CN109002875A - Two dimensional code encryption method, two dimensional code Transmission system and storage medium - Google Patents

Two dimensional code encryption method, two dimensional code Transmission system and storage medium Download PDF

Info

Publication number
CN109002875A
CN109002875A CN201810562967.7A CN201810562967A CN109002875A CN 109002875 A CN109002875 A CN 109002875A CN 201810562967 A CN201810562967 A CN 201810562967A CN 109002875 A CN109002875 A CN 109002875A
Authority
CN
China
Prior art keywords
dimensional code
radio station
character string
character
control equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810562967.7A
Other languages
Chinese (zh)
Other versions
CN109002875B (en
Inventor
董佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai De Bi Innovation Technology Development Co Ltd
Original Assignee
Shanghai De Bi Innovation Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai De Bi Innovation Technology Development Co Ltd filed Critical Shanghai De Bi Innovation Technology Development Co Ltd
Priority to CN201810562967.7A priority Critical patent/CN109002875B/en
Priority to PCT/CN2018/100983 priority patent/WO2019205357A1/en
Priority to US16/489,014 priority patent/US20210326665A1/en
Publication of CN109002875A publication Critical patent/CN109002875A/en
Application granted granted Critical
Publication of CN109002875B publication Critical patent/CN109002875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of two dimensional code encryption method, two dimensional code Transmission system and storage medium, two dimensional code encryption method include that the first character string of the first system is generated according to user information;Using preset password, first character string is converted to binary second character string by this, and the preset password is originally that replacement is updated according to predetermined period, and binary radix is greater than the radix of first system;Utilize the second text string generation two dimensional code.The entrance guard management of the communal space can be improved in technical solution of the present invention.

Description

Two dimensional code encryption method, two dimensional code Transmission system and storage medium
Technical field
The present invention relates to field of security technology more particularly to a kind of two dimensional code encryption method, two dimensional code Transmission system and deposit Storage media.
Background technique
The access control equipment of the prior art generallys use identification (Identification Card, ID) card, integrated circuit (Integrated Circuit Card, IC) card, password, fingerprint etc. verifies user identity.Access control equipment can compare acquisition To user identity determine whether to open.
But two dimension code length used in existing access control equipment is too long, barcode scanning identification is slow, uses in a large number of users In the case of, cause user to wait in line barcode scanning.Certain customers directly can splice QR code content with text-string, then give birth to At two dimensional code;QR code content is shown in the form of plaintext, can be directly identified, be easy to be hypothesized two dimensional code meaning from And pretended, safety is low.For the access control equipment in different places, such as gymnasium gate inhibition, meeting room gate inhibition and elevator door Prohibit, user needs to show different two dimensional codes, very big inconvenience is brought to user.There are users to replicate the available of other users Two-dimension code image, Reusability, if two dimensional code leaks, will seriously affect gate inhibition safety.
The communal space is directed to the space of multiple user sharings, such as single office can be shared in entire building The people even whole society people use.Since the number of users that the communal space faces is huge, two dimensional code in the prior art adds Close mode is not able to satisfy demand for security of the communal space for gate inhibition.
Summary of the invention
Present invention solves the technical problem that being how to improve the entrance guard management of the communal space.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of two dimensional code encryption method, two dimensional code encryption method It include: the first character string that the first system is generated according to user information;It is converted using this general of preset password first character string For binary second character string, the preset password is originally that replacement is updated according to predetermined period, described second into The radix of system is greater than the radix of first system;Utilize the second text string generation two dimensional code.
Optionally, the radix of first system is 10, and binary radix is 64.
Optionally, the preset password originally includes the multiple characters arranged in sequence, and the sequence is according to default week Phase updates replacement.
Optionally, the multiple character is selected from: digital 0-9, capitalization A-Z, lowercase a-z, punctuation mark.
Optionally, the user information includes User Identity, and first character string includes corresponding to user identity The character of mark.
Optionally, the predeterminated position of first character string is located at corresponding to the character of the User Identity.
The embodiment of the invention also discloses a kind of two dimensional code Transmission system, two dimensional code Transmission system includes: server;Setting In the son control equipment of each communal space, the sub- control equipment includes: sub- radio station;Two-dimensional code scanning device is suitable for scanning Two dimensional code on the user terminal carries information to obtain two dimensional code, and the two dimensional code is carried information and is sent out by sub- radio station It sees off, the two dimensional code is generated by the user terminal or server according to the two dimensional code encryption method, and described two Tieing up code and carrying information includes second character string;With the access controller of the sub- radio station coupling;Total radio station, with each height control Sub- station radio coupling in control equipment;Master control control equipment is coupled with total radio station, and the master control control equipment is via described total Radio station, sub- radio station are communicated with the two-dimensional code scanning device and access controller.
Optionally, it further includes the default random character spliced after second character string that the two dimensional code, which carries information,.
Optionally, the master control control equipment receives the two dimensional code that the sub- radio station is sent via total radio station and carries letter Breath, and the default random character is compared with the random character that the server issues, it is taken with the determination two dimensional code Whether information is correct.
Optionally, the two-dimensional code scanning device utilizes the second text string generation CRC code;The two dimensional code carries letter Breath further includes the CRC code.
Optionally, the master control control equipment receives the two dimensional code that the sub- radio station is sent via total radio station and carries letter Breath, new root of laying equal stress on calculate new CRC code according to the second character string received, the new CRC code are compared with the CRC code It is right, it is whether correct with determination second character string.
Optionally, second character string includes timestamp;The master control control equipment is via described in total radio station reception Two dimensional code carries information, and feeds back the instruction for being directed to second character string;Total radio station receives the access controller After the feedback acknowledgment of described instruction, if receiving the second character string including the timestamp, recording exceptional again.
The embodiment of the invention also discloses a kind of storage mediums, are stored thereon with computer instruction, the computer instruction The step of two dimensional code encryption method is executed when operation.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
Technical solution of the present invention generates the first character string of the first system according to user information;Using preset password this by institute It states the first character string and is converted to binary second character string, the preset password is originally to be updated to replace according to predetermined period It changes, binary radix is greater than the radix of first system;Utilize the second text string generation two dimensional code.This Inventive technique scheme can make second by the way that the first character string of the first system is converted to binary second character string The data volume of character string is less than the first character string, so as to reduce the length of two dimensional code, and then promotes the identification speed of two dimensional code Degree and transmission speed.In addition, preset password is originally to be updated replacement according to predetermined period, therefore in different predetermined periods Interior, identical first character string can be converted into the second different character strings, avoid lawless people and utilize identical two dimension Code, which executes, opens the operation such as gate inhibition, to ensure that the safety in utilization of two dimensional code.
Further, the radix of first system is 10, and binary radix is 64.Due to binary Radix is bigger, and the data volume of the second character string is smaller;But machine word is called the turn there are spcial character, can indicate that computer executes spy Fixed operation, the second system available characters quantity are limited;Therefore binary radix is 64 in technical solution of the present invention, is being reduced While the data volume of second character string, it can also be ensured that the availability of the second character string.
Further, the user information includes User Identity, and first character string includes corresponding to user's body The character of part mark;The character of User Identity described in Ying Yu is located at the predeterminated position of first character string.Skill of the present invention In art scheme, in order to distinguish to different users, the first character string includes the character corresponding to User Identity.This Outside, in order to enable subsequent scanning device obtains the character for corresponding to User Identity, which can be located at the first character The predeterminated position of string, in order to can quickly and accurately identify user identity.
Detailed description of the invention
Fig. 1 is a kind of flow chart of two dimensional code encryption method of the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of two dimensional code Transmission system of the embodiment of the present invention;
Fig. 3 is a kind of timing diagram of each device interaction of two dimensional code Transmission system of the embodiment of the present invention;
Fig. 4 is the concrete structure schematic diagram of one seed of embodiment of the present invention control equipment;
Fig. 5 is the timing diagram of each device interaction of another kind two dimensional code Transmission system of the embodiment of the present invention.
Specific embodiment
As described in the background art, the communal space is directed to the space of multiple user sharings, such as will can individually handle official business The people that room shares to the people even whole society in entire building uses.It is existing since the number of users that the communal space faces is huge There is the two dimensional code cipher mode in technology not to be able to satisfy demand for security of the communal space for gate inhibition.
Technical solution of the present invention, can by the way that the first character string of the first system is converted to binary second character string So that the data volume of the second character string so as to reduce the length of two dimensional code, and then promotes two dimension less than the first character string The recognition speed and transmission speed of code.In addition, preset password is originally to be updated replacement according to predetermined period, therefore in difference Predetermined period in, identical first character string can be converted into the second different character strings, avoid lawless people utilization Identical two dimensional code, which executes, opens the operation such as gate inhibition, to ensure that the safety in utilization of two dimensional code.
To make the above purposes, features and advantages of the invention more obvious and understandable, with reference to the accompanying drawing to the present invention Specific embodiment be described in detail.
Fig. 1 is a kind of flow chart of two dimensional code encryption method of the embodiment of the present invention.
Two dimensional code encryption method shown in Fig. 1 may comprise steps of:
Step S101: the first character string of the first system is generated according to user information;
Step S102: using preset password, first character string is converted to binary second character string by this, institute Stating preset password originally is that replacement is updated according to predetermined period, and binary radix is greater than first system Radix;
Step S103: the second text string generation two dimensional code is utilized.
In the specific implementation of step S101, user information can be information necessary to generating two dimensional code carrying information. Specifically, user information may include User ID, timestamp, longitude and latitude, service set (Service Set Identifier, SSID) etc..Longitude and latitude can be global positioning information (Global Positioning System, GPS); SSID can be the current connected Wi-Fi hotspot of user.
In order to reduce the data volume of finally formed two dimensional code, in step s 102, the first character string can be converted to Binary second character string, binary radix are greater than the radix of first system.
Specifically, the radix of the first system is 10, and binary radix can be any numerical value greater than 10.
In the specific implementation of step S102, the first character string can be converted into binary second word as a whole Symbol string.Further, when the first character string includes multiple portions character string, every partial character string can be respectively converted into second Second character string of system, then by every the second string-concatenation of part be corresponding second character string of user information.For example, user It, can be corresponding by User ID, timestamp, longitude and latitude, SSID respectively when information includes User ID, timestamp, longitude and latitude, SSID First character string is converted to the second character string, then by User ID, timestamp, longitude and latitude, corresponding second string-concatenation of SSID As corresponding second character string of user information.
It should be noted that preset password originally can provide the available characters of the second character string.By the first of the first system The detailed process that character string is converted to binary second character string can refer to existing based conversion algorithm, herein no longer It repeats.
Further, the preset password is originally to be updated replacement according to predetermined period.That is, different In predetermined period, it is originally different that first character string, which is converted to preset password used in binary second character string, 's.So, the second character string that identical first character string is converted in different predetermined periods is different.Even if wherein The second character string of one kind is intercepted, which can not use.For example, being used to open the applied field of gate inhibition in two dimensional code Jing Zhong, even if lawless people has intercepted a kind of two dimensional code, but the two dimensional code cannot open gate inhibition.
And then in the specific implementation of step S103, the second text string generation two dimensional code can use.
It will be apparent to a skilled person that can be generated using any enforceable algorithm in the prior art above-mentioned Two dimensional code, the embodiment of the present invention are without limitation.
The embodiment of the present invention, can be with by the way that the first character string of the first system is converted to binary second character string So that the data volume of the second character string so as to reduce the length of two dimensional code, and then promotes two dimensional code less than the first character string Recognition speed and transmission speed.In addition, preset password is originally to be updated replacement according to predetermined period, therefore different In predetermined period, identical first character string can be converted into the second different character strings, avoid lawless people and utilize phase Same two dimensional code, which executes, opens the operation such as gate inhibition, to ensure that the safety in utilization of two dimensional code.
In a kind of application scenarios of the present invention, two dimensional code needs to trigger specific operation by verifying, such as opens gate inhibition.? It in this case, is the second character string after two dimensional code is scanned equipment identification;Directly second character string can be authenticated Verifying, can then trigger specific operation if the verification passes.
It optionally, is the second character string after two dimensional code is scanned equipment identification;Can use preset password this by the second word Symbol string is converted to the first character string, obtains the information for each field that the first character string carries, such as User ID, user's longitude and latitude etc. Information, and authentication verification is carried out, specific operation can be then triggered if the verification passes.
In a preferred embodiment of the invention, the radix of first system is 10, and binary radix is 64.
In the present embodiment, the first character string generallys use 10 system modes to indicate, the first character string may include number And ASCII character.Since binary radix is bigger, the data volume of the second character string is smaller;But machine word is called the turn in the presence of special Different character can indicate that computer executes specific operation, and the second system available characters quantity is limited;Therefore the in the embodiment of the present invention Binary radix is 64, while reducing the data volume of the second character string, it can also be ensured that the availability of the second character string.
In another preferred embodiment of the present invention, the preset password originally includes the multiple characters arranged in sequence, institute Stating sequence is to update to replace according to predetermined period.
It may include multiple characters in preset password sheet in the present embodiment, the quantity of character is binary radix.In advance If the sequence of multiple characters influences the conversion corresponding relationship of the first character string and the second character string in code book.In other words, equally The first character string the second different character strings will be converted to using multiple characters of different order.So by according to default Period, which updates, replaces putting in order for multiple characters, it is ensured that the safety of the second character string conversion.
Further, the multiple character is selected from: digital 0-9, capitalization A-Z, lowercase a-z, punctuation mark.
Specifically, multiple characters do not include indicating that computer executes the spcial character of specific operation, such as oblique line/, with, Asterisk * etc..Such as multiple characters in preset password sheet may is that 0-9 (10), A-Z (26), a-z (26), exclamation! (1), underscore _ (1);Multiple characters are arranged in sequence can form preset password sheet, such as may is that " tB_ uTaJGzwkUS3xcpX7ns9OAgLq62WCoNEhdj5rf8ePylZi4DMQKVIHmYb01vF!R".
In another preferred embodiment of the invention, the user information includes User Identity, first character string Character including corresponding to User Identity.
In specific implementation, the user for having different identity mark can have different permissions, therefore can be by user's body Part mark is embodied in two dimensional code.That is, the first character string may include the character corresponding to User Identity, then Second character string also includes the character corresponding to User Identity, and then two dimensional code carries the identification information of user. For example, character A can indicate ordinary user;Character B can indicate that visitor, character S can indicate administrator etc..
In concrete application scene, has the permission for opening gymnasium gate inhibition, meeting room gate inhibition and elevator entrance guard in user In the case of, by be arranged correspond to User Identity character, can to avoid user gymnasium gate inhibition, meeting room gate inhibition and Elevator entrance guard shows different two dimensional codes, and user can open above-mentioned gate inhibition using the same two dimensional code, improves user's use The convenience of two dimensional code.
In the embodiment of the present invention, in order to distinguish to different users, the first character string includes corresponding to user identity The character of mark.
Further, the predeterminated position of first character string is located at corresponding to the character of the User Identity.
In the embodiment of the present invention, in order to enable subsequent scanning device obtains the character for corresponding to User Identity, it should Character can be located at the predeterminated position of the first character string, in order to can quickly and accurately identify user identity.
For example, character A can indicate ordinary user;Character B can indicate visitor.If user is member in platform, When terminal display two dimensional code, the bebinning character of content entrained by two dimensional code can be A for it.If it is visitor, then its When terminal display two dimensional code, the bebinning character of content entrained by two dimensional code can be B.
Referring to figure 2., Fig. 2 is a kind of structural schematic diagram of two dimensional code Transmission system of the embodiment of the present invention.
Two dimensional code Transmission system 1 may include server 40, the son control equipment 10 for being set to each communal space, total electricity Platform 20 and master control control equipment 30.
Wherein, the sub- control equipment 10 may include: sub- radio station 101;Two-dimensional code scanning device 102 is suitable for scanning institute The two dimensional code on user terminal is stated to obtain two dimensional code and carry information, and the two dimensional code is carried into information and passes through sub- radio station 101 It sends, the two dimensional code is generated by the user terminal or server 40, and it includes described that the two dimensional code, which carries information, Second character string;The access controller 103 coupled with the sub- radio station 101.
Still further, the user terminal or server 40 can generate two dimension using method shown in Fig. 1 Code.Wherein, the replacement that periodically updates of preset password sheet can be and be completed by server 40, and in the updated, server 40 can It is sent to two-dimensional code scanning device 102 and master control control equipment 30 to synchronize updated code book, so that two-dimensional code scanning Equipment 102 and master control control equipment 30 can parse the relevant information received.In addition, if being generated by user terminal The two dimensional code, server 40 also need for the code book to be sent to the user terminal, for its use.
More specifically, the two dimensional code that scanning obtains can be carried information and be transmitted to control by two-dimensional code scanning device 102 Device (is not shown in the figure, such as can be single-chip microcontroller or other various general or special purpose control circuits), then by controller It is transmitted to sub- radio station 101.
Wherein, two-dimensional code scanning device 102 can be installed on the outside (such as shared meeting room is outdoors) of the communal space, with Convenient for scanning user terminal.Sub- radio station 101 and access controller 103 can be installed on the outside or inside of the communal space, preferably For the inside (such as shared meeting room inside) for being installed on the communal space, to improve safety.
Access controller 103 can control turning on or off for the gate inhibition of the communal space.
Total radio station 20 and 101 wireless coupling of sub- radio station in each height control equipment.
Master control control equipment 30 and total radio station 20 couple, and the master control control equipment 30 is via total radio station 20, son electricity Platform 101 is communicated with the two-dimensional code scanning device 102 and access controller 103.
Server 40 can be remote server relative to the communal space, for example, the master control in multiple building, garden is set up Standby 30 can be connected to same server 40 by modes such as cable network, wireless networks.
Furthermore, user terminal for example can be mobile phone, wearable device etc..
In specific implementation, master control control equipment 30 can receive two-dimensional code scanning device via total radio station 20, sub- radio station 101 Two dimensional code accessed by 102 carries information.Master control control equipment 30 can be via total radio station 20, sub- radio station 101 to access control Device 103 sends message, such as sends control instruction.
Specifically, the two dimensional code that information scanning equipment 102 scans carries information and can be sent out by sub- radio station 101 It goes, total radio station 20 can receive the user information.Two dimensional code can be carried information and be transmitted to master control control equipment 30 by total radio station 20.
It is set it should be noted that master control control equipment 30 can be any enforceable computer for having information processing capability It is standby, such as can be the mainframe micro for being equipped with Android operation system.
Furthermore, the communication process between sub- radio station 101 and total radio station 20 can be point-to-point communication.Total radio station 20 While receiving the two dimensional code carrying information that sub- radio station 101 is sent, the mark in the sub- radio station 101 can also be known, in turn Know the mark of the communal space locating for the sub- radio station 101.
In specific implementation, a son control equipment 10 is can be set in each communal space.Each total radio station 20 can with it is more A sub- radio station 101 carries out wireless coupling, and each master control control equipment 30 can be with multiple two-dimensional code scanning devices 102, multiple gate inhibitions Controller 103 is communicated.For example, can have multiple shared meeting rooms in same building or garden, each meeting room is set A son control equipment 10 is set, then a total radio station 20 and a master control control equipment can be only set in building or garden 30, to be communicated with each height control equipment 10.It is of course also possible to be arranged in building or garden multiple total radio station 20 with it is multiple total Control equipment 30, especially building or the larger situation of garden area.
It should be noted that the quantity in the sub- radio station 101 of each 20 wireless coupling of total radio station can be according to actual application Demand and communication distance determine that the embodiment of the present invention is without limitation.
In the present embodiment, sub- radio station 101 can be communicated with total radio station 20 using open radio frequency band, Huo Zheye It is communicated using following wireless communication technique: global system for mobile communications (Global System for Mobile Communication, GSM), LoRa radio communication etc..
In a specific embodiment of the invention, the master control control equipment 30 is received via total radio station 20, sub- radio station 101 The two dimensional code that sub- radio station 101 is sent carries information.
In a preferred embodiment of the invention, it further includes splicing after second character string that the two dimensional code, which carries information, Default random character.In specific implementation, default random character can be server 40 or user terminal when generating two dimensional code Splicing is also possible to splice after information scanning equipment 102 identifies two dimensional code in second word after second character string After symbol string.
Specifically, default random character can be server 40 and be sent in advance when user terminal generates two dimensional code User terminal.When information scanning equipment 102 splices the default random character, default random character can be server 40 It is sent to information scanning equipment 102 in advance.
Further, master control control equipment 30 receives the two dimensional code that the sub- radio station 101 is sent via total radio station 20 and takes Information, and the default random character is compared with the random character that the server 40 issues, with determination described two Whether correct tie up code carrying information.
The embodiment of the present invention carries the default random character in information by two dimensional code and carries the correct of information to two dimensional code Property verified, avoid two dimensional code and carry information the case where illegally using after being stolen, it is ensured that two dimensional code carries letter Cease the safety in transmission process.
In another preferred embodiment of the present invention, the two-dimensional code scanning device 102 utilizes second text string generation CRC code;It further includes the CRC code that the two dimensional code, which carries information,.
Further, the master control control equipment 30 receives the two dimension that the sub- radio station 101 is sent via total radio station 20 Code carries information, and new root of laying equal stress on calculates new CRC code according to the second character string received, by the new CRC code and the CRC Whether code is compared, correct with determination second character string.
In the present embodiment, the CRC code and master control control equipment 30 calculated by two-dimensional code scanning device 102 is calculated new CRC code is compared, if the CRC code is consistent with the new CRC code, indicates that the second character string is transmitted in transmission process Correctly, then the second character string can be used for generating instruction, to indicate that access controller 103 opens gate inhibition;If the CRC code with The new CRC code is inconsistent, indicates the error of transmission in transmission process of the second character string, then utilizes the second text string generation Instruction can indicate that access controller 103 closes gate inhibition.
In another preferred embodiment of the invention, second character string includes timestamp;The master control control equipment 30 passes through The two dimensional code is received by total radio station 20 and carries information, and feeds back the instruction for being directed to second character string;Total electricity Platform 20 receive the access controller 103 for described instruction feedback acknowledgment after, if receive again including it is described when Between the second character string for stabbing, then recording exceptional.
In the present embodiment, the timestamp as included by the second character string, the second character string of every two is unduplicated.
After total radio station 20 receives two dimensional code carrying information every time, it can recorde two dimensional code and carry the second character in information String.In addition, total radio station 20 can also record the feedback acknowledgment that access controller 103 is directed to each control instruction.If total radio station Receive same second character string (namely the second character string again after receiving the feedback acknowledgment for the second character string Content is identical), then it represents that second character string is illegally used, then recording exceptional.In addition, total radio station 20 will will not connect again Same second character string received is sent to master control control equipment 30.Thus, it is possible to prevent the second abnormal character string from using In access control controller 103, it ensure that two dimensional code carries the safety in utilization of information.
In a concrete application scene of the invention, referring to figure 3., server 40 can execute step S101 and step S102 generates two dimensional code, and will be issued to user terminal 2.Alternatively, user terminal 2 executes step S103, two dimensional code is generated.
It should be noted that server 40 generates two dimensional code or the process of the generation two dimensional code of user terminal 2 is referred to Embodiment illustrated in fig. 1, details are not described herein again.
In step S104, two dimensional code read head 60 scans the two dimensional code that user terminal 2 provides, and obtains two dimensional code and carries letter Breath.In step s105, two dimensional code read head 60 calculates CRC code splicing after the second character string.In step S106 and step S107 In, via sub- radio station 101 and control station 20, two dimensional code carrying information is sent to master control control equipment 30.In step S108, always Control equipment 30 can calculate new CRC code, and be verified with the CRC received;If verification result is consistent, in step S109 and into step S111, is sent to access controller 103 for control instruction via total radio station 20, sub- radio station 101.In step In S112 and step S113, after the completion of access controller 103 executes instruction, feedback acknowledgment can be sent to total radio station 20.So far, Primary complete two dimensional code carries information and reads, the process for issuing, receiving instruction execution result is instructed to execute completion.
Further, if sub- radio station 101 transmission two dimensional code carry information to control station 20 transmission on the way, encounter non- Method intercepts signal, then resets the signal.It when 20 first time of control station receives, can normally execute, receive for the second time identical Content when, then can abandon and be not processed, while control station 20 can recorde a log information, record the secondary irregularities (such as suspect and be played out attack).
Optionally, master control control equipment 30 can also carry information to two dimensional code and carry out authentication verification, according to authentication verification knot Fruit generates control instruction, and the control instruction is sent to the sub- control equipment 10, the control via total radio station 20 System instruction is at least for controlling the gate inhibition that the access controller 103 opens or closes the communal space.
In the present embodiment, master control control equipment 30 can generate control instruction according to authentication verification result.Specifically, authentication is tested When card result indicates that two dimensional code carrying information passes through verifying, then generates and can control the first control that the gate inhibition of the communal space opens It instructs (namely door open command);When authentication verification result indicates that two dimensional code carrying information is unverified, then generating can control The gate inhibition of the communal space forbids the second open control instruction (namely maintaining the instruction closed the door).
After master control control equipment 30 generates control instruction, control instruction can be sent via total radio station 20.Sub- radio station 101 can receive the control instruction that total radio station 20 is sent, and the control instruction received is transmitted to access controller by sub- radio station 101 103, access controller 103 can execute the control instruction.More specifically, sub- radio station 101 can refer to the control received Order is transmitted to controller, and then the control instruction is forwarded to access controller 103 by controller.
In technical solution of the present invention, master control control equipment 30 is from 40 synchronizing authentication data of server to local, and local right The user information carries out authentication verification, can promote the speed of authentication verification, promote the access control efficiency of the communal space.This Outside, it is tested by carrying out authentication in local area network (master control control equipment 30 and son control equipment 10 may be at same local area network) Card, can be to avoid frequent the problem of accessing overload caused by server 40.
Specifically, it when master control control equipment 30 carries out authentication verification to the user information according to authorization data, can will use Family information is compared with the authorization user information in authorization data.If user information is consistent with authorization user information, Then indicate that the user information passes through verifying;Otherwise indicate that user information is unverified.
In the present embodiment, master control control equipment 30 is from 40 synchronizing authentication data of server to local, and in local to the use Family information carries out authentication verification, can promote the speed of authentication verification, promote the control efficiency of the communal space;In addition, in network Environment is unstable, in the case that network blocks, by carrying out authentication verification in local area network, it is ensured that with it is shared What the son control equipment 10 in space communicated is normally carried out, and further promotes user experience.
Referring still to Fig. 2, in another preferred embodiment of the present invention, the master control control equipment 30 can believe the user Breath is sent to server 40 and carries out authentication verification, and receives authentication verification result from the server 40.
In the present embodiment, authorization data is can be generated in server 40.Server 40 can also be received from master control control equipment 30 Two dimensional code carries information, and carries information to the two dimensional code using the authorization data generated and carry out authentication verification.It is tested in authentication After the completion of card, authentication verification result is sent to master control control equipment 30 by server 40.Further, server 40 can also generate Control instruction, and control instruction is sent to master control control equipment 30.
It is tested it is understood that server 40 carries out authentication to two dimensional code carrying information using the authorization data of generation The process of card, it is consistent to the user information progress process of authentication verification according to authorization data with master control control equipment 30, herein It repeats no more.
Optionally, master control control equipment 30 receives authentication verification as a result, and according to authentication verification result from the server 40 Generate control instruction.
Closer, master control control equipment 30 is further adapted for encrypting the control instruction, is sent to the sub- control The control instruction of equipment 10 is encrypted control instruction.
In the present embodiment, in order to guarantee control instruction transmission safety, master control control equipment 30 can to control instruction into Row encryption.Master control control equipment 30 can encrypt control instruction by the way of static encryption or dynamic encryption.
Preferably, master control control equipment 30 can encrypt control instruction by the way of dynamic encryption, encrypt every time Control instruction afterwards is different.Specifically, master control control equipment 30 can be according to the user information computation key received, and with close Key encrypts the control instruction.
With continued reference to Fig. 2, server 40 can be generated two dimensional code and send it to the user terminal.For example, user It can be reserved by user terminal login service device 40, and to the specific communal space, input User ID, server 40 The two dimensional code is generated according to the information of user's input.
In specific implementation, the two dimensional code that server 40 generates can be scanned reading for two-dimensional code scanning device 102.Example Such as, two dimensional code can be generated in server 40, and two dimensional code carries identity identification information.
Server 40 generates two dimensional code using method shown in Fig. 1, can reduce the data volume of two dimensional code.Since master control is set up It is wireless communication between standby 30 and the two-dimensional code scanning device 102 and access controller 103, open available radio frequency It is lower, it is easy decaying and is interfered, therefore in order to guarantee data transmission bauds and transmission quality, using sub- radio station 101 and always Transmit above-mentioned two dimensional code in radio station 20, it is ensured that the son control equipment 10 of master control control equipment 30 and the communal space communicate it is normal into Row.
Further, the server 40 receives each sub- radio station 101 and the master control from the master control control equipment 30 The heartbeat message of equipment 30, and the sub- control equipment 10 and the master control control equipment 30 are supervised according to the heartbeat message It surveys.
In specific implementation, sub- radio station 101 can send the heartbeat in sub- radio station 101 via total radio station 20 to master control control equipment 30 Information.The heartbeat message of itself and the heartbeat message in sub- radio station 101 are reported to server 40 by master control control equipment 30 together.Service It is different whether the sub- radio station 101 of heartbeat message monitoring and master control control equipment 30 that device 40 can be reported according to master control control equipment 30 run Often.
Specifically, master control control equipment 30 can be according to predetermined period by the heartbeat of the heartbeat message of itself and sub- radio station 101 Information reporting is to server 40.If server 40 does not receive the heartbeat message or master control in sub- radio station 101 in predetermined period The heartbeat message of control equipment 30, then it represents that exception occur in sub- radio station 101 or master control control equipment 30, and server 40 can be reported It is alert, so that related personnel carries out malfunction elimination to sub- radio station 101 or master control control equipment 30 in time.
Furthermore, communal space registration module (not shown), user's registration can be set in the server 40 Module (not shown) and search module (not shown).
Wherein, the communal space registration module is suitable for recording the spatial information of each communal space, the spatial information Including position, area, rent and inner facility;The user registration module is suitable for recording the user information, user's letter Breath includes user identifier;Described search module is suitable for being searched for according to the search condition of the user to match with described search condition The communal space.
Specifically, user can use user terminal access server 40;User inputs user identifier, user's registration mould Block records the user identifier and completes user's registration.User can also input the search condition to the communal space, search module ratio To the spatial information of the communal space of search condition and communal space registration module record, the determining search condition with user's input The communal space to match, so far.User completes the reservation to the communal space.
Together referring to Fig. 2 and Fig. 4, in another specific embodiment of the invention, the sub- control equipment 10 further include: with institute The controller 104 for stating two-dimensional code scanning device 102 and the coupling of sub- radio station 101 is suitable for receiving the two dimensional code and carries information and root According to the user information computation key, the key is for decrypting the encrypted control instruction.Specifically, controller 104 Identical algorithm computation key can be used with master control control equipment 30, the key and master control control equipment that controller 104 is calculated 30 key agreements being calculated;Therefore the key that is calculated of controller 104 can be used for decrypting the encrypted control refers to It enables.
In another specific embodiment of the invention, together referring to Fig. 2 and Fig. 4, the sub- control equipment 10 further includes connection Relay 105 in the forceful electric power circuit of the communal space, the relay 105 is via the sub- radio station 101, total radio station 20 It is communicated with the master control control equipment 30.
In the present embodiment, relay 105 is connected with the forceful electric power circuit of the communal space, and relay 105 can control The connection or cutting of forceful electric power circuit.Such as when the conducting of relay 105, forceful electric power circuit is connected to power supply, so that socket, photograph The equipment such as bright can be used normally;When relay 105 disconnects, forceful electric power circuit and power supply are disconnected, so that socket, illumination etc. are set It is standby not to be available.
In specific implementation, control instruction is sent to relay via total radio station 20, sub- radio station 101 by master control control equipment 30 105, relay 105 can control turning on or off for forceful electric power circuit in response to the control instruction.
Specifically, the realization of light current circuit can be used in access controller 103.Access controller 103 and relay as a result, 105 realize the linkage control to the strong and weak electricity circuit of the communal space jointly, save manpower and operation cost, energy conservation and environmental protection.
A kind of interactive process under concrete application scene, between each device of two dimensional code Transmission system and user terminal 2 Referring to figure 5..
In the present embodiment, user terminal 2 can execute step S11 by modes such as webpage, public platform, application programs, from Search can use the communal space in server 40, for example, available using a variety of conditional searches such as price, distance, area, inner facility The communal space.
In step s 12, the available communal space searched is returned to user terminal 2 by server 40, to show use Family.In step s 13, user terminal 2 selectes the communal space, locks the period using the communal space and is paid.In step In rapid S14, server 40 can send reservation success message to user terminal 2.And step S15 and step S16 are executed, it will authenticate Data are sent to master control control equipment 30 via things-internet gateway 50.Authorization data includes the User ID of user terminal 2 and selectes Communal space ID.
Server 40 executes step S17, generates two dimensional code and is handed down to user terminal 2.This two dimensional code can by screenshot or The mode that wechat is shared issues other terminal devices.Specifically, server 40 issues after can carrying out compression encryption to two dimensional code To user terminal 2.In step S18, user terminal 2 is mentioned in the number of minutes (such as 10 minutes) that the selected period starts to be set in advance It is scanned for two dimensional code, two dimensional code read head 60 can scan the two dimensional code of the offer of user terminal 2.
In step S19, the two dimensional code scanned carrying information is sent to controller 104 by two dimensional code read head 60, specifically Ground, it includes user information that two dimensional code, which carries information,.Controller 104 can be according to QR code content dynamic generation key, the key It can be stored in controller 104, and for decrypting control instruction in the next steps.
In step S20,21,22, two dimensional code carrying information is sent to master control via sub- radio station 101, total radio station 20 Equipment 30.Master control control equipment 30 executes step S23, carries the user information in information to two dimensional code and carries out authentication verification, and really Control instruction is determined, for example whether opening gate inhibition, whether opening strong point circuit.Further, master control control equipment 30 receives encryption After two dimensional code afterwards carries information, it can first decrypt the encrypted two dimensional code and carry information, then to the two dimensional code after decryption It carries information and carries out authentication verification.
In step s 24, master control control equipment 30 can be generated according to QR code content and be instructed using key control extension. In step 25,26, via total radio station 20, sub- radio station 101, control instruction is sent to controller 104,104 basis of controller Calculated key decrypts the control instruction in step S19.
In step 27,28, the control instruction after decryption is sent to relay 105 and/or access control by controller 104 Device 103.For example, access controller 103, which executes instruction, opens gate inhibition, relay 105 is executed instruction as the power supply of forceful electric power circuit.Extremely This, user can enter and using the selected communal space.
About more contents of the interactive process between each device of two dimensional code Transmission system and user terminal 2, Ke Yican According to the associated description in Fig. 1 to Fig. 4, which is not described herein again.
The embodiment of the invention also discloses a kind of storage mediums, are stored thereon with computer instruction, the computer instruction The step of two dimensional code encryption method shown in Fig. 1 can be executed when operation.The storage medium may include ROM, RAM, magnetic Disk or CD etc..The storage medium can also include non-volatility memorizer (non-volatile) or non-transient (non- Transitory) memory etc..
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute Subject to the range of restriction.

Claims (13)

1. a kind of two dimensional code encryption method characterized by comprising
The first character string of the first system is generated according to user information;
Using preset password, first character string is converted to binary second character string by this, and the preset password is originally It is updated replacement according to predetermined period, binary radix is greater than the radix of first system;
Utilize the second text string generation two dimensional code.
2. two dimensional code encryption method according to claim 1, which is characterized in that the radix of first system is 10, institute Stating binary radix is 64.
3. two dimensional code encryption method according to claim 1, which is characterized in that the preset password sheet includes in sequence Multiple characters of arrangement, the sequence are to update to replace according to predetermined period.
4. two dimensional code encryption method according to claim 3, which is characterized in that the multiple character is selected from: digital 0-9, Capitalization A-Z, lowercase a-z, punctuation mark.
5. two dimensional code encryption method according to claim 1, which is characterized in that the user information includes user identity mark Know, first character string includes the character corresponding to User Identity.
6. two dimensional code encryption method according to claim 5, which is characterized in that the word corresponding to the User Identity Symbol is located at the predeterminated position of first character string.
7. a kind of two dimensional code Transmission system characterized by comprising
Server;
It is set to the son control equipment of each communal space, the sub- control equipment includes:
Sub- radio station;
Two-dimensional code scanning device carries information suitable for scanning the two dimensional code on the user terminal to obtain two dimensional code, and by institute It states two dimensional code carrying information to send by sub- radio station, the two dimensional code is by the user terminal or server according to right It is required that two dimensional code encryption method described in any one of 1 to 6 generates, it includes second character that the two dimensional code, which carries information, String;
With the access controller of the sub- radio station coupling;
Total radio station is coupled with the sub- station radio in each height control equipment;
Master control control equipment is coupled with total radio station, and the master control control equipment is via total radio station, sub- radio station and the two dimension Code scanning device and access controller communication.
8. two dimensional code Transmission system according to claim 7, which is characterized in that it further includes spelling that the two dimensional code, which carries information, Connect the default random character after second character string.
9. two dimensional code Transmission system according to claim 8, which is characterized in that the master control control equipment is via total electricity Platform receives the two dimensional code that the sub- radio station is sent and carries information, and by the default random character and the server issue with Machine character is compared, and whether carry information with the determination two dimensional code correct.
10. two dimensional code Transmission system according to claim 7, which is characterized in that the two-dimensional code scanning device utilizes institute State the second text string generation CRC code;It further includes the CRC code that the two dimensional code, which carries information,.
11. two dimensional code Transmission system according to claim 10, which is characterized in that the master control control equipment is via described total Radio station receives the two dimensional code that the sub- radio station is sent and carries information, and new root of laying equal stress on calculates newly according to the second character string received Whether the new CRC code is compared CRC code with the CRC code, correct with determination second character string.
12. two dimensional code Transmission system according to claim 7, which is characterized in that second character string includes timestamp;
The master control control equipment receives the two dimensional code via total radio station and carries information, and feeds back and be directed to second character The instruction of string;
Total radio station receive the access controller for described instruction feedback acknowledgment after, if receive again including Second character string of the timestamp, then recording exceptional.
13. a kind of storage medium, is stored thereon with computer instruction, which is characterized in that the computer instruction executes when running Described in any one of claims 1 to 6 the step of two dimensional code encryption method.
CN201810562967.7A 2018-04-26 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium Active CN109002875B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201810562967.7A CN109002875B (en) 2018-06-04 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
PCT/CN2018/100983 WO2019205357A1 (en) 2018-04-26 2018-08-17 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
US16/489,014 US20210326665A1 (en) 2018-04-26 2018-08-17 Two-dimensional barcode encryption method, two-dimensional barcode transmission system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810562967.7A CN109002875B (en) 2018-06-04 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium

Publications (2)

Publication Number Publication Date
CN109002875A true CN109002875A (en) 2018-12-14
CN109002875B CN109002875B (en) 2020-06-12

Family

ID=64573595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810562967.7A Active CN109002875B (en) 2018-04-26 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium

Country Status (1)

Country Link
CN (1) CN109002875B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012455A (en) * 2019-01-25 2019-07-12 阿里巴巴集团控股有限公司 A kind of management method of account information, device and electronic equipment
CN110175661A (en) * 2019-04-17 2019-08-27 深圳壹账通智能科技有限公司 The generation method and device in two dimensional code sharing path
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110956724A (en) * 2019-12-11 2020-04-03 浩云科技股份有限公司 Compatible method of multi-type card number verification equipment
CN112307495A (en) * 2020-10-26 2021-02-02 浪潮云信息技术股份公司 Electronic certificate sharing application model and method based on certificate two-dimensional code
CN112686072A (en) * 2020-12-28 2021-04-20 重庆医药高等专科学校 Control method for human resource equipment device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009104451A (en) * 2007-10-24 2009-05-14 A T Communications Co Ltd Logo-included two-dimensional code
CN102760242A (en) * 2012-05-16 2012-10-31 孟智平 Encoding and decoding method for three-dimensional codes and using method
CN103248480A (en) * 2012-02-10 2013-08-14 李宏光 Method and system for encrypting, saving and verifying account data
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN105374099A (en) * 2015-12-14 2016-03-02 讯美电子科技有限公司 Access control system with inlet and outlet dynamic opening passwords
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
JP2018011262A (en) * 2016-07-15 2018-01-18 レノボ・シンガポール・プライベート・リミテッド Protection method for personal information, electronic apparatus, and computer program
CN207424971U (en) * 2017-10-26 2018-05-29 厦门兴南洋智慧物联科技有限公司 A kind of intelligent access control system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009104451A (en) * 2007-10-24 2009-05-14 A T Communications Co Ltd Logo-included two-dimensional code
CN103248480A (en) * 2012-02-10 2013-08-14 李宏光 Method and system for encrypting, saving and verifying account data
CN102760242A (en) * 2012-05-16 2012-10-31 孟智平 Encoding and decoding method for three-dimensional codes and using method
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN105374099A (en) * 2015-12-14 2016-03-02 讯美电子科技有限公司 Access control system with inlet and outlet dynamic opening passwords
JP2018011262A (en) * 2016-07-15 2018-01-18 レノボ・シンガポール・プライベート・リミテッド Protection method for personal information, electronic apparatus, and computer program
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN207424971U (en) * 2017-10-26 2018-05-29 厦门兴南洋智慧物联科技有限公司 A kind of intelligent access control system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012455A (en) * 2019-01-25 2019-07-12 阿里巴巴集团控股有限公司 A kind of management method of account information, device and electronic equipment
CN110012455B (en) * 2019-01-25 2021-10-22 创新先进技术有限公司 Account information management method and device and electronic equipment
CN110175661A (en) * 2019-04-17 2019-08-27 深圳壹账通智能科技有限公司 The generation method and device in two dimensional code sharing path
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110956724A (en) * 2019-12-11 2020-04-03 浩云科技股份有限公司 Compatible method of multi-type card number verification equipment
CN112307495A (en) * 2020-10-26 2021-02-02 浪潮云信息技术股份公司 Electronic certificate sharing application model and method based on certificate two-dimensional code
CN112686072A (en) * 2020-12-28 2021-04-20 重庆医药高等专科学校 Control method for human resource equipment device

Also Published As

Publication number Publication date
CN109002875B (en) 2020-06-12

Similar Documents

Publication Publication Date Title
CN109002875A (en) Two dimensional code encryption method, two dimensional code Transmission system and storage medium
CN105050081B (en) Method, device and system for connecting network access device to wireless network access point
CN111464556B (en) Portable user terminal
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
CN102223364B (en) Method and system for accessing e-book data
CN101122942B (en) Data safe reading method and its safe storage device
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN104167029B (en) A kind of intelligent lock and its operating method
CN104363250B (en) A kind of method and system for equipment connection
US20160014112A1 (en) Wireless communication of a user identifier and encrypted time-sensitive data
CN103825871A (en) Authentication system and emission terminal, reception terminal and authority authentication method thereof
CN103873454A (en) Authentication method and equipment
CN103795798A (en) Mobile phone checking-in method
KR20100035712A (en) Method and apparatus for providing security in a radio frequency identification system
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
KR101329520B1 (en) Device for entering and location authentication of smart device using sequential wireless authentication and method for entering and location authentication using the same
CN101079657B (en) Wireless connection system and wireless connection method
CN104299300A (en) Unlocking and locking method for NFC based security intelligent lock system
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
CN101557588B (en) User certificate management and use method and mobile terminal thereof
CN106878280A (en) The method and apparatus of user authentication, the method and apparatus for obtaining user number information
WO2019205357A1 (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN107396363B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN105471920A (en) Identifying code processing method and device
KR101745482B1 (en) Communication method and apparatus in smart-home system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant