CN108898206A - A kind of method and barcode scanning safe checking method generating gathering code - Google Patents

A kind of method and barcode scanning safe checking method generating gathering code Download PDF

Info

Publication number
CN108898206A
CN108898206A CN201810596992.7A CN201810596992A CN108898206A CN 108898206 A CN108898206 A CN 108898206A CN 201810596992 A CN201810596992 A CN 201810596992A CN 108898206 A CN108898206 A CN 108898206A
Authority
CN
China
Prior art keywords
code
payment
user
dimensional code
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810596992.7A
Other languages
Chinese (zh)
Inventor
董温彬
陈逢源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201810596992.7A priority Critical patent/CN108898206A/en
Publication of CN108898206A publication Critical patent/CN108898206A/en
Priority to PCT/CN2018/124947 priority patent/WO2019237718A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The method and a kind of barcode scanning safe checking method that gathering code generates are generated in anti-tamper two dimensional code server end this application provides a kind of.The method for generating gathering code in anti-tamper two dimensional code server end generates request including receiving the gathering code that client is sent;It includes the User Identity that client corresponds to user that the gathering code, which generates request,;Two dimensional code is generated according to the User Identity;The user identifier picture for the corresponding user that two dimensional code generated and client are submitted is combined, gathering code is obtained, so as to based on gathering code progress barcode scanning safety check.By audit to the user identifier picture and with the binding of User Identity, the user identifier picture in the user identifier picture stored in server database and payment code can be verified, improve the safety of barcode scanning payment.

Description

Method for generating collection code and code scanning safety verification method
[ technical field ] A method for producing a semiconductor device
The application relates to the field of internet application, in particular to a collection code generation method and a code scanning safety verification method.
[ background of the invention ]
With the rapid development of computer technology, people's life is more and more convenient depending on the technical development. For example, many services start to use the code scanning function, and relevant service information can be obtained through scanning, so as to execute corresponding services. Taking payment application as an example, code scanning payment is more and more widely applied to daily life of people, and when a user pays, the user can scan a static collection code of a collection party without using cash to finish payment.
The static cash register code is mainly a two-dimensional code which is applied to a payment mechanism by a merchant and is pasted in front of a shop for cash register. At present, a two-dimensional cash register provided for a payment treasure or a WeChat official is common, or an integrated cash register provided for mechanisms such as a money bar is common, and the common type is a square with a white background and a black color block.
Although convenient and fast, the two-dimensional code of issuing at present also has the potential safety hazard, because the people do not know the sign indicating number, even the two-dimensional code of oneself is replaced and also can't learn:
1. for merchants, the two-dimensional code has the risk of being tampered, similar events are often popped out on the current network, serious economic loss is caused to the merchants, and the merchants are often difficult to trace.
2. For a payer, in some dense areas, the attribution of the two-dimensional code is difficult to distinguish, potential fund loss can be caused due to the existence of partial lawless persons, and the security of code scanning cannot be guaranteed.
The code scanning mode brings convenience to users, and meanwhile, how to guarantee the safety of the code scanning mode is also a problem which needs to be solved urgently.
[ summary of the invention ]
Various aspects of the application provide a collection code generation method and a code scanning safety verification method, which are used for improving code scanning safety.
One aspect of the application provides a method for generating a cash register code at a tamper-resistant two-dimensional code server, including: receiving a cash receiving code generation request sent by a client; the receiving code generating request comprises a user identity of a user corresponding to the client; generating a two-dimensional code according to the user identity; and combining the generated two-dimensional code with a user identification picture of the corresponding user submitted by the client to obtain a cash register code, so that code scanning safety verification is performed based on the cash register code.
One aspect of the present application provides a code scanning security verification method, including: the tamper-proof two-dimensional code server receives a service request of a collection code sent by a client; the payment receiving code is a two-dimensional code generated by a tamper-proof two-dimensional code server according to a user identity of a payee; the generated two-dimensional code is combined with a payee user identification picture to obtain the two-dimensional code; the tamper-proof two-dimensional code server searches a corresponding user identification picture for security verification based on the user identification corresponding to the money receiving code included in the service request; and the anti-tampering two-dimensional code server sends the corresponding user identification picture for security verification to the client so as to determine a security verification result at the client based on the user identification picture for security verification.
In another aspect of the present application, a code scanning security verification method is provided, including: the tamper-proof two-dimensional code server receives a service request of a collection code sent by a client; the payment receiving code is a two-dimensional code generated by a tamper-proof two-dimensional code server according to a user identity of a payee; the generated two-dimensional code is combined with a payee user identification picture to obtain the two-dimensional code; the tamper-proof two-dimensional code server searches a corresponding user identification picture for security verification based on the user identification corresponding to the money receiving code included in the service request; and the tamper-proof two-dimensional code server compares the similarity of the user identification picture in the payment receiving code included in the service request with the searched user identification picture for security verification to determine a security verification result.
In another aspect of the present application, there is provided an apparatus, comprising: one or more processors; a storage device to store one or more programs that, when executed by the one or more processors, cause the one or more processors to implement any of the above-described methods.
In another aspect of the present application, a computer-readable storage medium is provided, on which a computer program is stored, wherein the program, when executed by a processor, implements any of the above-mentioned methods.
According to the technical scheme, the user identification picture is added in the two-dimensional code, so that a user can verify whether the two-dimensional code is safe through the identification picture, and the safety of a code scanning payment service is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and those skilled in the art can also obtain other drawings according to the drawings without inventive labor.
Fig. 1 is a schematic flowchart of a method for generating a cash register code at a tamper-resistant two-dimensional code server according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a code scanning verification method according to a second embodiment of the present application;
fig. 3 is a schematic flowchart of a code scanning verification method according to a second embodiment of the present application;
fig. 4 is a schematic flowchart of a code scanning verification method according to a second embodiment of the present application;
FIG. 5 is a block diagram of an exemplary computer system/server suitable for use in implementing embodiments of the present invention.
[ detailed description ] embodiments
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in some embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Fig. 1 is a schematic flowchart of a method for generating a cash register at a tamper-resistant two-dimensional code server according to an embodiment of the present application, and as shown in fig. 1, the method includes:
in a preferred implementation manner of this embodiment, the payee needs to register with the tamper-resistant two-dimensional code server in advance, and the tamper-resistant two-dimensional code server allocates a user id for identifying the user to the payee after the registration is successful. Only the payee user after successful registration can request the anti-tampering two-dimensional code server to generate a cash register code for the payee user.
Preferably, the payee sends a registration request to the tamper-resistant two-dimensional code server through the client, and the tamper-resistant two-dimensional code server allocates the user identity to the payee based on the registration request.
The payee opens the client on the mobile terminal or opens a webpage corresponding to the tamper-proof two-dimensional code server, and registers on the user registration interface, for example, a user name and a password are input for registration, or the registration can be performed by filling in a mobile phone number, receiving a verification short message sent by the tamper-proof two-dimensional code sending mechanism and then verifying.
The tamper-proof two-dimensional code server distributes the user identity identification for the payee, and sends a registration success prompt message to the payee to prompt the user that the registration is successful.
The user identity mark can mark the identity of the payee and is used for determining qualification documents, user identity pictures and the like uploaded by the payee.
In a preferred implementation manner of this embodiment, the payee needs to upload the qualification document to the tamper-resistant two-dimensional code server in advance, so that the tamper-resistant two-dimensional code server verifies the qualification document.
Preferably, after the register of the payee is successful, submitting the user qualification certificate to the tamper-resistant two-dimensional code server; and the tamper-proof two-dimensional code server verifies the qualification certification information of the user and matches the qualification certification information passing the verification with the user identity, wherein the only effective user identity is matched with the qualification certification information.
Preferably, the payee may click on the option of uploading the qualification documents in the client or the corresponding webpage, and upload the qualification documents selected by the user, such as an identity card, a business license, and the like, to the tamper-resistant two-dimensional code server; and receiving a successful audit message of the qualification certification file returned by the tamper-resistant two-dimensional code server.
The qualification certification file can certify the identity of the payee, and the payment safety is improved. By checking the qualification certification file of the payee, the identity of the payee can be ensured, other people are prevented from embezzlement the identity of the payee, and the payment safety is improved.
The client in this embodiment may be a client provided by the tamper-resistant two-dimensional code issuing mechanism, and may also include other clients that are acknowledged or authorized by the corresponding tamper-resistant two-dimensional code issuing mechanism and that can implement the technical scheme of the present application. The server may be a tamper resistant two-dimensional code server.
The tamper-proof two-dimensional code server is used for providing a payee with a cash collection code containing a user identification picture of the payee, providing the user identification picture stored in the server database to the payer to be compared with the user identification picture in the cash collection code for verification during scanning payment, and preventing the cash collection code from being tampered so as to improve the security of code scanning payment.
In a preferred embodiment of this embodiment, the tamper-resistant two-dimensional code sending mechanism and the payment mechanism may be the same mechanism, that is, the client provided by the tamper-resistant two-dimensional code sending mechanism is a client, and the tamper-resistant two-dimensional code server and the payment server are the same server.
In another preferred embodiment of this embodiment, the tamper-proof two-dimensional code sending mechanism and the payment mechanism may be different mechanisms, and the payment mechanism invokes the service of the tamper-proof two-dimensional code sending mechanism.
In step S11, the client sends a barcode generation request to the tamper-resistant two-dimensional code server; the receiving code generating request comprises a user identity of a user corresponding to the client;
preferably, the payee may click a receive code generation option in the client, and trigger the client to send a receive code generation request to the server, so as to request the server to generate a corresponding receive code for the payee.
In step S12, the tamper-resistant two-dimensional code server receives a barcode generation request sent by the client; and generating a two-dimensional code according to the user identity.
The step can adopt conventional two-dimension code generation logic, and is not described in detail. The two-dimensional code comprises a user identity of the payee. The two-dimensional code may also contain a link address pointing to a tamper-resistant two-dimensional code server.
In step S13, the tamper-resistant two-dimensional code server combines the generated two-dimensional code with the user identification picture of the corresponding user submitted by the client, to obtain a cash register code, so as to perform code scanning security check based on the cash register code.
Preferably, the user identification picture may be a portrait, a logo or any other identification picture that can identify the user.
In a preferred implementation manner of this embodiment, the receiving code generation request includes a user identification picture.
In another preferred implementation manner of this embodiment, the client uploads the user identifier picture to the tamper-resistant two-dimensional code server in advance, so that the tamper-resistant two-dimensional code server verifies the user identifier picture. And the tamper-proof two-dimensional code server searches for a corresponding user identification picture according to the user identification included in the cash register code generation request. By uploading the user identification picture in advance, the successful speed of generating the cash register code can be improved.
Preferably, the payee may click an upload user identification picture option in the client, and upload the selected user identification picture to the server; and receiving a successful audit message of the user identification picture returned by the server.
Preferably, the tamper-resistant two-dimensional code server audits the user identification picture uploaded by the payee through an image recognition technology so as to determine whether the uploaded user identification picture conforms to the submitter himself or a business license thereof. For example, if the user identification picture is a user portrait, whether the user portrait is consistent with a user identity card is judged; and if the user identification picture is a logo, judging whether the logo conforms to a business license.
Preferably, the tamper-resistant two-dimensional code server can also perform form audit on the user identification picture uploaded by the payee. For example, the format, size, resolution, etc. of the user identification picture are automatically checked; and performing automatic or manual auditing and the like on whether the user identification picture violates the law or social morality.
After the verification is passed, the tamper-proof two-dimensional code server stores the user identification picture passing the verification in a database of the server, and sends prompt information of successful verification of the user identification picture to a payee. The user identification picture stored in the database is determined by the corresponding user identification.
And if the audit is not passed, the tamper-proof two-dimensional code server sends prompt information of the failure of the audit of the user identification picture to the payee, and prompts the payee to upload the user identification picture again.
The user identification picture is used as a background picture of the two-dimensional code and combined with the two-dimensional code to be used as a cash register code, when a payer scans the cash register code to pay to the cash register, the anti-tampering two-dimensional code server firstly searches a corresponding user identification picture in a database of the server according to a user identity corresponding to the cash register code and sends the user identification picture to a client side so as to display the user identification picture to the payer, and the payer can compare and check the background picture in the scanned cash register code with the user identification picture; if not, sending risk prompt information to the payer to prompt the payer to terminate payment, for example, "the current payee code is not registered in the tamper-proof two-dimensional code payment system".
Preferably, the user identification picture is faded; and taking the faded user identification picture as a background picture of the two-dimensional code and combining the faded user identification picture with the two-dimensional code. The fading standard is that the two-dimensional code in the generated cash register code can be scanned and identified normally, as long as the fault-tolerant error-correcting performance of the two-dimensional code is not affected. Based on the error correction function of the two-dimensional code, even if a part is covered or lost, the two-dimensional code therein can be scanned and recognized.
Preferably, the user identification picture is displayed in a peripheral area of the two-dimensional code.
Preferably, in a code scanning payment scene, code scanning safety verification is carried out based on the cash register.
The user identity corresponding to the cash register code is used for the anti-tampering two-dimensional code server to search a corresponding user identity picture for security verification; so as to determine a security verification result at the client based on the user identification picture corresponding to the cash register code; or the tamper-proof two-dimensional code server compares the similarity of the image of the cash register code included in the service request with the searched user identification picture for security verification to determine a security verification result.
In step S14, the tamper resistant two-dimensional code server transmits the generated barcode to the client.
Preferably, the cash register code is in a picture format and can be displayed and printed by a client; alternatively, the checkout code may be printed by the server and provided to the payee.
The client can display the collection code, and the payer scans the collection code to pay the payee. The payee can also print and post the payment code for the payer to scan the payment code for payment.
Different from the user head portrait information in other existing payment codes, in this embodiment, the user identification picture is stored in the server through auditing the user identification picture and binding with the user identity, so that a payer can perform comparison and verification according to the user identification picture stored in the server database and the user identification picture in the payment code when scanning the code, and the security of code scanning payment is improved.
Fig. 2 is a schematic flow chart of a code scanning verification method according to a second embodiment of the present application, and as shown in fig. 2, when a payer scans a payee code to pay for the payee code, the flow chart shown in fig. 2 may be executed:
in step S21, the client scans the barcode and sends a service request of the barcode to the tamper-resistant two-dimensional code server;
the client can be a payment software client such as a WeChat client, a Payment treasure client, a pay-through wallet client and the like, and can also comprise other clients which are acknowledged or authorized by a corresponding anti-tampering two-dimensional code sending mechanism and can realize the technical scheme of the application.
The money receiving code is a two-dimensional code generated by the anti-tampering two-dimensional code server according to the user identity of the payee; and combining the generated two-dimensional code with the payee user identification picture to obtain the two-dimensional code.
When the payer pays to the payee after shopping, the payer can open the client on the mobile phone, scan the payee code provided by the payee and send a service request to the tamper-proof two-dimensional code server. And the service request requests the anti-tampering two-dimensional code server to carry out validity verification on the collection code. Or for the payment request of the cash register code, firstly, the validity of the cash register code is verified by the anti-tampering two-dimensional code server, and the two-dimensional code is paid after the verification is passed.
Preferably, the client can analyze the two-dimensional code in the collection code after scanning the collection code to obtain a user identity of a payee contained in the two-dimensional code as a user identity corresponding to the collection code, and send a service request to the tamper-resistant two-dimensional code server according to a link address pointing to the tamper-resistant two-dimensional code server contained in the two-dimensional code, wherein the service request includes the user identity corresponding to the collection code obtained by scanning, and is used for the tamper-resistant two-dimensional code server to perform security verification.
In step S22, the tamper-resistant two-dimensional code server receives a service request of a cash register sent by the client, and searches for a corresponding user identifier picture for security verification based on a user identifier corresponding to the cash register included in the service request.
Preferably, the steps further comprise: the tamper-proof two-dimensional code server firstly determines whether a corresponding user is a registered user of the tamper-proof two-dimensional code payment system according to a user identity corresponding to a payment receiving code included in the service request, if so, a corresponding user identity picture for safety verification is searched in a database of the server according to the user identity corresponding to the payment receiving code included in the service request and is sent to a client side so as to be displayed to a payer, and the payer can compare and verify the user identity picture with the user identity picture in the scanned payment receiving code; if not, sending risk prompt information to the payer to prompt the payer to terminate payment, for example, "the current payee code is not registered in the tamper-proof two-dimensional code payment system". And storing the user identification picture which passes the verification in a database of the server after the server verifies the user identification picture sent by the payee.
In step S23, the tamper-resistant two-dimensional code server sends the user identification picture to the client, so as to display the user identification picture to the payer in the payment interface of the client, and prompt the payer to compare the user identification picture displayed in the payment interface with the user identification picture in the scanned cash register code.
In step S24, if the user id picture displayed in the payment interface of the client is the same as the background picture in the scanned cash register, the payer may confirm to continue to pay; if not, the payer may terminate the payment and notify the payee.
Preferably, the payer can click a 'confirm' button on the payment interface to continue the payment; the payment can also be cancelled by clicking a 'cancel' button on the payment interface.
In step S25, after receiving the confirmation command of the payer to continue paying, the tamper-resistant two-dimensional code server constructs a corresponding payment request, and forwards the payment request to the payment server, and the payment server processes the payment request.
Preferably, the service request of the cash register code sent by the client includes identification information of corresponding payment software, the tamper-resistant two-dimensional code server constructs a corresponding payment request according to the identification information, and forwards the payment request to a payment server corresponding to the payment software.
Preferably, the tamper-proof two-dimensional code server terminates the payment operation after receiving a confirmation command of canceling the payment by the payer.
Preferably, if the tamper-resistant two-dimensional code server does not receive the confirmation instruction of the user within a predetermined time, for example, the user does not confirm or cancel, the payment is terminated.
In step S26, the payment server receives the payment request, and guides the payer to complete payment, performs settlement, and notifies the payee that the payment is completed.
Preferably, in another preferred embodiment of the present invention,
the tamper-proof two-dimensional code server firstly determines whether a corresponding user is a registered user of the tamper-proof two-dimensional code payment system according to a user identity corresponding to a money receiving code included in the service request, if so, a corresponding user identity picture for security verification is searched in a database of the server according to the user identity corresponding to the money receiving code included in the service request and is sent to a client, and the client compares and verifies the corresponding user identity picture for security verification with a user identity picture in a scanned money receiving code; if not, sending risk prompt information to the payer to prompt the payer to terminate payment, for example, "the current payee code is not registered in the tamper-proof two-dimensional code payment system". And storing the user identification picture which passes the verification in a database of the server after the server verifies the user identification picture sent by the payee.
The client compares and verifies the corresponding user identification picture used for safety verification with a user identification picture in the scanned cash register code, and sends a confirmation command with a consistent comparison result to the tamper-resistant two-dimensional code server according to the verification result so as to continue payment; or sending a confirmation command with inconsistent comparison results to terminate payment; or, no confirmation command is sent to terminate the payment.
After receiving a confirmation command of continuing payment sent by a client, the tamper-resistant two-dimensional code server constructs a corresponding payment request, forwards the payment request to a payment server, and processes the payment request by the payment server.
Preferably, the service request of the cash register code sent by the client includes identification information of corresponding payment software, the tamper-resistant two-dimensional code server constructs a corresponding payment request according to the identification information, and forwards the payment request to a payment server corresponding to the payment software.
Preferably, the tamper-resistant two-dimensional code server terminates the payment operation after receiving a confirmation command of canceling the payment from the client. Preferably, if the tamper-resistant two-dimensional code server does not receive a confirmation instruction of the client within a predetermined time, for example, the client does not confirm or cancel, the payment is terminated.
Different from the user head portrait information in other existing payment codes, in this embodiment, through auditing the user identification picture and binding with the user identity, the payer can scan the code to obtain the user identification picture stored in the server database, and compare and check the user identification picture with the user identification picture in the payment code, so that the security of code scanning payment is improved.
Fig. 3 is a schematic flow chart of a code scanning verification method according to a second embodiment of the present application, and as shown in fig. 3, when a payer scans a payee code to pay for the payee code, the flow chart shown in fig. 3 may be executed:
in step S31, the client scans the barcode and sends a service request of the barcode to the tamper-resistant two-dimensional code server;
the client can be a payment software client such as a WeChat client, a Payment treasure client, a pay-through wallet client and the like, and can also comprise other clients which are acknowledged or authorized by a corresponding anti-tampering two-dimensional code sending mechanism and can realize the technical scheme of the application.
The money receiving code is a two-dimensional code generated by the anti-tampering two-dimensional code server according to the user identity of the payee; and combining the generated two-dimensional code with the payee user identification picture to obtain the two-dimensional code.
When the payer wants to pay after shopping, the payer can open the client on the mobile phone, scan the payee code provided by the payee and send a service request to the tamper-proof two-dimensional code server. And the service request requests the anti-tampering two-dimensional code server to carry out validity verification on the collection code. Or for the payment request of the cash register code, firstly, the validity of the cash register code is verified by the anti-tampering two-dimensional code server, and the two-dimensional code is paid after the verification is passed.
Preferably, after the collection code is scanned, the client analyzes the two-dimensional code in the collection code to obtain the user identity of the collection party contained in the two-dimensional code as the user identity corresponding to the collection code, and sends a service request to the tamper-proof two-dimensional code server according to a link address pointing to the tamper-proof two-dimensional code server contained in the two-dimensional code, wherein the service request comprises the user identity corresponding to the scanned collection code and is used for the tamper-proof two-dimensional code server to perform security verification. The service request also comprises a user identification picture in the payment code.
In step S32, the tamper-resistant two-dimensional code server receives a service request of a cash register sent by the client, and searches for a corresponding user identifier picture for security verification based on a user identifier corresponding to the cash register included in the service request; and carrying out similarity judgment on the user identification picture in the payment receiving code included in the service request and the searched user identification picture for safety verification. And the searched user identification picture for safety verification is stored in a database of the server after the server verifies the user identification picture sent by the payee.
Preferably, the steps further comprise: the tamper-proof two-dimensional code server firstly determines whether a corresponding user is a registered user of the tamper-proof two-dimensional code payment system or not according to a user identity corresponding to a money receiving code included in the service request, and if so, a user identification picture in the money receiving code included in the service request is compared with a found user identification picture for safety verification in similarity; if not, sending risk prompt information to the payer to prompt the payer to terminate payment, for example, "the current payee code is not registered in the tamper-proof two-dimensional code payment system".
In step S33, if the similarity between the payee user identifier picture in the payment receiving code included in the service request and the found user identifier picture is higher than the preset threshold, continuing to pay; the tamper-resistant two-dimensional code server constructs a corresponding payment request, forwards the payment request to a payment server, and processes the payment request by the payment server.
Preferably, the service request sent by the client includes identification information of corresponding payment software, the tamper-resistant two-dimensional code server constructs a corresponding payment request according to the identification information, and forwards the payment request to a payment server corresponding to the payment software, and step S35 is executed.
In step S34, if the value is lower than the preset threshold, the tamper-resistant two-dimensional code server terminates the payment and sends a prompt message to the payer.
In step S35, the payment server receives the payment request, and guides the payer to complete payment, performs settlement, and notifies the payee that the payment is completed.
Different from the user head portrait information in other existing payment codes, in this embodiment, through the auditing of the user identification picture and the binding with the user identity, the user identification picture stored in the server database and the user identification picture in the payment code can be automatically compared and verified, so that the security of code scanning payment is improved.
Fig. 4 is a schematic flow chart of a code scanning verification method according to a second embodiment of the present application, and as shown in fig. 4, when a payer pays to a payee, the flow chart shown in fig. 4 may be executed:
in step S41, the client sends a service request of a cash register code to the tamper-resistant two-dimensional code server;
the client can be a payment software client such as a WeChat client, a Payment treasure client, a pay-through wallet client and the like, and can also comprise other clients which are acknowledged or authorized by a corresponding anti-tampering two-dimensional code sending mechanism and can realize the technical scheme of the application.
The money receiving code is a two-dimensional code generated by the anti-tampering two-dimensional code server according to the user identity of the payee; and combining the generated two-dimensional code with the payee user identification picture to obtain the two-dimensional code.
When the payer wants to pay after shopping, the payer can open the client on the mobile phone, shoot the payee code provided by the payee and send a service request to the tamper-proof two-dimensional code server. And the service request requests the anti-tampering two-dimensional code server to carry out validity verification on the collection code. Or for the payment request of the cash register code, firstly, the validity of the cash register code is verified by the anti-tampering two-dimensional code server, and the two-dimensional code is paid after the verification is passed.
Preferably, an entrance of the tamper-resistant two-dimensional code server is preset in the client, after the entrance is opened, a camera of the mobile phone is called, a collection code provided by a collection party is shot, a service request is sent to the tamper-resistant two-dimensional code server, the service request comprises a user identification picture in the collection code, the collection code in the collection code is identified by the tamper-resistant two-dimensional code server, and safety verification is performed.
In step S42, the tamper-resistant two-dimensional code server receives a service request from a client that sends a cash register code, decodes a user identification picture in the cash register code included in the service request, and obtains a user identification corresponding to the cash register code; searching a corresponding user identification picture for security verification based on a user identification corresponding to a money receiving code included in the service request; and carrying out similarity judgment on the user identification picture in the payment receiving code included in the service request and the searched user identification picture for safety verification. And the searched user identification picture for safety verification is stored in a database of the server after the server verifies the user identification picture sent by the payee.
Preferably, the steps further comprise: the tamper-proof two-dimensional code server firstly determines whether a corresponding user is a registered user of the tamper-proof two-dimensional code payment system or not according to a user identity corresponding to a money receiving code included in the service request, and if so, a user identification picture in the money receiving code included in the service request is compared with a found user identification picture for safety verification in similarity; if not, sending risk prompt information to the payer to prompt the payer to terminate payment, for example, "the current payee code is not registered in the tamper-proof two-dimensional code payment system".
In step S43, if the similarity between the payee user identifier picture in the payment receiving code included in the service request and the found user identifier picture is higher than the preset threshold, continuing to pay; the tamper-resistant two-dimensional code server constructs a corresponding payment request, forwards the payment request to a payment server, and processes the payment request by the payment server.
Preferably, the service request sent by the client includes identification information of corresponding payment software, the tamper-resistant two-dimensional code server constructs a corresponding payment request according to the identification information, and forwards the payment request to a payment server corresponding to the payment software, and step S45 is executed.
In step S44, if the value is lower than the preset threshold, the tamper-resistant two-dimensional code server terminates the payment and sends a prompt message to the payer.
In step S45, the payment server receives the payment request, and guides the payer to complete payment, performs settlement, and notifies the payee that the payment is completed.
Different from the user head portrait information in other existing payment codes, in this embodiment, through the auditing of the user identification picture and the binding with the user identity, the user identification picture stored in the server database and the user identification picture in the payment code can be automatically compared and verified, so that the security of code scanning payment is improved.
Fig. 5 illustrates a block diagram of an exemplary computer system/server 012 suitable for use in implementing embodiments of the invention. The computer system/server 012 shown in fig. 5 is only an example, and should not bring any limitation to the function and the scope of use of the embodiment of the present invention.
As shown in fig. 5, the computer system/server 012 is embodied as a general purpose computing device. The components of computer system/server 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, and a bus 018 that couples various system components including the system memory 028 and the processing unit 016.
Bus 018 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system/server 012 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 012 and includes both volatile and nonvolatile media, removable and non-removable media.
System memory 028 can include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)030 and/or cache memory 032. The computer system/server 012 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 034 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be connected to bus 018 via one or more data media interfaces. Memory 028 can include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the present invention.
Program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof might include an implementation of a network environment. Program modules 042 generally perform the functions and/or methodologies of embodiments of the present invention as described herein.
The computer system/server 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), hi the present invention, the computer system/server 012 communicates with an external radar device, and may also communicate with one or more devices that enable a user to interact with the computer system/server 012, and/or with any device (e.g., network card, modem, etc.) that enables the computer system/server 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/server 012 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 020. As shown in fig. 5, the network adapter 020 communicates with the other modules of the computer system/server 012 via bus 018. It should be appreciated that although not shown in fig. 5, other hardware and/or software modules may be used in conjunction with the computer system/server 012, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 016 executes the programs stored in the system memory 028, thereby performing the functions and/or methods of the described embodiments of the present invention.
The computer program described above may be provided in a computer storage medium encoded with a computer program that, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations shown in the above-described embodiments of the invention.
With the development of time and technology, the meaning of media is more and more extensive, and the propagation path of computer programs is not limited to tangible media any more, and can also be downloaded from a network directly and the like. Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (23)

1. A method for generating a cash register code at a tamper-proof two-dimensional code server side is characterized by comprising the following steps:
receiving a receiving code generation request sent by a client, wherein the receiving code generation request comprises a user identity of a user corresponding to the client;
generating a two-dimensional code according to the user identity;
and combining the generated two-dimensional code with a user identification picture of the corresponding user submitted by the client to obtain a cash register code, so that code scanning safety verification is performed based on the cash register code.
2. The method of claim 1, further comprising:
acquiring a registration request of a corresponding user sent by a client;
and distributing user identity identification for the user corresponding to the client based on the registration request.
3. The method according to claim 2, wherein after the allocating the user identity to the user corresponding to the client further comprises:
acquiring a user identification picture of a corresponding user submitted by a client;
and associating the user identification picture with the user identity.
4. The method of claim 3, wherein associating the user identification picture with the user identity comprises:
and auditing the user identification picture, and associating the user identification picture which passes the auditing with the user identity.
5. The method of claim 2,
after the user identity is distributed to the user corresponding to the client, the method further comprises the following steps:
acquiring user qualification certification information of a corresponding user, which is submitted by a client;
and auditing the qualification certification information of the user, and matching the qualification certification information which passes the auditing with the user identity, wherein the only effective user identity is matched with the qualification certification information.
6. The method of claim 1,
the two-dimensional code comprises a user identity of a user corresponding to the client; and a link address pointing to the tamper-resistant two-dimensional code server.
7. The method of claim 1, wherein combining the generated two-dimensional code with a user identification picture comprises:
combining the user identification picture as a background picture of the two-dimensional code with the two-dimensional code; or,
and displaying the user identification picture in a peripheral area of the two-dimensional code.
8. The method of claim 1, further comprising:
and sending the generated cash register code to the client so that the payer can carry out code scanning payment.
9. A code scanning safety verification method is characterized by comprising the following steps:
the tamper-proof two-dimensional code server receives a service request of a collection code sent by a client; the payment receiving code is a two-dimensional code generated by a tamper-proof two-dimensional code server according to a user identity of a payee; the generated two-dimensional code is combined with a payee user identification picture to obtain the two-dimensional code;
the tamper-proof two-dimensional code server searches a corresponding user identification picture for security verification based on the user identification corresponding to the money receiving code included in the service request;
and the anti-tampering two-dimensional code server sends the corresponding user identification picture for security verification to the client so as to determine a security verification result at the client based on the user identification picture for security verification.
10. The method according to claim 9, wherein before searching for the corresponding user identification picture for security check based on the user identification corresponding to the payment receipt code included in the service request, the method further comprises:
determining whether the corresponding user is a registered user of the tamper-resistant two-dimensional code payment system or not according to the user identity corresponding to the payment receiving code included in the service request, and if so, searching a corresponding user identity picture for security verification based on the user identity corresponding to the payment receiving code included in the service request; and if not, sending prompt information to the client.
11. The method of claim 9, further comprising:
and the tamper-resistant two-dimensional code server executes corresponding operation according to the safety verification result.
12. The method according to claim 11, wherein the tamper-resistant two-dimensional code server executing corresponding operations according to the security verification result comprises:
receiving a confirmation command with a consistent comparison result sent by the client, and continuing to pay; or,
a confirmation command with a consistent comparison result sent by the client is not received, and the payment is terminated; or
And receiving a confirmation command which is sent by the client and has inconsistent comparison results, and terminating payment.
13. The method of claim 12, wherein the continuing the payment comprises:
constructing and processing a corresponding payment request; or,
and constructing a corresponding payment request, forwarding the payment request to a payment server, and processing the payment request by the payment server.
14. The method of claim 12, wherein the receiving of the acknowledgement command sent by the unreceived client that matches the comparison result comprises:
and receiving no confirmation command with consistent comparison results sent by the client within preset time.
15. A code scanning safety verification method is characterized in that:
the tamper-proof two-dimensional code server receives a service request of a collection code sent by a client; the payment receiving code is a two-dimensional code generated by a tamper-proof two-dimensional code server according to a user identity of a payee; the generated two-dimensional code is combined with a payee user identification picture to obtain the two-dimensional code;
the tamper-proof two-dimensional code server searches a corresponding user identification picture for security verification based on the user identification corresponding to the money receiving code included in the service request;
and the tamper-proof two-dimensional code server compares the similarity of the payee user identification picture in the payee code included in the service request with the searched user identification picture for safety verification to determine a safety verification result.
16. The method of claim 15, wherein before the searching for the corresponding user identification picture for security check based on the user identification included in the service request, the method further comprises:
the tamper-proof two-dimensional code server determines whether a corresponding user is a registered user of the tamper-proof two-dimensional code payment system or not according to the user identity corresponding to the payment receiving code included in the service request, and if so, searches a corresponding user identity picture for security verification based on the user identity corresponding to the payment receiving code included in the service request; and if not, sending prompt information to the client.
17. The method of claim 15, further comprising:
and the tamper-resistant two-dimensional code server executes corresponding operation according to the safety verification result.
18. The method of claim 17, wherein performing the corresponding operation according to the security check result comprises:
if the similarity between the payee user identification picture in the payment receiving code included in the service request and the searched user identification picture is higher than a preset threshold value, continuing to pay; and if the payment is lower than the preset threshold, the payment is terminated.
19. The method of claim 15, wherein the service request includes the collection code and a user id obtained by scanning the collection code by the client.
20. The method of claim 15, wherein the service request includes the debit code;
before the security verification is performed based on the user identity corresponding to the payment receiving code included in the service request, the method further includes: and determining the user identity corresponding to the collection code by analyzing the collection code.
21. The method of claim 18, wherein said continuing payment comprises:
constructing and processing a corresponding payment request; or,
and constructing a corresponding payment request, forwarding the payment request to a payment server, and processing the payment request by the payment server.
22. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-21.
23. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-21.
CN201810596992.7A 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code Pending CN108898206A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810596992.7A CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code
PCT/CN2018/124947 WO2019237718A1 (en) 2018-06-11 2018-12-28 Method for generating payment receiving code and code-scanning security verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810596992.7A CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code

Publications (1)

Publication Number Publication Date
CN108898206A true CN108898206A (en) 2018-11-27

Family

ID=64344409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810596992.7A Pending CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code

Country Status (2)

Country Link
CN (1) CN108898206A (en)
WO (1) WO2019237718A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583894A (en) * 2018-11-28 2019-04-05 阿里巴巴集团控股有限公司 Offer, verification method and the device of two dimensional code
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
CN110020699A (en) * 2018-12-11 2019-07-16 阿里巴巴集团控股有限公司 A kind of figure code check method and device
CN110197370A (en) * 2019-04-23 2019-09-03 努比亚技术有限公司 Two dimensional code generation, method of payment, terminal device and storage medium
WO2019237718A1 (en) * 2018-06-11 2019-12-19 上海掌门科技有限公司 Method for generating payment receiving code and code-scanning security verification method
CN110633979A (en) * 2019-08-30 2019-12-31 维沃移动通信有限公司 Payment method and terminal equipment
CN110851270A (en) * 2019-10-21 2020-02-28 中国银联股份有限公司 Resource transfer method, device, equipment and medium
CN110969434A (en) * 2019-11-29 2020-04-07 维沃移动通信有限公司 Payment method, server, terminal and system
CN110969428A (en) * 2019-10-30 2020-04-07 深圳市钱海网络技术有限公司 Static two-dimensional code payment method and device based on mobile terminal
CN111080284A (en) * 2019-12-17 2020-04-28 北京东方国信科技股份有限公司 Mobile payment code scanning payment method based on bidirectional verification and customer payment terminal
CN112819460A (en) * 2020-10-29 2021-05-18 中国银联股份有限公司 Two-dimensional code checking method and device and computer readable medium
CN113128983A (en) * 2021-03-18 2021-07-16 西安艾润物联网技术服务有限责任公司 Method for paying digital currency, electronic device and computer storage medium
CN113570362A (en) * 2021-07-30 2021-10-29 北京达佳互联信息技术有限公司 Two-dimensional code checking method and device
CN113869847A (en) * 2021-09-03 2021-12-31 中国银行股份有限公司 Stall management method and device
CN113920661A (en) * 2021-07-06 2022-01-11 福建创识科技股份有限公司 Activation device and activation method for digital currency label code plate

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243539A (en) * 2015-09-15 2016-01-13 重庆智韬信息技术中心 Identity authentication method for realizing two-dimensional code safety payment
CN107507007A (en) * 2017-08-30 2017-12-22 努比亚技术有限公司 One kind pays 2 D code verification method, terminal and computer-readable recording medium
CN107609873A (en) * 2017-09-08 2018-01-19 阿里巴巴集团控股有限公司 A kind of barcode scanning safe checking method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9311584B2 (en) * 2013-05-24 2016-04-12 King Abdulaziz City for Science and Technology (KACST) Multidimensional color barcode
CN103646264B (en) * 2013-11-06 2016-07-06 杭州电子科技大学 A kind of dimension code anti-counterfeit method of multiple information encryption
CN105069497B (en) * 2015-07-27 2018-01-23 南京风力舰信息技术有限公司 A kind of method for the Quick Response Code for generating beautification
CN106919848A (en) * 2017-03-07 2017-07-04 江苏科大汇峰科技有限公司 A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition
CN108898206A (en) * 2018-06-11 2018-11-27 上海掌门科技有限公司 A kind of method and barcode scanning safe checking method generating gathering code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243539A (en) * 2015-09-15 2016-01-13 重庆智韬信息技术中心 Identity authentication method for realizing two-dimensional code safety payment
CN107507007A (en) * 2017-08-30 2017-12-22 努比亚技术有限公司 One kind pays 2 D code verification method, terminal and computer-readable recording medium
CN107609873A (en) * 2017-09-08 2018-01-19 阿里巴巴集团控股有限公司 A kind of barcode scanning safe checking method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019237718A1 (en) * 2018-06-11 2019-12-19 上海掌门科技有限公司 Method for generating payment receiving code and code-scanning security verification method
CN109583894A (en) * 2018-11-28 2019-04-05 阿里巴巴集团控股有限公司 Offer, verification method and the device of two dimensional code
TWI776084B (en) * 2018-11-28 2022-09-01 開曼群島商創新先進技術有限公司 Two-dimensional code provision, verification method and device
CN110020699A (en) * 2018-12-11 2019-07-16 阿里巴巴集团控股有限公司 A kind of figure code check method and device
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
CN110197370A (en) * 2019-04-23 2019-09-03 努比亚技术有限公司 Two dimensional code generation, method of payment, terminal device and storage medium
CN110633979A (en) * 2019-08-30 2019-12-31 维沃移动通信有限公司 Payment method and terminal equipment
CN110851270A (en) * 2019-10-21 2020-02-28 中国银联股份有限公司 Resource transfer method, device, equipment and medium
CN110969428A (en) * 2019-10-30 2020-04-07 深圳市钱海网络技术有限公司 Static two-dimensional code payment method and device based on mobile terminal
CN110969434A (en) * 2019-11-29 2020-04-07 维沃移动通信有限公司 Payment method, server, terminal and system
CN111080284A (en) * 2019-12-17 2020-04-28 北京东方国信科技股份有限公司 Mobile payment code scanning payment method based on bidirectional verification and customer payment terminal
CN111080284B (en) * 2019-12-17 2024-04-16 北京东方国信科技股份有限公司 Mobile payment code scanning payment method and customer payment terminal based on two-way verification
CN112819460A (en) * 2020-10-29 2021-05-18 中国银联股份有限公司 Two-dimensional code checking method and device and computer readable medium
CN113128983A (en) * 2021-03-18 2021-07-16 西安艾润物联网技术服务有限责任公司 Method for paying digital currency, electronic device and computer storage medium
CN113920661A (en) * 2021-07-06 2022-01-11 福建创识科技股份有限公司 Activation device and activation method for digital currency label code plate
CN113570362A (en) * 2021-07-30 2021-10-29 北京达佳互联信息技术有限公司 Two-dimensional code checking method and device
CN113869847A (en) * 2021-09-03 2021-12-31 中国银行股份有限公司 Stall management method and device

Also Published As

Publication number Publication date
WO2019237718A1 (en) 2019-12-19

Similar Documents

Publication Publication Date Title
CN108898206A (en) A kind of method and barcode scanning safe checking method generating gathering code
US20240221071A1 (en) Image-based financial processing
CN106688004B (en) Transaction authentication method and device, mobile terminal, POS terminal and server
US7802720B2 (en) Method and system for performing a card-present transaction using image capture on a portable device
US20160019528A1 (en) System and method for payment and settlement using barcode
CN107408170B (en) Authentication-activated augmented reality display device
US9965760B2 (en) Systems and methods for facilitating electronic transactions utilizing a mobile computing device
US10846667B1 (en) System and method for mobile check deposit with restricted endorsement
US10579996B2 (en) Presenting a document to a remote user to obtain authorization from the user
US20170061372A1 (en) Verification and payment for package delivery
CN104966199A (en) Data processing method, client and payment platform
CN108763898A (en) A kind of information processing method and system
US10580000B2 (en) Obtaining user input from a remote user to authorize a transaction
CN109767193A (en) Method of insuring, equipment and the readable storage medium storing program for executing of attachment of property in litigation liability insurance
US8905304B1 (en) System and method for processing certified or registered mail
KR102677842B1 (en) Advanced methods, systems and devices for registering information within a database
US20160335630A1 (en) Method for Providing Secured Card Transactions During Card Not Present (CNP) Transactions
CN107993155A (en) Policy information processing method, device, server and storage medium
US11907801B2 (en) System for encoding resource access credential in barcode
US20060187698A1 (en) System and method for dynamic checking
US20160335621A1 (en) Method for Providing Secured Card Transactions During Card Not Present (CNP) Transactions
KR20190110486A (en) Apparatus and method of providing non-card present payment
EP3039626B1 (en) Presenting a document to a remote user to obtain authorization from the user
KR100908405B1 (en) Form image quality inspection method and system and recording medium therefor
US20240289908A1 (en) System and method for identification document verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination