CN108960385A - Two dimensional code generation and verification method and system based on the encryption of multiple code key - Google Patents

Two dimensional code generation and verification method and system based on the encryption of multiple code key Download PDF

Info

Publication number
CN108960385A
CN108960385A CN201810699984.5A CN201810699984A CN108960385A CN 108960385 A CN108960385 A CN 108960385A CN 201810699984 A CN201810699984 A CN 201810699984A CN 108960385 A CN108960385 A CN 108960385A
Authority
CN
China
Prior art keywords
dimensional code
equipment end
code
user terminal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810699984.5A
Other languages
Chinese (zh)
Inventor
李鸿钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Cool Bean Material Technology Co Ltd
Original Assignee
Suzhou Cool Bean Material Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Cool Bean Material Technology Co Ltd filed Critical Suzhou Cool Bean Material Technology Co Ltd
Priority to CN201810699984.5A priority Critical patent/CN108960385A/en
Publication of CN108960385A publication Critical patent/CN108960385A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The present invention provides a kind of two dimensional code based on the encryption of multiple code key and generates and verification method and system, it the described method comprises the following steps: step S1, user terminal generates two dimensional code and is sent to equipment end and verified, and includes the encryption information based on the encryption of multiple code key in the two dimensional code;Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted and are verified.Advantages of the present invention: (1) because in two dimensional code including the encryption information based on the encryption of multiple code key, equipment end is based on multiple code key whole successful decryption, just determines that the two dimensional code is effective when being verified.In this way, improving safety.(2) two dimensional code of the invention based on timing encryption generates and verification method and system, no matter user terminal and/or equipment end it is online or offline, can normal authentication, independent of the stability of network, convenience is higher.

Description

Two dimensional code generation and verification method and system based on the encryption of multiple code key
Technical field
The present invention relates to enciphering authentications, in particular to the two dimensional code based on the encryption of multiple code key generates and verification method And system.
Background technique
With the continuous development of Internet technology, the application network security that is also more more and more universal, but being encountered of two dimensional code Also the number of plies is not poor for problem, terminal connection network authentication also due to the problem of network can not handle in real time.Encrypted form method Refining, succinct unambiguity, the reliable and accurate approach gradually encrypted as analysis, but since that does not unify adds Close protocol verification system, cryptographic protocol may be faced with attacker, and the cryptographic protocol method of code key logic starts to agreement at this time The characteristics such as behavior, invader's behavior, demand for security take in utilization.It is complicated for ordinary QR code generation scheme The real-time for spending height and communication is lower, and operability is not high, and when data information amount increases, system information treating capacity can increase, Processing is more complicated, and permission processing can not be distinguished to two dimensional code.In the two dimensional code for generally requiring dynamic processing generally all It needs to carry out networking and carries out authentication, in the case where offline, then can not carry out authentication, reduce the true of two dimensional code Implementation is used.
Summary of the invention
In view of current enciphering authentication above shortcomings, the purpose of the present invention is to provide it is a kind of it is safe based on The two dimensional code generation of multiple code key encryption and verification method and system.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
A kind of two dimensional code generation and verification method based on the encryption of multiple code key, comprising the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
Further,
Wherein the step S1 includes:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair;
Wherein the step S2 includes:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Further, wherein the quantity of at least one code key is 1-3.
Further, further comprising the steps of:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently It gives user terminal and equipment end saves.
Further, the user terminal and/or server end are updated at least one described code key.
Further,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Further, wherein the encryption information based on timing encryption includes the generation time of two dimensional code and having for two dimensional code Imitate the time, the equipment end encryption information for including in the two dimensional code is decrypted and verifying include to the two dimensional code into Row decoding obtains the effective time of the generation time and two dimensional code of two dimensional code wherein included, judges the system time of equipment end Whether the difference for subtracting the generation time of two dimensional code is less than the effective time of two dimensional code.
Further, wherein the equipment end is decrypted and verifies to the encryption information for including in the two dimensional code also wraps It includes, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is greater than zero.
Further, wherein the effective time of the two dimensional code is 5 seconds.
Further, wherein the two dimensional code after user terminal generates before sending, continuous updating.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information Carry out the verifying of user right.
Further, wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Further, wherein the user right is arranged by server end, it is sent to equipment end preservation.
A kind of two dimensional code generation and verifying system based on the encryption of multiple code key, comprising:
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code The encryption information of one code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
Further, comprising:
The user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described extremely The quantity of a few segmentation is identical as the quantity of at least one code key;Using at least one described at least one described secret key pair A segmentation is encrypted respectively;
The equipment end to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;It is described extremely Few whole successful decryptions of a segmentation then determine that the two dimensional code is effective.
Further, wherein the quantity of at least one code key is 1-3.
Further, further includes:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and It is sent to user terminal and equipment end saves.
Further, the user terminal and/or server end are updated at least one described code key.
Further,
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Further, wherein the encryption information based on timing encryption includes the generation time of two dimensional code and having for two dimensional code Imitate the time, the equipment end encryption information for including in the two dimensional code is decrypted and verifying include to the two dimensional code into Row decoding obtains the effective time of the generation time and two dimensional code of two dimensional code wherein included, judges the system time of equipment end Whether the difference for subtracting the generation time of two dimensional code is less than the effective time of two dimensional code.
Further, wherein the equipment end is decrypted and verifies to the encryption information for including in the two dimensional code also wraps It includes, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is greater than zero.
Further, wherein the effective time of the two dimensional code is 5 seconds.
Further, wherein the two dimensional code after user terminal generates before sending, continuous updating.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information Carry out the verifying of user right.
Further, wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Further, wherein the user right is arranged by server end, it is sent to equipment end preservation.
Advantages of the present invention: (1) because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end exists When being verified, it is based on multiple code key whole successful decryption, just determines that the two dimensional code is effective, which is legitimate user, is tested Card passes through, and otherwise then not thinks to be legitimate user, and verifying not passes through.And if someone's interception, to usurp this two dimensional code subsequent again It goes using so that its difficulty illegally verified greatly improves, and can not being often verified because of the setting of multiple code key.Such as This, improves safety.(2) the two dimensional code generation and verification method and system of the invention based on the encryption of multiple code key, no matter User terminal and/or equipment end are online or offline, energy normal authentication, and independent of the stability of network, convenience is higher.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of embodiment of two dimensional code generation and verification method encrypted based on multiple code key of the present invention Method flow diagram.
Fig. 2 is that a kind of two dimensional code based on the encryption of multiple code key of the present invention generates and verify the embodiment of system Structural block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Fig. 1, a kind of two dimensional code generation and verification method based on the encryption of multiple code key, comprising the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
Wherein, the step S1 is specifically included:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair.
Wherein, the step S2 is specifically included:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end is based on when being verified Multiple code key whole successful decryption just determines that the two dimensional code is effective, which is legitimate user, is verified, otherwise then recognizes Not to be legitimate user, verifying not passes through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because multiple The setting of code key so that its difficulty illegally verified greatly improves, and can not be often verified.In this way, improving safety. Increase the application field of two dimensional code.
Wherein, the quantity of at least one code key is generally 1-3, and then safety reduces very little, can also make to add too much Close verifying is excessively complicated, increases the duration of encrypted authentication, reduces timeliness.Certainly, the quantity of multiple code key can be according to safety The length of grade and encryption information is adjusted, and can generally be increased with the raising of security level or the length of encryption information And increase.In the present embodiment, the quantity of at least one code key is 3.
Further, the method also includes following steps:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently It gives user terminal and equipment end saves.
Wherein, user terminal and server end, when thinking in need (such as original code key leakage or do not use and When needing to nullify calcellation), at least one described code key can be updated.In this way, further increasing safety.In user When code key update is initiated at end, initiates to request by user terminal, be updated by server end, be then sent to user terminal and equipment end It saves.When server end initiates code key update, directly it is updated by server end, is then sent to user terminal and equipment end It saves.
Further,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
In this way, no matter user terminal and/or equipment end are online or offline, can normal authentication, the stabilization independent of network Property, convenience is higher.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Wherein the encryption information based on timing encryption includes the effective time of the generation time and two dimensional code of two dimensional code, The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code, The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension Whether the difference of the generation time of code is less than the effective time of two dimensional code.
It include generation time and the two dimension of two dimensional code because including the encryption information based on timing encryption in two dimensional code The effective time of code, equipment end, according to the system time of itself, subtract the generation time of two dimensional code, difference when being verified If it is less than the effective time of two dimensional code, then it represents that the user is legitimate user, is verified, otherwise then not thinks being legal use Family, verifying not pass through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because being more than having for two dimensional code The time is imitated, and can not be verified.In this way, improving safety.Wherein, the effective time of two dimensional code is generally shorter, shorter peace Full property is higher.In the present embodiment, the effective time of the two dimensional code is 5 seconds.
The encryption information for including in the two dimensional code is decrypted the equipment end and verifying further includes, and judges equipment end The difference of system time generation time for subtracting two dimensional code whether be greater than zero.Because the generation time of two dimensional code is derived from user The system time at end, if the system time of someone's malicious modification user terminal, the two dimensional code that the time generates later of pre-production one, Then it reuses this two dimensional code later to go to be verified, then the system time for being often able to satisfy equipment end subtracts the generation of two dimensional code The difference of time is less than the effective time of two dimensional code.So while when judging that the system time of equipment end subtracts the generation of two dimensional code Between difference whether be greater than zero, to prevent such illegal verifying situation, further improve safety.
Before the two dimensional code is sent after user terminal generation, continuous updating.Not used two dimensional code then cancels.In this way, mentioning The high difficulty of the two dimensional code of malice interception legitimate user, further improves safety.In the present embodiment, the update frequency Rate is 1 second.
Further, the two dimensional code also includes user information, and the equipment end further includes carrying out to the user information The verifying of user right.
Wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Wherein the user right is arranged by server end, is sent to equipment end preservation.
In this way, further improving flexible convenience, and improve safety.
As shown in Fig. 2, present invention further teaches a kind of two dimensional codes based on the encryption of multiple code key to generate and verify system, Include:
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based on multiple in the two dimensional code The encryption information of code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
Wherein, it specifically, the user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least The quantity of one segmentation, at least one segmentation is identical as the quantity of at least one code key;Using it is described at least one At least one segmentation described in secret key pair is encrypted respectively;The equipment end to it is described at least one be respectively adopted it is described extremely A few code key is decrypted and verifies;The whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end is based on when being verified Multiple code key whole successful decryption just determines that the two dimensional code is effective, which is legitimate user, is verified, otherwise then recognizes Not to be legitimate user, verifying not passes through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because multiple The setting of code key so that its difficulty illegally verified greatly improves, and can not be often verified.In this way, improving safety. Increase the application field of two dimensional code.
Wherein, the quantity of at least one code key is generally 1-3, and then safety reduces very little, can also make to add too much Close verifying is excessively complicated, increases the duration of encrypted authentication, reduces timeliness.Certainly, the quantity of multiple code key can be according to safety The length of grade and encryption information is adjusted, and can generally be increased with the raising of security level or the length of encryption information And increase.In the present embodiment, the quantity of at least one code key is 3.
Further, the system also includes:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and It is sent to user terminal and equipment end saves.
Wherein, user terminal and server end, when thinking in need (such as original code key leakage or do not use and When needing to nullify calcellation), at least one described code key can be updated.In this way, further increasing safety.In user When code key update is initiated at end, initiates to request by user terminal, be updated by server end, be then sent to user terminal and equipment end It saves.When server end initiates code key update, directly it is updated by server end, is then sent to user terminal and equipment end It saves.
Further,
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
In this way, no matter user terminal and/or equipment end are online or offline, can normal authentication, the stabilization independent of network Property, convenience is higher.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Wherein the encryption information based on timing encryption includes the effective time of the generation time and two dimensional code of two dimensional code, The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code, The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension Whether the difference of the generation time of code is less than the effective time of two dimensional code.
It include generation time and the two dimension of two dimensional code because including the encryption information based on timing encryption in two dimensional code The effective time of code, equipment end, according to the system time of itself, subtract the generation time of two dimensional code, difference when being verified If it is less than the effective time of two dimensional code, then it represents that the user is legitimate user, is verified, otherwise then not thinks being legal use Family, verifying not pass through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because being more than having for two dimensional code The time is imitated, and can not be verified.In this way, improving safety.Wherein, the effective time of two dimensional code is generally shorter, shorter peace Full property is higher.In the present embodiment, the effective time of the two dimensional code is 5 seconds.
The encryption information for including in the two dimensional code is decrypted the equipment end and verifying further includes, and judges equipment end The difference of system time generation time for subtracting two dimensional code whether be greater than zero.Because the generation time of two dimensional code is derived from user The system time at end, if the system time of someone's malicious modification user terminal, the two dimensional code that the time generates later of pre-production one, Then it reuses this two dimensional code later to go to be verified, then the system time for being often able to satisfy equipment end subtracts the generation of two dimensional code The difference of time is less than the effective time of two dimensional code.So while when judging that the system time of equipment end subtracts the generation of two dimensional code Between difference whether be greater than zero, to prevent such illegal verifying situation, further improve safety.
Before the two dimensional code is sent after user terminal generation, continuous updating.Not used two dimensional code then cancels.In this way, mentioning The high difficulty of the two dimensional code of malice interception legitimate user, further improves safety.In the present embodiment, the update frequency Rate is 1 second.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information Carry out the verifying of user right.
Wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Wherein the user right is arranged by server end, is sent to equipment end preservation.
In this way, further improving flexible convenience, and improve safety.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those skilled in the art is in technical scope disclosed by the invention, and any changes or substitutions that can be easily thought of, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claims It is quasi-.

Claims (19)

1. a kind of two dimensional code based on the encryption of multiple code key generates and verification method, which comprises the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
2. the method according to claim 1, wherein
Wherein the step S1 includes:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair;
Wherein the step S2 includes:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
3. the method according to claim 1, wherein wherein the quantity of at least one code key is 1-3.
4. the method according to claim 1, wherein further comprising the steps of:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently It gives user terminal and equipment end saves.
5. according to the method described in claim 4, it is characterized in that, the user terminal and/or server end, to described at least one A code key is updated.
6. according to the method described in claim 4, it is characterized in that,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
7. the method according to claim 1, wherein wherein also including to be encrypted based on timing in the two dimensional code Encryption information, it is described based on timing encryption encryption information include two dimensional code generation time and two dimensional code effective time, The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code, The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension Whether the difference of the generation time of code is less than the effective time of two dimensional code.
8. the method according to the description of claim 7 is characterized in that wherein the equipment end adds to include in the two dimensional code Confidential information is decrypted and verifying further includes, and judges whether the system time of equipment end subtracts the difference of the generation time of two dimensional code big In zero.
9. the method according to the description of claim 7 is characterized in that wherein the effective time of the two dimensional code is 5 seconds.
10. the method according to claim 1, wherein wherein the two dimensional code user terminal generation after send before, Continuous updating.
11. described the method according to claim 1, wherein wherein the two dimensional code also includes user information Equipment end further includes that the verifying of user right is carried out to the user information.
12. according to the method for claim 11, which is characterized in that wherein the user right includes user's P Passable The time of equipment and user's P Passable.
13. according to the method for claim 12, which is characterized in that wherein the user right is arranged by server end, hair Give equipment end preservation.
14. a kind of two dimensional code based on the encryption of multiple code key generates and verifying system characterized by comprising
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code The encryption information of one code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted And verifying.
15. system according to claim 14 characterized by comprising
The user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described extremely The quantity of a few segmentation is identical as the quantity of at least one code key;Using at least one described at least one described secret key pair A segmentation is encrypted respectively;
The equipment end to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;It is described extremely Few whole successful decryptions of a segmentation then determine that the two dimensional code is effective.
16. system according to claim 15, which is characterized in that further include:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and It is sent to user terminal and equipment end saves.
17. system according to claim 16, which is characterized in that
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests Card.
18. system according to claim 17, which is characterized in that wherein the encryption information based on timing encryption includes The effective time of the generation time and two dimensional code of two dimensional code, the equipment end carry out the encryption information for including in the two dimensional code Decryption and verifying include being decoded to the two dimensional code, obtain the generation time of two dimensional code wherein included and having for two dimensional code The time is imitated, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is less than effective time of two dimensional code.
19. system according to claim 18, which is characterized in that wherein the equipment end to including in the two dimensional code Encryption information is decrypted and verifying further includes, judge the system time of equipment end subtract the generation time of two dimensional code difference whether Greater than zero.
CN201810699984.5A 2018-06-29 2018-06-29 Two dimensional code generation and verification method and system based on the encryption of multiple code key Pending CN108960385A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810699984.5A CN108960385A (en) 2018-06-29 2018-06-29 Two dimensional code generation and verification method and system based on the encryption of multiple code key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810699984.5A CN108960385A (en) 2018-06-29 2018-06-29 Two dimensional code generation and verification method and system based on the encryption of multiple code key

Publications (1)

Publication Number Publication Date
CN108960385A true CN108960385A (en) 2018-12-07

Family

ID=64484676

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810699984.5A Pending CN108960385A (en) 2018-06-29 2018-06-29 Two dimensional code generation and verification method and system based on the encryption of multiple code key

Country Status (1)

Country Link
CN (1) CN108960385A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460807A (en) * 2019-01-11 2019-03-12 中煤航测遥感集团有限公司 Generation method, recognition methods, generating means and the identification device of two dimensional code
CN112716508A (en) * 2019-10-14 2021-04-30 上海西门子医疗器械有限公司 Verification method of handheld control device and medical imaging system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388076A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method and apparatus for generating two-dimension bar-code
CN102546174A (en) * 2011-12-20 2012-07-04 贾松仁 Two-dimensional code encryption/decryption method and anti-counterfeiting method
CN103218715A (en) * 2013-03-26 2013-07-24 苏州通付盾信息技术有限公司 Dynamic payment code implementation method in cloud payment system
CN104618334A (en) * 2014-12-29 2015-05-13 通邮(中国)科技有限公司 Method and system for generating and verifying dynamic two-dimensional code
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN105976005A (en) * 2016-04-26 2016-09-28 鸿博股份有限公司 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN105976004A (en) * 2016-04-25 2016-09-28 华南农业大学 Color two-dimensional code multi-dimensional information encoding and decoding methods and devices
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
US20170134167A1 (en) * 2014-06-10 2017-05-11 Unisys Corporation Systems and methods for qr code validation
CN106961430A (en) * 2017-03-16 2017-07-18 山东蓝海数据科技有限公司 A kind of physical isolation transmission method and physical isolation transmitting device based on Quick Response Code
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN107409042A (en) * 2015-03-03 2017-11-28 旺德海尔斯有限责任公司 The access control of encryption data in machine-readable identification symbol
CN107979458A (en) * 2016-10-25 2018-05-01 北京计算机技术及应用研究所 A kind of two-dimensional bar data ciphering method
CN108462699A (en) * 2018-02-09 2018-08-28 苏州酷豆物联科技有限公司 Based on the encrypted Quick Response Code generation of sequential and verification method and system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388076A (en) * 2007-09-12 2009-03-18 北京方维银通科技有限公司 Method and apparatus for generating two-dimension bar-code
CN102546174A (en) * 2011-12-20 2012-07-04 贾松仁 Two-dimensional code encryption/decryption method and anti-counterfeiting method
CN103218715A (en) * 2013-03-26 2013-07-24 苏州通付盾信息技术有限公司 Dynamic payment code implementation method in cloud payment system
US20170134167A1 (en) * 2014-06-10 2017-05-11 Unisys Corporation Systems and methods for qr code validation
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN104618334A (en) * 2014-12-29 2015-05-13 通邮(中国)科技有限公司 Method and system for generating and verifying dynamic two-dimensional code
CN107409042A (en) * 2015-03-03 2017-11-28 旺德海尔斯有限责任公司 The access control of encryption data in machine-readable identification symbol
CN105976004A (en) * 2016-04-25 2016-09-28 华南农业大学 Color two-dimensional code multi-dimensional information encoding and decoding methods and devices
CN105976005A (en) * 2016-04-26 2016-09-28 鸿博股份有限公司 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN107979458A (en) * 2016-10-25 2018-05-01 北京计算机技术及应用研究所 A kind of two-dimensional bar data ciphering method
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106961430A (en) * 2017-03-16 2017-07-18 山东蓝海数据科技有限公司 A kind of physical isolation transmission method and physical isolation transmitting device based on Quick Response Code
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN108462699A (en) * 2018-02-09 2018-08-28 苏州酷豆物联科技有限公司 Based on the encrypted Quick Response Code generation of sequential and verification method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460807A (en) * 2019-01-11 2019-03-12 中煤航测遥感集团有限公司 Generation method, recognition methods, generating means and the identification device of two dimensional code
CN112716508A (en) * 2019-10-14 2021-04-30 上海西门子医疗器械有限公司 Verification method of handheld control device and medical imaging system

Similar Documents

Publication Publication Date Title
EP2304636B1 (en) Mobile device assisted secure computer network communications
CN105337977B (en) A kind of the safety moving communication system and its implementation of dynamic bidirectional certification
CN108418691A (en) Dynamic network identity identifying method based on SGX
WO2018127081A1 (en) Method and system for obtaining encryption key
CN109309565A (en) A kind of method and device of safety certification
US20070067828A1 (en) Extended one-time password method and apparatus
KR101634158B1 (en) Method for authenticating identity and generating share key
CN105812367A (en) Authentication system and authentication method of network access device in quantum network
CN110189442A (en) Authentication method and device
US10263782B2 (en) Soft-token authentication system
CN106506168A (en) A kind of safe method based on biological characteristic long-distance identity-certifying
TW200402981A (en) Methods for remotely changing a communications password
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN109729523A (en) A kind of method and apparatus of terminal networking certification
CN111343634A (en) Safe connection method and data transmission method between low-power-consumption Bluetooth devices
CN106559408A (en) A kind of SDN authentication methods based on trust management
WO2018133675A1 (en) Key update method, device and system
CN104601602B (en) A kind of terminal device network security enhancing access and authentication method
CN110020524A (en) A kind of mutual authentication method based on smart card
CN109347887B (en) Identity authentication method and device
CN111224784B (en) Role separation distributed authentication and authorization method based on hardware trusted root
CN104486322B (en) Terminal access authentication authorization method and terminal access authentication authoring system
CN106656955A (en) Communication method and system and user terminal
CN108960385A (en) Two dimensional code generation and verification method and system based on the encryption of multiple code key
CN110572392A (en) Identity authentication method based on HyperLegger network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207