宽云视讯科技有限公司 Generating method for digital TV dynamic video stream carrying two-dimensional code labels
CN105989522A (en) * 2015-03-16 2016-10-05 三星电子株式会社 Payment additional service information processing method and electronic device for supporting the same
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Also Published As

Publication number Publication date
CN108777617A (en) 2018-11-09

Similar Documents

Publication Publication Date Title
CN108292402B (en) Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
US8239679B2 (en) Authentication method, client, server and system
CN101340279B (en) Method, system and apparatus for data ciphering and deciphering
CN105580311A (en) Data security using request-supplied keys
CN107425971B (en) Certificateless data encryption/decryption method and device and terminal
CN109068322B (en) Decryption method, system, mobile terminal, server and storage medium
CN109981292B (en) SM9 algorithm-based authentication method, device and system
JP2015524945A5 (en)
CN110380846B (en) Electronic medical record patient signature method and system
CN109525388B (en) Combined encryption method and system with separated keys
CN109802834A (en) The method and system that a kind of pair of business layer data is encrypted, decrypted
CN114302367A (en) Certificate application method and device, electronic equipment and storage medium
CN114079921B (en) Session key generation method, anchor point function network element and system
KR101140576B1 (en) Multi?user search system and method of encrypted document
CA2913571A1 (en) Multi-platform user authentication device with double and multilaterally blind on-the-fly key generation
CN105530089B (en) Attribute-based encryption method and device
Saidov et al. Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments
CN108777617B (en) Extensible structured security two-dimensional code generation method and system
US20220407690A1 (en) Key ladder generating a device public key
CN116318696A (en) Proxy re-encryption digital asset authorization method under condition of no initial trust of two parties
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
WO2017107642A1 (en) Text processing method, apparatus and system for secure input method
FR3081652A1 (en) METHOD FOR ESTABLISHING KEYS FOR CONTROLLING ACCESS TO A SERVICE OR A RESOURCE
KR101760718B1 (en) System and method for managing mobile device based on pairing
EP2267976B1 (en) Method and system for secure communication between computers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant