CN109450619A - A kind of two-dimension code safe means of defence and system - Google Patents

A kind of two-dimension code safe means of defence and system Download PDF

Info

Publication number
CN109450619A
CN109450619A CN201811165012.4A CN201811165012A CN109450619A CN 109450619 A CN109450619 A CN 109450619A CN 201811165012 A CN201811165012 A CN 201811165012A CN 109450619 A CN109450619 A CN 109450619A
Authority
CN
China
Prior art keywords
dimensional code
code
value
safety
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811165012.4A
Other languages
Chinese (zh)
Other versions
CN109450619B (en
Inventor
薛磊
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201811165012.4A priority Critical patent/CN109450619B/en
Publication of CN109450619A publication Critical patent/CN109450619A/en
Application granted granted Critical
Publication of CN109450619B publication Critical patent/CN109450619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to network securitys, it is desirable to provide a kind of two-dimension code safe means of defence and system.This kind of two-dimension code safe means of defence and system, are able to achieve: 1) to the generation of two dimensional code using the anti-fake certificate encrypted safely;2) in two dimensional code use process, security protection: L0 security level Scanning Detction, L1 security level Scanning Detction, L2 security level Scanning Detction, L3 security level Scanning Detction is carried out using following step.The two dimensional code that the present invention can be generated for different scenes different industries different modes provides the multi-level safety of various dimensions corresponding means, more convenient;And the present invention can carry out real-time security detection for large-scale two dimensional code.

Description

A kind of two-dimension code safe means of defence and system
Technical field
The present invention relates to network safety filed, in particular to a kind of two-dimension code safe means of defence and system.
Background technique
Recently as the development of mobile Internet, this popular coding mode super on the mobile apparatus of two dimensional code, with The advantages that data storage capacity is big, highly-safe, damage resistance is strong, at low cost, is widely used in all trades and professions.But conduct The two dimensional code of information transport vehicle is also faced with stern challenge in the safety used.Two-dimension code safe thing in recent years The safety accidents such as part take place frequently, and cause heavy economic losses to society, seriously threaten the safety of cyberspace.So for extensive Two-dimension code safe detection technique becomes the preferred method for preventing two-dimension code safe accident, has higher researching value.
All respective program is internally integrated existing safety detection under normal circumstances, is unfavorable for promoting and be used, for The detection of two dimensional code cannot be treated with a certain discrimination neatly according to usage scenario.There is no unified safety certification side for certification Formula and authentication center.If a security centre can be done to the two dimensional code of scanning, the authentication center of the certificate of similar https, then Progress security protection can be promoted to the extensive various dimensions situation of two dimensional code under very big situation.
Summary of the invention
It is a primary object of the present invention to overcome deficiency in the prior art, provide in a kind of daily two dimensional code use process The method and system of safety monitoring and protection.In order to solve the above technical problems, solution of the invention is:
A kind of safety protecting method in two dimensional code use process is provided, specifically include the following steps:
Step (1): L0 security level Scanning Detction:
Whether detection two dimensional code has safe-guarding and anti-counterfeiting mark, and (safe-guarding and anti-counterfeiting mark refers to that two dimensional code when generating, is added two Tie up the anti-fake parameter in code):
If two dimensional code has, safe-guarding and anti-counterfeiting is indicated and certification passes through, if X1Refer to anti-fake certificate marker gene, then X1Value be equal to 100;If the safety of two dimensional code is divided into C, C=X1=100, L0 security level is exported, that is, indicates that the two dimensional code is safe, end For the detection of the two dimensional code;
If two dimensional code does not have safe-guarding and anti-counterfeiting to indicate or certification does not pass through, X1Equal to 0, C=X1=0, continue subsequent detection Step;
Certification is taken out the anti-fake parameter on two dimensional code by referring to, i.e. appid and signature are inquired according to appid The specific secret key key that user is arranged in this system, then by calculating MD5, (appid+key+ is except in the two dimensional code of anti-fake mark Hold) it is whether equal with signature, pass through if equal;
Step (2): L1 security level Scanning Detction:
QR code content code is detected, whether scanning includes malicious script, dark chain and QR code content website url Safe condition in security vault;
Secure data in the security vault includes the scan data of security engine, tripartite manufacturer security vault data and user The secure data of feedback;
If C=X11X2, X2Refer to certification safety coefficient, X2Value pass through it is true with the scanning result of QR code content code It is fixed, and 0≤X2≤100;
If the value of C be not less than 100, export L1 security level, that is, indicate the two dimensional code be it is safe, terminate for this two Tie up the detection of code;
If the value of C continues following detection step less than 100;
Step (3): L2 security level Scanning Detction:
Contrasting detection with security vault is carried out to QR code content, the ground for being included in the two dimensional code is inquired in security vault The safe condition information that the history secure data of location and user feed back the domain name or ip;
If C=X11X22X3, X3Refer to history safety message packing factor, X3Value by contrasting detection result it is true It is fixed, and 0≤X3≤100;
If the value of C is not less than 100, exporting L2 security level and safety recommendation, (safety recommendation refers to the two dimensional code at this When system detects in the recent period, safety and the user feedback of the percent Y web portal security under L2 security level), that is, indicate this two Dimension code is safe, detection of the end for the two dimensional code;
If the value of C continues following detection step less than 100;
Step (4): L3 security level Scanning Detction:
(using security engine) is measured in real time the content of two dimensional code;
If C=X11X22X33X4, X4Refer to that (security engine) sandbox executes the knot for accessing the website and scanning feedback Fruit, X4Value determined by real-time detection result, and 0≤X4≤100;
If the value of C is not less than 100, exporting L3 security level and safety alarm, (safety alarm refers to the two dimensional code at this Website real-time detection safety), that is, indicate that the two dimensional code is safe;
Divide the score value of C if the value of C less than 100, provides two-dimension code safe and prompt risky;
Wherein, λ123=1, and λ123=2:1:7.
In the present invention, in the step (2), safety coefficient X is authenticated2Value, by being swept with QR code content code It retouches result to determine, X2Initial value 100 divides, X2Specific value method of determination are as follows:
If the link information that scanning two dimension jumps contains malicious script, X2=0 point, and return to high-risk safety alarm: Contain malicious script;
If the link information that scanning two dimension jumps contains dark chain, each dark chain X2Subtract 20 point, and the police that endangers in returning It accuses: including dark chain.
In the present invention, in the step (2), QR code content code is detected, if the QR code content website url is pacifying Safe condition in full library is currently danger, and can return and prompt according to degree of danger: detecting this website in the present system has danger Danger.
In the present invention, in the step (3), history safety message packing factor X3Value, pass through contrasting detection result It determines, specifically:
It is calculated according to the time of degree of danger and generation inside historical record, X3Initial value 100 divides, and often finds primary Dangerous historical record often has user feedback website danger, then deduction S, S=(1/D) × L × 10;
Wherein, the D is dangerous record time or user feedback time gap current time number of days;The L is danger Degree (degree of danger of historical record or the degree of danger of user feedback), safe L=0, low danger L=1, middle danger L=2 are high Endanger L=3.
In the present invention, in the step (4), if C=X11X22X33X4, refer to that (security engine) sandbox executes It accesses the website and scans the result X of feedback4Value, X4Value by real-time detection result determine, specifically:
X4Initial value is 100 points, if one malicious script of discovery, X4Value be directly 0 and to feed back the two dimensional code website real-time Detection contains malicious script;One dark chain of every discovery, then X4Deduction 20, and X4At most reduce to 0.
In the present invention, in the step (2), online api calls safety identification interface, and (i.e. tripartite's caller is in scanning two QR code content is transmitted to this system detection two-dimension code safe situation when dimension digital content is also not carried out access), carry out L1 Security level Scanning Detction.
In the present invention, the secure data in the security vault is by the way of user's driving, according to the two of scanning input The information of dimension code information and feedback can be corrected automatically.
A kind of storage equipment is provided, wherein being stored with a plurality of instruction, described instruction is suitable for being loaded and being executed by processor:
One, to the generation of two dimensional code using the anti-fake certificate encrypted safely;
Two, the safety protecting method in above-mentioned two dimensional code use process is realized.
A kind of two-dimension code safe guard system, including processor are provided, each instruction is adapted for carrying out;And storage equipment, it fits In storing a plurality of instruction, described instruction is suitable for being loaded and being executed by processor:
One, to the generation of two dimensional code using the anti-fake certificate encrypted safely;
Two, the safety protecting method in above-mentioned two dimensional code use process is realized.
In the present invention, following any schemes can be selected using the anti-fake certificate encrypted safely to the generation of two dimensional code It realizes;
1) whole encryption packaging is carried out to the original contents of two dimensional code, and stamps anti-false sign in packaging;
Anti-false sign can be the anti-false sign of only this system understanding, can also be with tripartite's voluntarily mark, while will identify Mode uploads this system;There are many mark scheme, and the id of most basic two dimensional code can be used, and (id or tripartite in the present system is voluntarily The id of design)+password+base64 (content)+timestamp, as anti-false sign, can also be used other advanced encryption algorithms come It realizes;
2) adding anti-fake parameter behind QR code content, (implementation of similar https, forges into certification for this system Center to carry out safety identification to two dimensional code online).
The principle of the present invention: the secure data accumulation by this system and the sandbox detection (two dimension to QR code content It is the mode that sandbox operation be isolated and detects that code secure context is most like with the present invention, rough flow for after scanning input without In next step, but scans content is sent to run in isolation sandbox and is detected, determine how to dispose according to result feedback) to two dimensional code Carry out safety detection.
Compared with prior art, the beneficial effects of the present invention are:
1, the present invention can for different scenes different industries different modes generate two dimensional code, provide various dimensions at many levels The corresponding means of safety, it is more convenient;And the present invention can carry out real-time security detection for large-scale two dimensional code.
2, the present invention is based on current web scanning techniques, while being compatible with accumulation and the user feedback number of self scanning recognition According to protecting two dimensional code to pacify using optimal security solution under different scenes different industries by the way of policy follow Entirely.
3, the present invention provides interface and develops popularization to tripartite manufacturer, and access is convenient, can facilitate popularization and use.
4, the present invention can carry out sustainable various dimensions upgrading to security vault.
5, two-dimension code safe authentication center is established through the invention, and specification two dimensional code uses.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
Firstly the need of explanation, the present invention is a kind of application of computer technology.During realization of the invention, meeting It is related to the application of multiple software function modules.It is applicant's understanding that such as to read over application documents, accurate understanding of the invention After realization principle and goal of the invention, in the case where combining existing well-known technique, those skilled in the art can use completely Its software programming technical ability grasped realizes the present invention.Category this scope that all the present patent application files refer to, applicant be not another One enumerates.
Present invention is further described in detail with specific embodiment with reference to the accompanying drawing:
Be divided into two kinds of renovation schemes on big range for two-dimension code safe: first is the generation for two dimensional code On do corresponding safe handling;Second is that security protection scanning is carried out in the use process for two dimensional code.Below for above two Point is discussed respectively:
One, for the anti-fake certificate encrypted safely can be used when the generation of two dimensional code, there are two types of schemes for choosing herein It selects.
Scheme 1: whole encryption packaging is carried out to the original contents of two dimensional code, it is anti-that only this system understanding is stamped in packaging Voluntarily identification method is simultaneously uploaded this system, the convenient detection to two dimensional code simultaneously by mark by puppet mark or tripartite.What is used beats There are many mark scheme, and id (id of id or tripartite's designed, designed in system)+password+base64 of most basic two dimensional code can be used Other advanced encryption algorithms can also be used as anti-false sign to realize in (content)+timestamp.
Scheme 2: identifying QR code content followed by upper some anti-fake parameters, and the implementation of similar https incite somebody to action this System forges into authentication center to carry out safety identification to two dimensional code online.
Two, the Scanning Detction processing of two dimensional code.
1, Scanning Detction is divided into following grade (advanced identification can be defaulted comprising rudimentary identification):
L0: basic detection is carried out for anti-fake mark.Suitable for commonly detecting, the two-dimension code safe for having anti-false sign is examined It is high and fast to look into coefficient, does not work for the two dimensional code of not anti-false sign.
L1: the other detection of code level is carried out just for the identification content of two dimensional code, whether scanning includes malicious script, dark chain Deng and amount very big place of less demanding suitable for security level.Quotient's voluntarily embedded code can be used herein, or online Api calls this system identification interface safely.
L2: carrying out the comparative certification of security vault for QR code content, including two dimensional code history secure data, website url, The secure data of website domain name, website ip, the accumulation such as blacklist white list compares identification.Secure data includes security engine herein Scan data, tripartite manufacturer security vault data, secure data of user feedback etc. carries out comprehensive analysis identification, while providing peace Congruent grade and suggestion.This can be used for the two dimensional code detection of ordinary circumstance, be suitable for majority of case.
For the explanation of the maintenance work of secure data: secure data main source three: this system security sweep engine Scanning;The cooperation of tripartite security firm;Field feedback audit.By the way of user's driving, according to scanning input The information of two-dimensional barcode information and feedback can be corrected automatically.
L3: being measured in real time for the content of two dimensional code, i.e., is carried out using security engine to QR code content online real When Scanning Detction, while will test result as reference data and giving safety alarm.This scheme user requires pole to safety coefficient High and relatively fewer usage amount situation.
2, as shown in Figure 1, specific scanning step is as follows:
Step (1): L0 security level Scanning Detction:
Whether detection two dimensional code has safe-guarding and anti-counterfeiting mark, and safe-guarding and anti-counterfeiting mark refers to: the two dimensional code of user is raw in this system The generation of this system interface is transferred at or by api, anti-counterfeiting label can be added inside the parameter of two dimensional code when generating The parameter shown.
Such as: http://www.example.com/index.html? param=123&appid=P1&signature =P2, wherein p1 and p2 is exactly safe-guarding and anti-counterfeiting mark;P1 is account of the client in this system application, and signature is to pass through Appid+ user stay in the specific secret key of system+except anti-fake mark url content MD5 value.This example is http: // Www.example.com/index.html? param=123.
Basis detection for safe-guarding and anti-counterfeiting mark is specific as follows:
If two dimensional code has, safe-guarding and anti-counterfeiting is indicated and certification passes through, if X1Refer to anti-fake certificate marker gene, then X1Value be equal to 100;If the safety of two dimensional code is divided into C, C=X1=100, L0 security level is exported, that is, indicates that the two dimensional code is safe, end For the detection of the two dimensional code.
Here certification is taken out the anti-fake parameter on two dimensional code by referring to, i.e. appid and signature, according to The specific secret key key that appid inquiry user is arranged in this system, then by calculating MD5, (appid+key+ is except anti-fake mark QR code content) it is whether equal with signature, pass through if equal.
If two dimensional code does not have safe-guarding and anti-counterfeiting mark, X1Equal to 0, C=X1=0, continue following detection step.
Step (2): L1 security level Scanning Detction:
QR code content code is detected, whether scanning includes malicious script, dark chain and QR code content website url at this Safe condition in system library;
If C=X11X2, X2Refer to certification safety coefficient, X2Value and QR code content code scanning result relationship Are as follows: X2Initial value 100 divides, if containing malicious script, direct C=0 divides and returns to high-risk safety alarm: containing malicious script; In X if containing dark chain2Each dark chain subtracts 20 point on the basis of=100 points, and warning of endangering in statement in prompt: comprising dark Chain;If url is currently danger in security vault, returns and prompt according to degree of danger: detecting this website in the present system It is dangerous.
If the value of C be not less than 100, export L1 security level, that is, indicate the two dimensional code be it is safe, terminate for this two Tie up the detection of code.
If the value of C continues following detection step less than 100.
Step (3): L2 security level Scanning Detction:
Contrasting detection with security vault is carried out to QR code content.
If C=X11X22X3, X3Refer to history safety message packing factor, according to the degree of danger inside historical record It is calculated with the time of generation, X3Initial value is 100,.Often find a subsidiary risk historical record then deduction S, the score value meter of deduction S Calculating rule is S=(1/D) × L × 10;;Wherein, D is the time number of days of dangerous recording distance today, and L is degree of danger, safe L =0, low danger L=1, middle danger L=2, high-risk L=3.Often there are user feedback website danger then deduction N, the score value of deduction N Computation rule is N=L × 1/100+L × 2/100+ ...+L × 99/100+L;Wherein, L is the degree of danger of user feedback, safety L=0, low danger L=1, middle danger L=2, high-risk L=3.X3Minimum 0 point, highest 100 is divided.
If the value of C is not less than 100, exports L2 security level and the two dimensional code and detected in the recent period in this system in L2 safety etc. The lower safety of grade and the user feedback of the percent Y web portal security, that is, indicate the two dimensional code be it is safe, terminate to be directed to the two dimension The detection of code.
If the value of C continues following detection step less than 100.
Step (4): L3 security level Scanning Detction:
It is measured in real time using content of the security engine to two dimensional code.
If C=X11X22X33X4, X4Refer to user security feedback factor, X4Value and real-time detection result relationship Are as follows: X4Initial value is 100 points, if one malicious script of discovery, the value of C are directly 0 and feed back the two dimensional code website real-time detection Contain malicious script;One dark chain of every discovery, then X4Deduction 20, at most reduces to 0.
If the value of C is not less than 100, L3 security level and the two dimensional code are exported in this website real-time detection safety, i.e. table Show that the two dimensional code is safe;
If the value of C less than 100, provides score value and prompts risky;
Wherein, λ123=1, and λ123=2:1:7.
3, there is following explanation with criterion for comprehensively considering for security level:
Whether the impact factor of two dimensional code value-at-risk has 4, has respectively: having anti-fake certificate mark, QR code content current Safe condition, QR code content history safe condition (security sweep and tripartite manufacturer library), field feedback.To this 4 because Son carries out degree of safety marking respectively, then calculates weighted sum, obtains the final value-at-risk in website, formula is as follows:
C=X11X22X33X4
Wherein C is final safety, and using bonus point system, 100 points the above are safety.Wherein X1Whether refer to has anti-counterfeiting label Will has and authenticates by being exactly 100 points, is not exactly 0 point.X2Refer to the safe condition score value of the two dimensional code in current library.X3It is Refer to two dimensional code history safety records score value, X4Refer to the safety value of user feedback.λ123=1 specific gravity is 2:1:7.
Finally it should be noted that the above enumerated are only specific embodiments of the present invention.It is clear that the invention is not restricted to Above embodiments can also have many variations.Those skilled in the art can directly lead from present disclosure Out or all deformations for associating, it is considered as protection scope of the present invention.

Claims (10)

1. the safety protecting method in a kind of two dimensional code use process, which is characterized in that specifically include the following steps:
Step (1): L0 security level Scanning Detction:
Whether detection two dimensional code has safe-guarding and anti-counterfeiting mark:
If two dimensional code has, safe-guarding and anti-counterfeiting is indicated and certification passes through, if X1Refer to anti-fake certificate marker gene, then X1Value be equal to 100; If the safety of two dimensional code is divided into C, C=X1=100, export L0 security level, that is, indicate the two dimensional code be it is safe, terminate to be directed to The detection of the two dimensional code;
If two dimensional code does not have safe-guarding and anti-counterfeiting to indicate or certification does not pass through, X1Equal to 0, C=X1=0, continue subsequent detection step Suddenly;
Step (2): L1 security level Scanning Detction:
QR code content code is detected, whether scanning is being pacified comprising malicious script, dark chain and the QR code content website url Safe condition in full library;
Secure data in the security vault includes the scan data of security engine, tripartite manufacturer security vault data and user feedback Secure data;
If C=X11X2, X2Refer to certification safety coefficient, X2Value by being determined with the scanning result of QR code content code, and 0≤X2≤100;
If the value of C be not less than 100, export L1 security level, that is, indicate the two dimensional code be it is safe, terminate be directed to the two dimensional code Detection;
If the value of C continues following detection step less than 100;
Step (3): L2 security level Scanning Detction:
Contrasting detection with security vault is carried out to QR code content, the address for being included in the two dimensional code is inquired in security vault The safe condition information that history secure data and user feed back the domain name or ip;
If C=X11X22X3, X3Refer to history safety message packing factor, X3Value determined by contrasting detection result, and 0 ≤X3≤100;
If the value of C is not less than 100, L2 security level and safety recommendation are exported, that is, indicates that the two dimensional code is safe, end needle Detection to the two dimensional code;
If the value of C continues following detection step less than 100;
Step (4): L3 security level Scanning Detction:
The content of two dimensional code is measured in real time;
If C=X11X22X33X4, X4Refer to sandbox execute access the website and scan feedback as a result, X4Value pass through reality When testing result determine, and 0≤X4≤100;
If the value of C is not less than 100, L3 security level and safety alarm are exported, that is, indicates that the two dimensional code is safe;
Divide the score value of C if the value of C less than 100, provides two-dimension code safe and prompt risky;
Wherein, λ123=1, and λ123=2:1:7.
2. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the step Suddenly in (2), safety coefficient X is authenticated2Value, by being determined with the scanning result of QR code content code, X2Initial value 100 divides, X2 Specific value method of determination are as follows:
If the link information that scanning two dimension jumps contains malicious script, X2=0 point, and return to high-risk safety alarm: containing evil Meaning script;
If the link information that scanning two dimension jumps contains dark chain, each dark chain X2Subtract 20 point, and warning of endangering in returning: packet Containing dark chain.
3. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the step Suddenly in (2), QR code content code is detected, if safe condition of the QR code content website url in security vault is currently danger Danger, can return and prompt according to degree of danger: it is dangerous to detect this website in the present system.
4. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the step Suddenly in (3), history safety message packing factor X3Value, by contrasting detection result determine, specifically:
It is calculated according to the time of degree of danger and generation inside historical record, X3Initial value 100 divides, and often finds a subsidiary risk Historical record often has user feedback website danger, then deduction S, S=(1/D) × L × 10;
Wherein, the D is dangerous record time or user feedback time gap current time number of days;The L is degree of danger, Safe L=0, low danger L=1, middle danger L=2, high-risk L=3.
5. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the step Suddenly in (4), if C=X11X22X33X4, refer to that sandbox executes the result X for accessing the website and scanning feedback4Value, X4's Value is determining by real-time detection result, specifically:
X4Initial value is 100 points, if one malicious script of discovery, X4Value be directly 0 and feed back the two dimensional code website real-time detection Contain malicious script;One dark chain of every discovery, then X4Deduction 20, and X4At most reduce to 0.
6. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the step Suddenly in (2), online api calls safety identification interface, carries out L1 security level Scanning Detction.
7. the safety protecting method in a kind of two dimensional code use process according to claim 1, which is characterized in that the peace Secure data in full library, can be automatic according to the information of the two-dimensional barcode information of scanning input and feedback by the way of user's driving Amendment.
8. a kind of storage equipment, wherein being stored with a plurality of instruction, described instruction is suitable for being loaded and being executed by processor:
One, to the generation of two dimensional code using the anti-fake certificate encrypted safely;
Two, the safety protecting method in two dimensional code use process described in claim 1 to 7 any one is realized.
9. a kind of two-dimension code safe guard system, including processor, are adapted for carrying out each instruction;And storage equipment, it is suitable for storage A plurality of instruction, described instruction are suitable for being loaded and being executed by processor:
One, to the generation of two dimensional code using the anti-fake certificate encrypted safely;
Two, the safety protecting method in two dimensional code use process described in claim 1 to 7 any one is realized.
10. a kind of two-dimension code safe guard system according to claim 9, which is characterized in that adopted to the generation of two dimensional code The anti-fake certificate encrypted with safety can select following any schemes to realize;
1) whole encryption packaging is carried out to the original contents of two dimensional code, and stamps anti-false sign in packaging;
2) add anti-fake parameter behind QR code content.
CN201811165012.4A 2018-10-07 2018-10-07 Two-dimensional code safety protection method and system Active CN109450619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811165012.4A CN109450619B (en) 2018-10-07 2018-10-07 Two-dimensional code safety protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811165012.4A CN109450619B (en) 2018-10-07 2018-10-07 Two-dimensional code safety protection method and system

Publications (2)

Publication Number Publication Date
CN109450619A true CN109450619A (en) 2019-03-08
CN109450619B CN109450619B (en) 2022-08-19

Family

ID=65544772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811165012.4A Active CN109450619B (en) 2018-10-07 2018-10-07 Two-dimensional code safety protection method and system

Country Status (1)

Country Link
CN (1) CN109450619B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110689337A (en) * 2019-08-20 2020-01-14 哈尔滨学院 Intelligent prompting method and system based on QR Code two-dimensional Code
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
CN112448881A (en) * 2019-09-03 2021-03-05 阿里巴巴集团控股有限公司 Anti-counterfeiting method and device for electronic mail and anti-counterfeiting method and device for communication message
CN113903256A (en) * 2021-09-27 2022-01-07 国网河南省电力公司长葛市供电公司 Pole number plate with two-dimensional identification data information for power transmission and distribution line
CN115002685A (en) * 2022-07-14 2022-09-02 深圳市利诺威科技有限公司 Method and system for transmitting image data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN104766166A (en) * 2015-03-27 2015-07-08 杭州安恒信息技术有限公司 Grade-protection-oriented information system security compliance check method
CN105718792A (en) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 Sandbox based two-dimensional code detection method and system
CN205722587U (en) * 2016-06-15 2016-11-23 山东泰宝防伪技术产品有限公司 2 D code information safety line coloured layering paper anti-counterfeiting mark
CN106599759A (en) * 2016-12-22 2017-04-26 广东小天才科技有限公司 Terminal information processing method and device
CN107423793A (en) * 2017-04-28 2017-12-01 南京邮电大学 A kind of Quick Response Code generation identification technology of new type of safe

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN104766166A (en) * 2015-03-27 2015-07-08 杭州安恒信息技术有限公司 Grade-protection-oriented information system security compliance check method
CN105718792A (en) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 Sandbox based two-dimensional code detection method and system
CN205722587U (en) * 2016-06-15 2016-11-23 山东泰宝防伪技术产品有限公司 2 D code information safety line coloured layering paper anti-counterfeiting mark
CN106599759A (en) * 2016-12-22 2017-04-26 广东小天才科技有限公司 Terminal information processing method and device
CN107423793A (en) * 2017-04-28 2017-12-01 南京邮电大学 A kind of Quick Response Code generation identification technology of new type of safe

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110689337A (en) * 2019-08-20 2020-01-14 哈尔滨学院 Intelligent prompting method and system based on QR Code two-dimensional Code
CN112448881A (en) * 2019-09-03 2021-03-05 阿里巴巴集团控股有限公司 Anti-counterfeiting method and device for electronic mail and anti-counterfeiting method and device for communication message
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
CN113903256A (en) * 2021-09-27 2022-01-07 国网河南省电力公司长葛市供电公司 Pole number plate with two-dimensional identification data information for power transmission and distribution line
CN115002685A (en) * 2022-07-14 2022-09-02 深圳市利诺威科技有限公司 Method and system for transmitting image data

Also Published As

Publication number Publication date
CN109450619B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN109450619A (en) A kind of two-dimension code safe means of defence and system
Aburrous et al. Intelligent phishing detection system for e-banking using fuzzy data mining
CN104620225B (en) Method and system for server security checking
US20070198420A1 (en) Method and a system for outbound content security in computer networks
CN102546641B (en) Method and system for carrying out accurate risk detection in application security system
CN116861446A (en) Data security assessment method and system
CN111083107A (en) Block chain-based network security vulnerability collection processing method
US20240015182A1 (en) Device for providing protective service against email security-based zero-day url attack and method for operating same
CN104580092A (en) Method and device for conducting security detection on network page
Karuparthi et al. Enhanced approach to detection of SQL injection attack
CN115189937A (en) Security protection method and device for client data
KR101464736B1 (en) Security Assurance Management System and Web Page Monitoring Method
CN101741645A (en) Method, device and system for detecting storage-type cross-site scripting attack and attack detector
Grossman Whitehat website security statistics report
CN116248406B (en) Information security storage method and information security device thereof
JP2017509072A (en) Security evaluation system and method
CN114861180B (en) Application program security detection method and device
US20240163299A1 (en) Email security diagnosis device based on quantitative analysis of threat elements, and operation method thereof
CN115396184A (en) Mail detection method and device and nonvolatile storage medium
CN115134169A (en) Block chain data management method and system
CN114124453B (en) Processing method and device of network security information, electronic equipment and storage medium
EP4254241A1 (en) Method and device for image-based malware detection, and artificial intelligence-based endpoint detection and response system using same
CN115603924A (en) Detection method and device for phishing mails, electronic equipment and storage medium
CN102780686A (en) Credible resource based method and device for protecting bank user information
CN105490998B (en) A kind of safety credit appraisal procedure and system based on digital certificate authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant