CN108960385A - Two dimensional code generation and verification method and system based on the encryption of multiple code key - Google Patents
Two dimensional code generation and verification method and system based on the encryption of multiple code key Download PDFInfo
- Publication number
- CN108960385A CN108960385A CN201810699984.5A CN201810699984A CN108960385A CN 108960385 A CN108960385 A CN 108960385A CN 201810699984 A CN201810699984 A CN 201810699984A CN 108960385 A CN108960385 A CN 108960385A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- equipment end
- code
- user terminal
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Abstract
The present invention provides a kind of two dimensional code based on the encryption of multiple code key and generates and verification method and system, it the described method comprises the following steps: step S1, user terminal generates two dimensional code and is sent to equipment end and verified, and includes the encryption information based on the encryption of multiple code key in the two dimensional code;Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted and are verified.Advantages of the present invention: (1) because in two dimensional code including the encryption information based on the encryption of multiple code key, equipment end is based on multiple code key whole successful decryption, just determines that the two dimensional code is effective when being verified.In this way, improving safety.(2) two dimensional code of the invention based on timing encryption generates and verification method and system, no matter user terminal and/or equipment end it is online or offline, can normal authentication, independent of the stability of network, convenience is higher.
Description
Technical field
The present invention relates to enciphering authentications, in particular to the two dimensional code based on the encryption of multiple code key generates and verification method
And system.
Background technique
With the continuous development of Internet technology, the application network security that is also more more and more universal, but being encountered of two dimensional code
Also the number of plies is not poor for problem, terminal connection network authentication also due to the problem of network can not handle in real time.Encrypted form method
Refining, succinct unambiguity, the reliable and accurate approach gradually encrypted as analysis, but since that does not unify adds
Close protocol verification system, cryptographic protocol may be faced with attacker, and the cryptographic protocol method of code key logic starts to agreement at this time
The characteristics such as behavior, invader's behavior, demand for security take in utilization.It is complicated for ordinary QR code generation scheme
The real-time for spending height and communication is lower, and operability is not high, and when data information amount increases, system information treating capacity can increase,
Processing is more complicated, and permission processing can not be distinguished to two dimensional code.In the two dimensional code for generally requiring dynamic processing generally all
It needs to carry out networking and carries out authentication, in the case where offline, then can not carry out authentication, reduce the true of two dimensional code
Implementation is used.
Summary of the invention
In view of current enciphering authentication above shortcomings, the purpose of the present invention is to provide it is a kind of it is safe based on
The two dimensional code generation of multiple code key encryption and verification method and system.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
A kind of two dimensional code generation and verification method based on the encryption of multiple code key, comprising the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code
The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
Further,
Wherein the step S1 includes:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least
The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair;
Wherein the step S2 includes:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Further, wherein the quantity of at least one code key is 1-3.
Further, further comprising the steps of:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently
It gives user terminal and equipment end saves.
Further, the user terminal and/or server end are updated at least one described code key.
Further,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Further, wherein the encryption information based on timing encryption includes the generation time of two dimensional code and having for two dimensional code
Imitate the time, the equipment end encryption information for including in the two dimensional code is decrypted and verifying include to the two dimensional code into
Row decoding obtains the effective time of the generation time and two dimensional code of two dimensional code wherein included, judges the system time of equipment end
Whether the difference for subtracting the generation time of two dimensional code is less than the effective time of two dimensional code.
Further, wherein the equipment end is decrypted and verifies to the encryption information for including in the two dimensional code also wraps
It includes, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is greater than zero.
Further, wherein the effective time of the two dimensional code is 5 seconds.
Further, wherein the two dimensional code after user terminal generates before sending, continuous updating.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information
Carry out the verifying of user right.
Further, wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Further, wherein the user right is arranged by server end, it is sent to equipment end preservation.
A kind of two dimensional code generation and verifying system based on the encryption of multiple code key, comprising:
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code
The encryption information of one code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
Further, comprising:
The user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described extremely
The quantity of a few segmentation is identical as the quantity of at least one code key;Using at least one described at least one described secret key pair
A segmentation is encrypted respectively;
The equipment end to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;It is described extremely
Few whole successful decryptions of a segmentation then determine that the two dimensional code is effective.
Further, wherein the quantity of at least one code key is 1-3.
Further, further includes:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and
It is sent to user terminal and equipment end saves.
Further, the user terminal and/or server end are updated at least one described code key.
Further,
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Further, wherein the encryption information based on timing encryption includes the generation time of two dimensional code and having for two dimensional code
Imitate the time, the equipment end encryption information for including in the two dimensional code is decrypted and verifying include to the two dimensional code into
Row decoding obtains the effective time of the generation time and two dimensional code of two dimensional code wherein included, judges the system time of equipment end
Whether the difference for subtracting the generation time of two dimensional code is less than the effective time of two dimensional code.
Further, wherein the equipment end is decrypted and verifies to the encryption information for including in the two dimensional code also wraps
It includes, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is greater than zero.
Further, wherein the effective time of the two dimensional code is 5 seconds.
Further, wherein the two dimensional code after user terminal generates before sending, continuous updating.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information
Carry out the verifying of user right.
Further, wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Further, wherein the user right is arranged by server end, it is sent to equipment end preservation.
Advantages of the present invention: (1) because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end exists
When being verified, it is based on multiple code key whole successful decryption, just determines that the two dimensional code is effective, which is legitimate user, is tested
Card passes through, and otherwise then not thinks to be legitimate user, and verifying not passes through.And if someone's interception, to usurp this two dimensional code subsequent again
It goes using so that its difficulty illegally verified greatly improves, and can not being often verified because of the setting of multiple code key.Such as
This, improves safety.(2) the two dimensional code generation and verification method and system of the invention based on the encryption of multiple code key, no matter
User terminal and/or equipment end are online or offline, energy normal authentication, and independent of the stability of network, convenience is higher.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of embodiment of two dimensional code generation and verification method encrypted based on multiple code key of the present invention
Method flow diagram.
Fig. 2 is that a kind of two dimensional code based on the encryption of multiple code key of the present invention generates and verify the embodiment of system
Structural block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Fig. 1, a kind of two dimensional code generation and verification method based on the encryption of multiple code key, comprising the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code
The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
Wherein, the step S1 is specifically included:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least
The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair.
Wherein, the step S2 is specifically included:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end is based on when being verified
Multiple code key whole successful decryption just determines that the two dimensional code is effective, which is legitimate user, is verified, otherwise then recognizes
Not to be legitimate user, verifying not passes through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because multiple
The setting of code key so that its difficulty illegally verified greatly improves, and can not be often verified.In this way, improving safety.
Increase the application field of two dimensional code.
Wherein, the quantity of at least one code key is generally 1-3, and then safety reduces very little, can also make to add too much
Close verifying is excessively complicated, increases the duration of encrypted authentication, reduces timeliness.Certainly, the quantity of multiple code key can be according to safety
The length of grade and encryption information is adjusted, and can generally be increased with the raising of security level or the length of encryption information
And increase.In the present embodiment, the quantity of at least one code key is 3.
Further, the method also includes following steps:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently
It gives user terminal and equipment end saves.
Wherein, user terminal and server end, when thinking in need (such as original code key leakage or do not use and
When needing to nullify calcellation), at least one described code key can be updated.In this way, further increasing safety.In user
When code key update is initiated at end, initiates to request by user terminal, be updated by server end, be then sent to user terminal and equipment end
It saves.When server end initiates code key update, directly it is updated by server end, is then sent to user terminal and equipment end
It saves.
Further,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
In this way, no matter user terminal and/or equipment end are online or offline, can normal authentication, the stabilization independent of network
Property, convenience is higher.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Wherein the encryption information based on timing encryption includes the effective time of the generation time and two dimensional code of two dimensional code,
The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code,
The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension
Whether the difference of the generation time of code is less than the effective time of two dimensional code.
It include generation time and the two dimension of two dimensional code because including the encryption information based on timing encryption in two dimensional code
The effective time of code, equipment end, according to the system time of itself, subtract the generation time of two dimensional code, difference when being verified
If it is less than the effective time of two dimensional code, then it represents that the user is legitimate user, is verified, otherwise then not thinks being legal use
Family, verifying not pass through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because being more than having for two dimensional code
The time is imitated, and can not be verified.In this way, improving safety.Wherein, the effective time of two dimensional code is generally shorter, shorter peace
Full property is higher.In the present embodiment, the effective time of the two dimensional code is 5 seconds.
The encryption information for including in the two dimensional code is decrypted the equipment end and verifying further includes, and judges equipment end
The difference of system time generation time for subtracting two dimensional code whether be greater than zero.Because the generation time of two dimensional code is derived from user
The system time at end, if the system time of someone's malicious modification user terminal, the two dimensional code that the time generates later of pre-production one,
Then it reuses this two dimensional code later to go to be verified, then the system time for being often able to satisfy equipment end subtracts the generation of two dimensional code
The difference of time is less than the effective time of two dimensional code.So while when judging that the system time of equipment end subtracts the generation of two dimensional code
Between difference whether be greater than zero, to prevent such illegal verifying situation, further improve safety.
Before the two dimensional code is sent after user terminal generation, continuous updating.Not used two dimensional code then cancels.In this way, mentioning
The high difficulty of the two dimensional code of malice interception legitimate user, further improves safety.In the present embodiment, the update frequency
Rate is 1 second.
Further, the two dimensional code also includes user information, and the equipment end further includes carrying out to the user information
The verifying of user right.
Wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Wherein the user right is arranged by server end, is sent to equipment end preservation.
In this way, further improving flexible convenience, and improve safety.
As shown in Fig. 2, present invention further teaches a kind of two dimensional codes based on the encryption of multiple code key to generate and verify system,
Include:
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based on multiple in the two dimensional code
The encryption information of code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
Wherein, it specifically, the user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least
The quantity of one segmentation, at least one segmentation is identical as the quantity of at least one code key;Using it is described at least one
At least one segmentation described in secret key pair is encrypted respectively;The equipment end to it is described at least one be respectively adopted it is described extremely
A few code key is decrypted and verifies;The whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
Because including the encryption information based on the encryption of multiple code key in two dimensional code, equipment end is based on when being verified
Multiple code key whole successful decryption just determines that the two dimensional code is effective, which is legitimate user, is verified, otherwise then recognizes
Not to be legitimate user, verifying not passes through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because multiple
The setting of code key so that its difficulty illegally verified greatly improves, and can not be often verified.In this way, improving safety.
Increase the application field of two dimensional code.
Wherein, the quantity of at least one code key is generally 1-3, and then safety reduces very little, can also make to add too much
Close verifying is excessively complicated, increases the duration of encrypted authentication, reduces timeliness.Certainly, the quantity of multiple code key can be according to safety
The length of grade and encryption information is adjusted, and can generally be increased with the raising of security level or the length of encryption information
And increase.In the present embodiment, the quantity of at least one code key is 3.
Further, the system also includes:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and
It is sent to user terminal and equipment end saves.
Wherein, user terminal and server end, when thinking in need (such as original code key leakage or do not use and
When needing to nullify calcellation), at least one described code key can be updated.In this way, further increasing safety.In user
When code key update is initiated at end, initiates to request by user terminal, be updated by server end, be then sent to user terminal and equipment end
It saves.When server end initiates code key update, directly it is updated by server end, is then sent to user terminal and equipment end
It saves.
Further,
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
In this way, no matter user terminal and/or equipment end are online or offline, can normal authentication, the stabilization independent of network
Property, convenience is higher.
Further, wherein also including the encryption information based on timing encryption in the two dimensional code.
Wherein the encryption information based on timing encryption includes the effective time of the generation time and two dimensional code of two dimensional code,
The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code,
The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension
Whether the difference of the generation time of code is less than the effective time of two dimensional code.
It include generation time and the two dimension of two dimensional code because including the encryption information based on timing encryption in two dimensional code
The effective time of code, equipment end, according to the system time of itself, subtract the generation time of two dimensional code, difference when being verified
If it is less than the effective time of two dimensional code, then it represents that the user is legitimate user, is verified, otherwise then not thinks being legal use
Family, verifying not pass through.And if someone's interception, usurping that this two dimensional code is subsequent to be gone again using because being more than having for two dimensional code
The time is imitated, and can not be verified.In this way, improving safety.Wherein, the effective time of two dimensional code is generally shorter, shorter peace
Full property is higher.In the present embodiment, the effective time of the two dimensional code is 5 seconds.
The encryption information for including in the two dimensional code is decrypted the equipment end and verifying further includes, and judges equipment end
The difference of system time generation time for subtracting two dimensional code whether be greater than zero.Because the generation time of two dimensional code is derived from user
The system time at end, if the system time of someone's malicious modification user terminal, the two dimensional code that the time generates later of pre-production one,
Then it reuses this two dimensional code later to go to be verified, then the system time for being often able to satisfy equipment end subtracts the generation of two dimensional code
The difference of time is less than the effective time of two dimensional code.So while when judging that the system time of equipment end subtracts the generation of two dimensional code
Between difference whether be greater than zero, to prevent such illegal verifying situation, further improve safety.
Before the two dimensional code is sent after user terminal generation, continuous updating.Not used two dimensional code then cancels.In this way, mentioning
The high difficulty of the two dimensional code of malice interception legitimate user, further improves safety.In the present embodiment, the update frequency
Rate is 1 second.
Further, wherein the two dimensional code also includes user information, the equipment end further includes to the user information
Carry out the verifying of user right.
Wherein the user right includes the equipment of user's P Passable and the time of user's P Passable.
Wherein the user right is arranged by server end, is sent to equipment end preservation.
In this way, further improving flexible convenience, and improve safety.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those skilled in the art is in technical scope disclosed by the invention, and any changes or substitutions that can be easily thought of, all answers
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claims
It is quasi-.
Claims (19)
1. a kind of two dimensional code based on the encryption of multiple code key generates and verification method, which comprises the following steps:
Step S1, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code
The encryption information of one code key encryption;
Step S2, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
2. the method according to claim 1, wherein
Wherein the step S1 includes:
Step S11 is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described at least
The quantity of one segmentation is identical as the quantity of at least one code key;
Step S12 is encrypted respectively using at least one segmentation described at least one described secret key pair;
Wherein the step S2 includes:
Step S21, to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;
Step S22, the whole successful decryptions of at least one segmentation then determine that the two dimensional code is effective.
3. the method according to claim 1, wherein wherein the quantity of at least one code key is 1-3.
4. the method according to claim 1, wherein further comprising the steps of:
Step S0, user register in user terminal, and server end generates at least one described code key according to user information, concurrently
It gives user terminal and equipment end saves.
5. according to the method described in claim 4, it is characterized in that, the user terminal and/or server end, to described at least one
A code key is updated.
6. according to the method described in claim 4, it is characterized in that,
Wherein the step S1 includes:
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
Wherein the step S2 includes:
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
7. the method according to claim 1, wherein wherein also including to be encrypted based on timing in the two dimensional code
Encryption information, it is described based on timing encryption encryption information include two dimensional code generation time and two dimensional code effective time,
The encryption information for including in the two dimensional code is decrypted in the equipment end and verifying includes being decoded to the two dimensional code,
The effective time for obtaining the generation time and two dimensional code of two dimensional code wherein included, judge that the system time of equipment end subtracts two dimension
Whether the difference of the generation time of code is less than the effective time of two dimensional code.
8. the method according to the description of claim 7 is characterized in that wherein the equipment end adds to include in the two dimensional code
Confidential information is decrypted and verifying further includes, and judges whether the system time of equipment end subtracts the difference of the generation time of two dimensional code big
In zero.
9. the method according to the description of claim 7 is characterized in that wherein the effective time of the two dimensional code is 5 seconds.
10. the method according to claim 1, wherein wherein the two dimensional code user terminal generation after send before,
Continuous updating.
11. described the method according to claim 1, wherein wherein the two dimensional code also includes user information
Equipment end further includes that the verifying of user right is carried out to the user information.
12. according to the method for claim 11, which is characterized in that wherein the user right includes user's P Passable
The time of equipment and user's P Passable.
13. according to the method for claim 12, which is characterized in that wherein the user right is arranged by server end, hair
Give equipment end preservation.
14. a kind of two dimensional code based on the encryption of multiple code key generates and verifying system characterized by comprising
User terminal, user terminal generate two dimensional code and are sent to equipment end and verified, and include based at least in the two dimensional code
The encryption information of one code key encryption;
Equipment end, equipment end receive the two dimensional code that user terminal is sent, the encryption information for including in the two dimensional code are decrypted
And verifying.
15. system according to claim 14 characterized by comprising
The user terminal is segmented the original contents of two dimensional code according to pre-defined rule, obtains at least one segmentation, it is described extremely
The quantity of a few segmentation is identical as the quantity of at least one code key;Using at least one described at least one described secret key pair
A segmentation is encrypted respectively;
The equipment end to it is described at least one at least one described code key is respectively adopted is decrypted and verifies;It is described extremely
Few whole successful decryptions of a segmentation then determine that the two dimensional code is effective.
16. system according to claim 15, which is characterized in that further include:
Server end, user register in user terminal, and server end generates at least one described code key according to user information, and
It is sent to user terminal and equipment end saves.
17. system according to claim 16, which is characterized in that
The wherein user terminal,
When user terminal is online, user terminal obtains at least one described code key from server end and generates two dimensional code;
When user terminal is offline, user terminal at least one code key described in itself saving generates two dimensional code;
The wherein equipment end,
When equipment end is online, equipment end from server end obtain two dimensional code described at least one described secret key pair be decrypted and
Verifying;
When equipment end is offline, two dimensional code described in equipment end at least one secret key pair described in itself saving is decrypted and tests
Card.
18. system according to claim 17, which is characterized in that wherein the encryption information based on timing encryption includes
The effective time of the generation time and two dimensional code of two dimensional code, the equipment end carry out the encryption information for including in the two dimensional code
Decryption and verifying include being decoded to the two dimensional code, obtain the generation time of two dimensional code wherein included and having for two dimensional code
The time is imitated, judges that the system time of equipment end subtracts whether the difference of the generation time of two dimensional code is less than effective time of two dimensional code.
19. system according to claim 18, which is characterized in that wherein the equipment end to including in the two dimensional code
Encryption information is decrypted and verifying further includes, judge the system time of equipment end subtract the generation time of two dimensional code difference whether
Greater than zero.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810699984.5A CN108960385A (en) | 2018-06-29 | 2018-06-29 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810699984.5A CN108960385A (en) | 2018-06-29 | 2018-06-29 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108960385A true CN108960385A (en) | 2018-12-07 |
Family
ID=64484676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810699984.5A Pending CN108960385A (en) | 2018-06-29 | 2018-06-29 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108960385A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460807A (en) * | 2019-01-11 | 2019-03-12 | 中煤航测遥感集团有限公司 | Generation method, recognition methods, generating means and the identification device of two dimensional code |
CN112716508A (en) * | 2019-10-14 | 2021-04-30 | 上海西门子医疗器械有限公司 | Verification method of handheld control device and medical imaging system |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388076A (en) * | 2007-09-12 | 2009-03-18 | 北京方维银通科技有限公司 | Method and apparatus for generating two-dimension bar-code |
CN102546174A (en) * | 2011-12-20 | 2012-07-04 | 贾松仁 | Two-dimensional code encryption/decryption method and anti-counterfeiting method |
CN103218715A (en) * | 2013-03-26 | 2013-07-24 | 苏州通付盾信息技术有限公司 | Dynamic payment code implementation method in cloud payment system |
CN104618334A (en) * | 2014-12-29 | 2015-05-13 | 通邮(中国)科技有限公司 | Method and system for generating and verifying dynamic two-dimensional code |
CN105763315A (en) * | 2014-12-16 | 2016-07-13 | 展讯通信(深圳)有限公司 | Data encryption and decryption method and apparatus thereof, and communication system |
CN105976005A (en) * | 2016-04-26 | 2016-09-28 | 鸿博股份有限公司 | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device |
CN105976004A (en) * | 2016-04-25 | 2016-09-28 | 华南农业大学 | Color two-dimensional code multi-dimensional information encoding and decoding methods and devices |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
US20170134167A1 (en) * | 2014-06-10 | 2017-05-11 | Unisys Corporation | Systems and methods for qr code validation |
CN106961430A (en) * | 2017-03-16 | 2017-07-18 | 山东蓝海数据科技有限公司 | A kind of physical isolation transmission method and physical isolation transmitting device based on Quick Response Code |
CN107395581A (en) * | 2017-07-11 | 2017-11-24 | 上海众人网络安全技术有限公司 | Quick Response Code generates and read method, device, system, equipment and storage medium |
CN107409042A (en) * | 2015-03-03 | 2017-11-28 | 旺德海尔斯有限责任公司 | The access control of encryption data in machine-readable identification symbol |
CN107979458A (en) * | 2016-10-25 | 2018-05-01 | 北京计算机技术及应用研究所 | A kind of two-dimensional bar data ciphering method |
CN108462699A (en) * | 2018-02-09 | 2018-08-28 | 苏州酷豆物联科技有限公司 | Based on the encrypted Quick Response Code generation of sequential and verification method and system |
-
2018
- 2018-06-29 CN CN201810699984.5A patent/CN108960385A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388076A (en) * | 2007-09-12 | 2009-03-18 | 北京方维银通科技有限公司 | Method and apparatus for generating two-dimension bar-code |
CN102546174A (en) * | 2011-12-20 | 2012-07-04 | 贾松仁 | Two-dimensional code encryption/decryption method and anti-counterfeiting method |
CN103218715A (en) * | 2013-03-26 | 2013-07-24 | 苏州通付盾信息技术有限公司 | Dynamic payment code implementation method in cloud payment system |
US20170134167A1 (en) * | 2014-06-10 | 2017-05-11 | Unisys Corporation | Systems and methods for qr code validation |
CN105763315A (en) * | 2014-12-16 | 2016-07-13 | 展讯通信(深圳)有限公司 | Data encryption and decryption method and apparatus thereof, and communication system |
CN104618334A (en) * | 2014-12-29 | 2015-05-13 | 通邮(中国)科技有限公司 | Method and system for generating and verifying dynamic two-dimensional code |
CN107409042A (en) * | 2015-03-03 | 2017-11-28 | 旺德海尔斯有限责任公司 | The access control of encryption data in machine-readable identification symbol |
CN105976004A (en) * | 2016-04-25 | 2016-09-28 | 华南农业大学 | Color two-dimensional code multi-dimensional information encoding and decoding methods and devices |
CN105976005A (en) * | 2016-04-26 | 2016-09-28 | 鸿博股份有限公司 | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device |
CN107979458A (en) * | 2016-10-25 | 2018-05-01 | 北京计算机技术及应用研究所 | A kind of two-dimensional bar data ciphering method |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
CN106961430A (en) * | 2017-03-16 | 2017-07-18 | 山东蓝海数据科技有限公司 | A kind of physical isolation transmission method and physical isolation transmitting device based on Quick Response Code |
CN107395581A (en) * | 2017-07-11 | 2017-11-24 | 上海众人网络安全技术有限公司 | Quick Response Code generates and read method, device, system, equipment and storage medium |
CN108462699A (en) * | 2018-02-09 | 2018-08-28 | 苏州酷豆物联科技有限公司 | Based on the encrypted Quick Response Code generation of sequential and verification method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460807A (en) * | 2019-01-11 | 2019-03-12 | 中煤航测遥感集团有限公司 | Generation method, recognition methods, generating means and the identification device of two dimensional code |
CN112716508A (en) * | 2019-10-14 | 2021-04-30 | 上海西门子医疗器械有限公司 | Verification method of handheld control device and medical imaging system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2304636B1 (en) | Mobile device assisted secure computer network communications | |
CN105337977B (en) | A kind of the safety moving communication system and its implementation of dynamic bidirectional certification | |
CN108418691A (en) | Dynamic network identity identifying method based on SGX | |
WO2018127081A1 (en) | Method and system for obtaining encryption key | |
CN109309565A (en) | A kind of method and device of safety certification | |
US20070067828A1 (en) | Extended one-time password method and apparatus | |
KR101634158B1 (en) | Method for authenticating identity and generating share key | |
CN105812367A (en) | Authentication system and authentication method of network access device in quantum network | |
CN110189442A (en) | Authentication method and device | |
US10263782B2 (en) | Soft-token authentication system | |
CN106506168A (en) | A kind of safe method based on biological characteristic long-distance identity-certifying | |
TW200402981A (en) | Methods for remotely changing a communications password | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN109729523A (en) | A kind of method and apparatus of terminal networking certification | |
CN111343634A (en) | Safe connection method and data transmission method between low-power-consumption Bluetooth devices | |
CN106559408A (en) | A kind of SDN authentication methods based on trust management | |
WO2018133675A1 (en) | Key update method, device and system | |
CN104601602B (en) | A kind of terminal device network security enhancing access and authentication method | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
CN109347887B (en) | Identity authentication method and device | |
CN111224784B (en) | Role separation distributed authentication and authorization method based on hardware trusted root | |
CN104486322B (en) | Terminal access authentication authorization method and terminal access authentication authoring system | |
CN106656955A (en) | Communication method and system and user terminal | |
CN108960385A (en) | Two dimensional code generation and verification method and system based on the encryption of multiple code key | |
CN110572392A (en) | Identity authentication method based on HyperLegger network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |