CN109344943A - A kind of method of embedded double two-dimensional barcode information secrecy - Google Patents
A kind of method of embedded double two-dimensional barcode information secrecy Download PDFInfo
- Publication number
- CN109344943A CN109344943A CN201811152956.8A CN201811152956A CN109344943A CN 109344943 A CN109344943 A CN 109344943A CN 201811152956 A CN201811152956 A CN 201811152956A CN 109344943 A CN109344943 A CN 109344943A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- code
- big
- dimensional
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Abstract
The invention discloses a kind of methods of embedded double two-dimensional barcode information secrecy, including barcode scanning client, big two dimensional code, small two dimensional code, the big two dimensional code is for carrying the content of text to be issued, the content of text is T, the small two dimensional code is for carrying verification information, the verification information is P, further comprising the steps of: A, coding and encryption;B, decoding and decryption.
Description
Technical field
The present invention relates to two-dimensional barcode information secrecy technology fields, and in particular to the embedded double two-dimensional barcode informations secrecy of one kind
Method.
Background technique
Planar bar code technology is born in late 1980s, with the development of technology, grinds in two-dimensional code symbol presentation technology
Study carefully aspect and have been developed that a variety of code systems, what wherein QR code obtained in recent years be most widely used, and (two dimensional code described herein refers in particular to
QR code), streets and lanes are seen everywhere.QR code has many advantages, most important of which is that it has powerful code capacity, Neng Goubiao
Show information abundant, and expansible, while it also has the characteristics of very strong error correcting capability and quick response, uses very
It is convenient.This has established the basis that it is widely used.
However, being widely used for two dimensional code also exposes some security risks.For example, many two dimensional codes on street corner are all
It may be the personation two dimensional code that the criminals such as cheat, hacker stick, once user will be implanted malice using mobile phone scanning
Program, or malice is caused the infringement such as to be deducted fees.And two dimensional code itself and do not have antifalsification, while be easy to print and palm off, energy
Enough wide-scale distributions, mix the spurious with the genuine.Therefore in recent years, the event encroached on by malice two dimensional code repeated, so far without fine
Countermeasure.This is obviously not suitable with the reality that two dimensional code is widely used, therefore is badly in need of a kind of effective technology and can distinguish normally
Two dimensional code and malice two dimensional code remind user from infringement.The present invention provides a kind of effective means, can enable two dimensional code publisher
It is implanted into verification information, and is encrypted, two dimensional code is avoided to be counterfeited, while to encryption under the premise of guaranteeing to reach design requirement
The usage experience of two dimensional code is almost without any additional effect.
Summary of the invention
The present invention is not high in order to solve the problems, such as existing two-dimension code safe, provides a kind of embedded double two-dimensional barcode information secrecy
Method, improve the safety of two dimensional code, by increase store information, further increase safety.
The present invention is achieved through the following technical solutions:
A kind of method of embedded double two-dimensional barcode information secrecy, including barcode scanning client, big two dimensional code, small two dimensional code, institute
It is T that big two dimensional code, which is stated, for carrying the content of text to be issued, the content of text, and the small two dimensional code is for carrying verifying
Information, the verification information is P, further comprising the steps of:
A, coding and encryption:
A1, error-correction level and the version number that big two dimensional code is determined according to the size of content of text T, and according to verification information P
Size determine error-correction level and the version number of small two dimensional code, and the content of text T and verification information P can be compiled completely
Code;
A2, setting Crypted password, the Crypted password is K, and the Crypted password K and verification information P is mixed into secret
Key, the code key are M, character length Wei ∣ M ∣ , Qie ∣ M ∣=∣ K ∣+∣ P ∣>∣ K ∣ of code key M;To increase password, increase
The number of combinations of password expands password space, improves safety;
A3, using 3DES algorithm, using M as code key, content of text T is encrypted, the encrypted content of text is
TM;Since verification information P is a part of code key M, accordingly even when verification information P information is exposed (can directly to sweep small two dimension
Code obtains) and can directly replicate, but it is reproducible be not meant to can be used, unless having cracked Encryption Algorithm and hybrid algorithm and having obtained
Otherwise code key M can not also forge available big two dimensional code, to guarantee that T information can not distort;
A4, by the content of text TMIt is encoded in the big two dimensional code, while the verification information P being encoded to described
In small two dimensional code;
A5, the inside that small two dimensional code described in the step A4 is arranged in the big two dimensional code, and formed embedded double
Two dimensional code;
B, decoding and decryption:
B1, embedded double two dimensional codes described in the barcode scanning client scan, the entire embedded double two dimensional codes mergings of general are used
View-finder, the verification information P of small two dimensional code is solved by the decoding program of the barcode scanning client, and inquires verification information P
Whether it is legal sequence, carries out step B2 if passing through, otherwise prompt wrong, and terminates program;
B2, the content of text T that big two dimensional code is solved by the decoding program of the barcode scanning clientM, and prompt user defeated
Enter Crypted password, after user has input correct Crypted password K, Crypted password K and verification information P be mixed to get code key M,
Finally by code key M to content of text TMIt is decrypted, and obtains final content of text T.
Further, in the step S1, the error-correction level of the big two dimensional code is the fouling resistance area of big two dimensional code
Greater than the fouling resistance area of small two dimensional code, and fouling resistance area can enable big two dimensional code have fouling resistance beyond the area of part
Power decode the big two dimensional code can in service life.
It is therefore desirable between the small two dimensional code version number of choosing comprehensively, error-correction level and the string length of verification information
Version number, error-correction level and the relationship for encoding size text of relationship and itself and big two dimensional code, select suitable error-correction level
And version number, the decoding reliability of large and small two dimensional code is improved as far as possible.
Further, the error-correction level of the small two dimensional code is greater than the error-correction level of the big two dimensional code.
Further, the small two dimensional code is located at the centre of the big two dimensional code.
Compared with prior art, the present invention having the following advantages and benefits:
1, a kind of method of embedded double two-dimensional barcode information secrecy of the present invention increases the number of combinations of password, and it is empty to expand password
Between, improve safety;
2, a kind of method of embedded double two-dimensional barcode informations secrecy of the present invention is convenient and efficient, high reliablity, highly-safe;
3, a kind of method storage informational capacity of embedded double two-dimensional barcode information secrecy of the present invention is big, can be used for a variety of necks
Domain.
Detailed description of the invention
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application
Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is coding and encryption flow schematic diagram;
Fig. 2 is to decode and decrypt flow diagram;
Fig. 3 is the example schematic of embedded double two dimensional codes.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below with reference to embodiment and attached drawing, to this
Invention is described in further detail, and exemplary embodiment of the invention and its explanation for explaining only the invention, are not made
For limitation of the invention.
Embodiment
A kind of method of embedded double two-dimensional barcode information secrecy, including barcode scanning client, big two dimensional code, small two dimensional code, institute
It is T that big two dimensional code, which is stated, for carrying the content of text to be issued, the content of text, and the small two dimensional code is for carrying verifying
Information, the verification information is P, further comprising the steps of:
As shown in Figure 1, A, coding and encryption:
A1, error-correction level and the version number that big two dimensional code is determined according to the size of content of text T, and according to verification information P
Size determine error-correction level and the version number of small two dimensional code, and the content of text T and verification information P can be compiled completely
Code;
A2, setting Crypted password, the Crypted password is K, and the Crypted password K and verification information P is mixed into secret
Key, the code key are M, character length Wei ∣ M ∣ , Qie ∣ M ∣=∣ K ∣+∣ P ∣>∣ K ∣ of code key M;To increase password, increase
The number of combinations of password expands password space, improves safety;
A3, using 3DES algorithm, using M as code key, content of text T is encrypted, the encrypted content of text is
TM;Since verification information P is a part of code key M, accordingly even when verification information P information is exposed (can directly to sweep small two dimension
Code obtains) and can directly replicate, but it is reproducible be not meant to can be used, unless having cracked Encryption Algorithm and hybrid algorithm and having obtained
Otherwise code key M can not also forge available big two dimensional code, to guarantee that T information can not distort;
A4, by the content of text TMIt is encoded in the big two dimensional code, while the verification information P being encoded to described
In small two dimensional code;
A5, the inside that small two dimensional code described in the step A4 is arranged in the big two dimensional code, and formed embedded double
Two dimensional code;
As shown in Fig. 2, B, decoding and decryption:
B1, embedded double two dimensional codes described in the barcode scanning client scan, the entire embedded double two dimensional codes mergings of general are used
View-finder, the verification information P of small two dimensional code is solved by the decoding program of the barcode scanning client, and inquires verification information P
Whether it is legal sequence, carries out step B2 if passing through, otherwise prompt wrong, and terminates program;
B2, the content of text T that big two dimensional code is solved by the decoding program of the barcode scanning clientM, and prompt user defeated
Enter Crypted password, after user has input correct Crypted password K, Crypted password K and verification information P be mixed to get code key M,
Finally by code key M to content of text TMIt is decrypted, and obtains final content of text T.
Further, in the step S1, the error-correction level of the big two dimensional code is the fouling resistance area of big two dimensional code
Greater than the fouling resistance area of small two dimensional code, and fouling resistance area can enable big two dimensional code have fouling resistance beyond the area of part
Power decode the big two dimensional code can in service life.
It is therefore desirable between the small two dimensional code version number of choosing comprehensively, error-correction level and the string length of verification information
Version number, error-correction level and the relationship for encoding size text of relationship and itself and big two dimensional code, select suitable error-correction level
And version number, the decoding reliability of large and small two dimensional code is improved as far as possible.
Further, the error-correction level of the small two dimensional code is greater than the error-correction level of the big two dimensional code.
Further, the small two dimensional code is located at the centre of the big two dimensional code.
As shown in figure 3, the generation method of double two dimensional codes embedded in the present embodiment are as follows:
S1, by text T: " latent Yue Cangcang, Yangze river and Huai river rushing.Summer quotient, which starts, to open, natural, graceful and poised Chinese Tang.Culture is big at nationality is prosperous.Shen
The more scholars of shen, hereby upper ancient term for country school of mounting." be encoded in big two dimensional code, the version number of big two dimensional code is selected as 13, error-correction level H;Verifying letter
Breath P " ABCDEF123456 " is encoded in small two dimensional code, and small two dimensional code version number is selected as 2, error-correction level H;
S2, Crypted password K are set as " abc123 ", and mixed code key M is " ABaCDbEFc121342563 ";Use 3DES
Algorithm for encryption T, obtains TM;
S3, by TMCoding generates big two dimensional code, and P coding generates small two dimensional code;
S4, small two dimensional code area be set as the 1/25 of big two dimensional code, be added among big two dimensional code, finally obtain in Fig. 3
Embedded double two dimensional codes.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (4)
1. a kind of method of embedded double two-dimensional barcode information secrecy, including barcode scanning client, which is characterized in that further include big two dimension
Code, small two dimensional code, the big two dimensional code are T, the small two dimension for carrying the content of text to be issued, the content of text
For code for carrying verification information, the verification information is P, further comprising the steps of:
A, coding and encryption:
A1, error-correction level and the version number that big two dimensional code is determined according to the size of content of text T, and according to the big of verification information P
The error-correction level of the small small two dimensional code of determination and version number, and the content of text T and verification information P can be encoded completely;
A2, Crypted password is set, the Crypted password is K, and the Crypted password K and verification information P are mixed into code key, institute
Stating code key is M, character length Wei ∣ M ∣ , Qie ∣ M ∣=∣ K ∣+∣ P ∣>∣ K ∣ of code key M;
A3, using 3DES algorithm, using M as code key, content of text T is encrypted, the encrypted content of text be TM;
A4, by the content of text TMIt is encoded in the big two dimensional code, while the verification information P being encoded to described small by two
It ties up in code;
A5, the inside that small two dimensional code described in the step A4 is arranged in the big two dimensional code, and form embedded double two dimensions
Code;
B, decoding and decryption:
B1, using embedded double two dimensional codes described in the barcode scanning client scan, entire embedded double two dimensional codes mergings are found a view
Frame, the verification information P of small two dimensional code is solved by the decoding program of the barcode scanning client, and whether inquires verification information P
For legal sequence, step B2 is carried out if passing through, otherwise prompts wrong, and terminates program;
B2, the content of text T that big two dimensional code is solved by the decoding program of the barcode scanning clientM, and user is prompted to input encryption
Crypted password K and verification information P are mixed to get code key M, finally led to by password after user has input correct Crypted password K
Code key M is crossed to content of text TMIt is decrypted, and obtains final content of text T.
2. the method for the embedded double two-dimensional barcode information secrecy of one kind according to claim 1, it is characterised in that: in the step
In rapid S1, the error-correction level of the big two dimensional code is that the fouling resistance area of big two dimensional code is greater than the fouling resistance area of small two dimensional code,
And fouling resistance area can make big two dimensional code have fouling resistance ability beyond the area of part, make the big two dimensional code using week
It can be decoded in phase.
3. the method for the embedded double two-dimensional barcode information secrecy of one kind according to claim 1, it is characterised in that: described small by two
The error-correction level for tieing up code is greater than the error-correction level of the big two dimensional code.
4. the method for the embedded double two-dimensional barcode information secrecy of one kind according to claim 1, it is characterised in that: described small by two
Code bit is tieed up in the centre of the big two dimensional code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811152956.8A CN109344943A (en) | 2018-09-30 | 2018-09-30 | A kind of method of embedded double two-dimensional barcode information secrecy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811152956.8A CN109344943A (en) | 2018-09-30 | 2018-09-30 | A kind of method of embedded double two-dimensional barcode information secrecy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109344943A true CN109344943A (en) | 2019-02-15 |
Family
ID=65308223
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811152956.8A Pending CN109344943A (en) | 2018-09-30 | 2018-09-30 | A kind of method of embedded double two-dimensional barcode information secrecy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109344943A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104994070A (en) * | 2015-05-27 | 2015-10-21 | 福州惟实信息科技有限公司 | Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code |
CN105706107A (en) * | 2013-11-07 | 2016-06-22 | 斯坎特拉斯特股份有限公司 | Two dimensional barcode and method of authentication of such barcode |
CN105763525A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Identification code generation method, device, identification code decryption method and device |
CN106599964A (en) * | 2016-11-24 | 2017-04-26 | 中国银联股份有限公司 | Two-dimensional code generation and verification method and device |
CN107451643A (en) * | 2017-08-15 | 2017-12-08 | 北京航空航天大学 | Generation, recognition methods and the device of dynamic two-dimension code |
CN107862364A (en) * | 2017-11-08 | 2018-03-30 | 王少龙 | The generation method and system for the individual identification mark that a kind of plain code is combined with password |
CN109447203A (en) * | 2018-11-07 | 2019-03-08 | 广州凯晟信息科技有限公司 | Two dimensional code encryption and decryption method, device, Cloud Server and system |
-
2018
- 2018-09-30 CN CN201811152956.8A patent/CN109344943A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105706107A (en) * | 2013-11-07 | 2016-06-22 | 斯坎特拉斯特股份有限公司 | Two dimensional barcode and method of authentication of such barcode |
CN105763525A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Identification code generation method, device, identification code decryption method and device |
CN104994070A (en) * | 2015-05-27 | 2015-10-21 | 福州惟实信息科技有限公司 | Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code |
CN106599964A (en) * | 2016-11-24 | 2017-04-26 | 中国银联股份有限公司 | Two-dimensional code generation and verification method and device |
CN107451643A (en) * | 2017-08-15 | 2017-12-08 | 北京航空航天大学 | Generation, recognition methods and the device of dynamic two-dimension code |
CN107862364A (en) * | 2017-11-08 | 2018-03-30 | 王少龙 | The generation method and system for the individual identification mark that a kind of plain code is combined with password |
CN109447203A (en) * | 2018-11-07 | 2019-03-08 | 广州凯晟信息科技有限公司 | Two dimensional code encryption and decryption method, device, Cloud Server and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105825257B (en) | Information hiding and hiding information extracting method and system based on two-dimensional bar code | |
CN104268610B (en) | One kind classification QR code generating methods and read method | |
CN103605950B (en) | Method and system for hiding signature in credible two-dimensional code | |
CN106100850B (en) | Intelligent and safe chip signing messages transmission method and system based on two dimensional code | |
CN105117635B (en) | A kind of safety system and method for local data | |
CN103415007B (en) | A kind of mobile phone two-dimension code safe handling method based on Information hiding | |
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
CN103049777A (en) | Security application method for two-dimension code and encoding/decoding system | |
CN102855161B (en) | The data interlacing scheme of external memory for secure microcontroller | |
CN109766979A (en) | Two-dimensional code generation method, verification method and device | |
CN101086761A (en) | Efficient information lattice image and its generation and decoding method | |
CN108400982A (en) | A kind of embedded device password method for retrieving | |
CN110391914A (en) | A kind of file acquisition method and equipment, two-dimensional code generation method based on two dimensional code | |
CN102073977A (en) | Methods and equipment for generating and authenticating digital signatures and digital signature system | |
Karthikeyan et al. | Enhanced security in steganography using encryption and quick response code | |
CN107169395A (en) | A kind of safer QR codes generation and read method | |
EP2910042B1 (en) | Secure information transfer via bar codes | |
CN104680215A (en) | Making method and decoding method for two-dimensional code graph | |
CN105577376A (en) | Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device | |
CN110516775A (en) | Based on QR code user secret information hidden method | |
CN109344943A (en) | A kind of method of embedded double two-dimensional barcode information secrecy | |
Roy et al. | A text based steganography technique with Indian root | |
CN102222195A (en) | E-book reading method and system | |
Thamer et al. | A new method for ciphering a message using QR code | |
CN105450591A (en) | An information verification method and system, clients and a server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190215 |