CN109492366A - Scenic spot coupon verification method based on anti-tamper Encryption Algorithm - Google Patents
Scenic spot coupon verification method based on anti-tamper Encryption Algorithm Download PDFInfo
- Publication number
- CN109492366A CN109492366A CN201811202104.5A CN201811202104A CN109492366A CN 109492366 A CN109492366 A CN 109492366A CN 201811202104 A CN201811202104 A CN 201811202104A CN 109492366 A CN109492366 A CN 109492366A
- Authority
- CN
- China
- Prior art keywords
- module
- character
- scenic spot
- information
- encryption algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses the scenic spot coupon verification methods based on anti-tamper Encryption Algorithm, include the following steps, the character having already appeared in character and database is compared, judge whether character is identical, if identical, the character of generation is compared with the character in database again, until the character in the character and database generated at random is not identical, different character is sent to the second computations module, second computations module continues encrypted character to generate two dimensional code, and encrypted information is stored in block chain module;If when the result of verification and the inconsistent data of block chain, start the second scanning module, second scanning module can record the facial characteristics of user, and information is transferred to the first computations module by network transmitting unit, facial information encryption is stored in data memory module by the first computations module.The present invention is ingenious in design, and method is reasonable, and altered data can be effectively prevented, and is suitble to promote the use of.
Description
Technical field
The present invention relates to scenic spot coupon verification technique fields, more particularly to the scenic spot coupon based on anti-tamper Encryption Algorithm is tested
Card method.
Background technique
Tourist attraction refers to using tourism and its correlated activation as the region place of one of major function or major function, energy
Enough meet the tourism demands such as tourist's visit and sightseeing, vacation tourism, health and happiness body-building, have corresponding tourist facilities and provides corresponding
Area is managed in tourist service independently.With the development of society and becoming increasingly abundant for people's cultural life, more and more people's choosings
This leisure way of tourism is selected, domestic many well-known scenic spots are all charges, it is therefore desirable to which people's booking can enter tourism
Scenic spot sightseeing.After scenic spot coupon refers to that tourist buys cheap coupon in travelling entrance ticket commercial networks, in one-year age
In validity period, unlimited time, sight spot of the unlimited number ground in coupon of playing.
It steals a ride in order to prevent behavior, needs to verify scenic spot coupon, some criminals is avoided to utilize printing device
Scenic spot coupon is sold, brings loss to scenic spot, for this purpose, the present invention proposes the scenic spot coupon authentication based on anti-tamper Encryption Algorithm
Method.
Summary of the invention
The purpose of the present invention is to solve disadvantage existing in the prior art, and propose based on anti-tamper Encryption Algorithm
Scenic spot coupon verification method.
To achieve the goals above, present invention employs following technical solutions:
Scenic spot coupon verification method based on anti-tamper Encryption Algorithm, includes the following steps,
S1, scenic spot coupon generates, including following methods,
S101, user place an order;
S102 generates one group of character at random;
The character having already appeared in S103, character and database is compared, and judges whether character is identical, if identical,
Again one group of character is generated at random, and the character of generation is compared with the character in database again, until the word generated at random
Until symbol and the character in database be not identical, different character is sent to the second computations module, the second encryption meter
It calculates module to continue encrypted character to generate two dimensional code, and encrypted information is stored in block chain module;
Two dimensional code is printed upon the surface of admission ticket by S104, printer, and user takes admission ticket away reservation;
S2, including verifying terminal, verify and are provided with the first scanning module and the second scanning module in terminal;
S3 is directed at the two dimensional code on admission ticket by the first scanning module, is sent out the information of transmission by network transmitting unit
Block chain module is given, block chain module verifies the result of scanning, the result and the data in block chain module of verification
When consistent, the gate at scenic spot opens the door, and passenger is put into inside scenic spot, if the result of verification and the data of block chain are inconsistent
When, start the second scanning module, the second scanning module can record the facial characteristics of user, and information is passed by network
Defeated unit is transferred to the first computations module, and facial information encryption is stored in data memory module by the first computations module
In;
S4 is evenly arranged with multiple cameras in scenic spot, which tracks tourist for the monitoring to tourist
Facial information, and the facial information of tourist is transmitted to data inquiry module, data inquiry module called data memory module
In facial information, and the facial information of shooting is compared with the information in data memory module, if data store mould
Be not present in block or data memory module in that record is the unsanctioned tourist of verifying, alarm device will be triggered at this time, will
Staff someone is reminded to swarm into inside scenic spot privately, if that record in data memory module is the tourist being verified,
Alarm device will not be triggered.
Preferably, in the S102, character is number, any two kinds in letter, numerical chracter, letter character, text
Or any two or more combination.
Preferably, the verifying terminal is one of mobile phone, IPAD, palm PC.
Preferably, in the S3, when the result of verification is consistent with the data in block chain module, what the gate at scenic spot opened the door
Meanwhile second scanning module also run, also can by the facial characteristics of user record down, also be stored in data memory module.
Preferably, after alarm device is rung, staff goes education to criticize violation tourist according to the information that camera is shot.
Preferably, the data memory module is connected with data transmission module, and data transmission module, which transmits information to, to be taken the photograph
As in head server, camera can be compared according to the information in server in real time.
Preferably, the verifying terminal includes handheld terminal and cabinet type terminal, and handheld terminal needs man-hour manually hand-held, and cabinet type
Terminal does not need man-hour manually hand-held, and two cooperations of handheld terminal and cabinet type terminal are run, if cabinet type terminal can not be operated, work
Make personnel and will hold handheld terminal to operate.
Preferably, the first computations module is encrypted using hash algorithm.
Preferably, the second computations module is encrypted using hash algorithm.
Compared with prior art, the beneficial effects of the present invention are:
It is compared by the character being had already appeared in character and database, judges whether character is identical, if identical, weight
New to generate one group of character at random, the character of generation is compared with the character in database again, until the character generated at random
With the character in database it is not identical until, different character is sent to the second computations module, the second computations
Module continues encrypted character to generate two dimensional code, and encrypted information is stored in block chain module, can be to prevent
Only information is tampered, and safer after information encryption, and facilitates verifying, avoids artificially forging;
It is directed at the two dimensional code on admission ticket by the first scanning module, is sent to the information of transmission by network transmitting unit
Block chain module, block chain module verify the result of scanning, and the result of verification is consistent with the data in block chain module
When, the gate at scenic spot opens the door, and passenger is put into inside scenic spot, if opened when the result of verification and the inconsistent data of block chain
Dynamic second scanning module, the second scanning module can record the facial characteristics of user, and information is passed through network transmission list
Member is transferred to the first computations module, and facial information encryption is stored in data memory module by the first computations module,
The true and false of scenic spot coupon can be not only verified, but also realizes the monitoring inside scenic spot according to the true and false of scenic spot coupon, is avoided non-
The tourist that method is stolen a ride, so as to so that scenic spot management more standardizes;
The present invention is ingenious in design, and method is reasonable, and altered data can be effectively prevented, and is suitble to promote the use of.
Detailed description of the invention
Fig. 1 is the verifying flow chart of the scenic spot coupon verification method proposed by the present invention based on anti-tamper Encryption Algorithm;
Fig. 2 is the composition that terminal is verified in the scenic spot coupon verification method proposed by the present invention based on anti-tamper Encryption Algorithm
Figure;
Fig. 3 is the two dimensional code product process of the scenic spot coupon verification method proposed by the present invention based on anti-tamper Encryption Algorithm
Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-3, the scenic spot coupon verification method based on anti-tamper Encryption Algorithm, includes the following steps,
S1, scenic spot coupon generates, including following methods,
S101, user place an order;
S102 generates one group of character at random;
The character having already appeared in S103, character and database is compared, and judges whether character is identical, if identical,
Again one group of character is generated at random, and the character of generation is compared with the character in database again, until the word generated at random
Until symbol and the character in database be not identical, different character is sent to the second computations module, the second encryption meter
It calculates module to continue encrypted character to generate two dimensional code, and encrypted information is stored in block chain module;
Two dimensional code is printed upon the surface of admission ticket by S104, printer, and user takes admission ticket away reservation;
S2, including verifying terminal, verify and are provided with the first scanning module and the second scanning module in terminal;
S3 is directed at the two dimensional code on admission ticket by the first scanning module, is sent out the information of transmission by network transmitting unit
Block chain module is given, block chain module verifies the result of scanning, the result and the data in block chain module of verification
When consistent, the gate at scenic spot opens the door, and passenger is put into inside scenic spot, if the result of verification and the data of block chain are inconsistent
When, start the second scanning module, the second scanning module can record the facial characteristics of user, and information is passed by network
Defeated unit is transferred to the first computations module, and facial information encryption is stored in data memory module by the first computations module
In;
S4 is evenly arranged with multiple cameras in scenic spot, which tracks tourist for the monitoring to tourist
Facial information, and the facial information of tourist is transmitted to data inquiry module, data inquiry module called data memory module
In facial information, and the facial information of shooting is compared with the information in data memory module, if data store mould
Be not present in block or data memory module in that record is the unsanctioned tourist of verifying, alarm device will be triggered at this time, will
Staff someone is reminded to swarm into inside scenic spot privately, if that record in data memory module is the tourist being verified,
Alarm device will not be triggered.
In present embodiment, in the S102, character is number, appointing in letter, numerical chracter, letter character, text
Two kinds of meaning or any two or more combination.
In present embodiment, the verifying terminal is one of mobile phone, IPAD, palm PC.
In present embodiment, in the S3, when the result of verification is consistent with the data in block chain module, the gate at scenic spot
While enabling, the second scanning module is also run, and also can record by the facial characteristics of user, also is stored in data storage mould
In block.
In present embodiment, after alarm device is rung, staff goes education criticism to disobey according to the information that camera is shot
Advise tourist.
In present embodiment, the data memory module is connected with data transmission module, and data transmission module passes information
It transports in camera server, camera can be compared according to the information in server in real time.
In present embodiment, the verifying terminal includes handheld terminal and cabinet type terminal, and handheld terminal needs man-hour manually hand-held,
And cabinet type terminal does not need man-hour manually hand-held, two cooperation operations of handheld terminal and cabinet type terminal, if cabinet type terminal can not carry out
Operation, staff will hold handheld terminal and operate.
In present embodiment, the first computations module is encrypted using hash algorithm.
In present embodiment, the second computations module is encrypted using hash algorithm.
In the use of the present invention, being compared by the character having already appeared in character and database, whether character is judged
It is identical, if identical, generate one group of character at random again, the character of generation is compared with the character in database again, always
Until the character in the character and database generated at random is not identical, different character is sent to the second computations mould
Block, the second computations module continues encrypted character to generate two dimensional code, and encrypted information is stored in block
In chain module, information can be prevented to be tampered, and safer after information encryption, and facilitate verifying, avoid artificially forging,
It is directed at the two dimensional code on admission ticket by the first scanning module, the information of transmission is sent to by block chain mould by network transmitting unit
Block, block chain module verify the result of scanning, when the result of verification is consistent with the data in block chain module, scenic spot
Gate opens the door, and passenger is put into inside scenic spot, if when the result of verification and the inconsistent data of block chain, the second scanning of starting
Mould group, the second scanning module can record the facial characteristics of user, and information is transferred to by network transmitting unit
Facial information encryption is stored in data memory module, can not only test by one computations module, the first computations module
The true and false of scenic spot coupon is demonstrate,proved, and realizes the monitoring inside scenic spot according to the true and false of scenic spot coupon, avoids the trip illegally stolen a ride
Visitor, so as to so that scenic spot management more standardizes;The present invention is ingenious in design, and method is reasonable, and altered data can be effectively prevented, and fits
It closes and promotes the use of.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (9)
1. the scenic spot coupon verification method based on anti-tamper Encryption Algorithm, which is characterized in that include the following steps,
S1, scenic spot coupon generates, including following methods,
S101, user place an order;
S102 generates one group of character at random;
The character having already appeared in S103, character and database is compared, and judges whether character is identical, if identical, again
Generate one group of character at random, the character of generation is compared with the character in database again, until the character generated at random with
Until character in database is not identical, different character is sent to the second computations module, the second computations mould
Block continues encrypted character to generate two dimensional code, and encrypted information is stored in block chain module;
Two dimensional code is printed upon the surface of admission ticket by S104, printer, and user takes admission ticket away reservation;
S2, including verifying terminal, verify and are provided with the first scanning module and the second scanning module in terminal;
S3 is directed at the two dimensional code on admission ticket by the first scanning module, is sent to the information of transmission by network transmitting unit
Block chain module, block chain module verify the result of scanning, and the result of verification is consistent with the data in block chain module
When, the gate at scenic spot opens the door, and passenger is put into inside scenic spot, if opened when the result of verification and the inconsistent data of block chain
Dynamic second scanning module, the second scanning module can record the facial characteristics of user, and information is passed through network transmission list
Member is transferred to the first computations module, and facial information encryption is stored in data memory module by the first computations module;
S4 is evenly arranged with multiple cameras in scenic spot, which tracks the face of tourist for the monitoring to tourist
Portion's information, and the facial information of tourist is transmitted to data inquiry module, in data inquiry module called data memory module
Facial information, and the facial information of shooting is compared with the information in data memory module, if in data memory module
Be not present or data memory module in that record is the unsanctioned tourist of verifying, alarm device will be triggered at this time, will remind
Staff someone swarms into inside scenic spot privately, will not if that record in data memory module is the tourist being verified
Trigger alarm device.
2. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
In S102, character is number, any two kinds in letter, numerical chracter, letter character, text or any two or more group
It closes.
3. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
Verifying terminal is one of mobile phone, IPAD, palm PC.
4. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
In S3, when the result of verification is consistent with the data in block chain module, while the gate at scenic spot opens the door, the second scanning module
The facial characteristics of user also can be recorded, also is stored in data memory module by operation.
5. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that work as police
After reporting device to ring, staff goes education to criticize violation tourist according to the information that camera is shot.
6. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
Data memory module is connected with data transmission module, and data transmission module transmits information in camera server, camera
It can be compared in real time according to the information in server.
7. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
Verifying terminal includes handheld terminal and cabinet type terminal, and handheld terminal needs man-hour manually hand-held, and cabinet type terminal does not need man-hour manually hand-held,
The two cooperation operations of handheld terminal and cabinet type terminal, if cabinet type terminal can not be operated, staff will hold hand-held
Terminal is operated.
8. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
First computations module is encrypted using hash algorithm.
9. the scenic spot coupon verification method according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that described
Second computations module is encrypted using hash algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811202104.5A CN109492366B (en) | 2018-10-16 | 2018-10-16 | Scenic spot coupon verification method based on tamper-proof encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811202104.5A CN109492366B (en) | 2018-10-16 | 2018-10-16 | Scenic spot coupon verification method based on tamper-proof encryption algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109492366A true CN109492366A (en) | 2019-03-19 |
CN109492366B CN109492366B (en) | 2020-11-27 |
Family
ID=65690321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811202104.5A Active CN109492366B (en) | 2018-10-16 | 2018-10-16 | Scenic spot coupon verification method based on tamper-proof encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492366B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428838A (en) * | 2020-03-13 | 2020-07-17 | 郑州大学 | Method and device for generating artistic QR (quick response) code, electronic equipment and storage medium |
CN111784517A (en) * | 2020-06-24 | 2020-10-16 | 杭州溪塔科技有限公司 | Block chain-based coupon management method and system, electronic equipment and storage medium |
CN114973435A (en) * | 2022-05-18 | 2022-08-30 | 西门子交通技术(北京)有限公司 | Ticket checking method, gate, server, mobile terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105279801A (en) * | 2015-11-20 | 2016-01-27 | 谢殷泽 | Scenic spots automatic ticket checking system based on face identification |
CN106407779A (en) * | 2016-09-05 | 2017-02-15 | 广东欧珀移动通信有限公司 | Information acquisition method and apparatus, and terminal |
CN106815958A (en) * | 2017-02-24 | 2017-06-09 | 上海华崟信息技术有限公司 | Warning system, alarm analysis/display device, alarm analysis/display methods |
CN107169826A (en) * | 2017-05-09 | 2017-09-15 | 武汉凤链科技有限公司 | A kind of tourist attraction ticketing method and system based on block chain |
JP2018097725A (en) * | 2016-12-15 | 2018-06-21 | シラジ エイマル | Digital transaction system based on virtual currency |
-
2018
- 2018-10-16 CN CN201811202104.5A patent/CN109492366B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105279801A (en) * | 2015-11-20 | 2016-01-27 | 谢殷泽 | Scenic spots automatic ticket checking system based on face identification |
CN106407779A (en) * | 2016-09-05 | 2017-02-15 | 广东欧珀移动通信有限公司 | Information acquisition method and apparatus, and terminal |
JP2018097725A (en) * | 2016-12-15 | 2018-06-21 | シラジ エイマル | Digital transaction system based on virtual currency |
CN106815958A (en) * | 2017-02-24 | 2017-06-09 | 上海华崟信息技术有限公司 | Warning system, alarm analysis/display device, alarm analysis/display methods |
CN107169826A (en) * | 2017-05-09 | 2017-09-15 | 武汉凤链科技有限公司 | A kind of tourist attraction ticketing method and system based on block chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428838A (en) * | 2020-03-13 | 2020-07-17 | 郑州大学 | Method and device for generating artistic QR (quick response) code, electronic equipment and storage medium |
CN111784517A (en) * | 2020-06-24 | 2020-10-16 | 杭州溪塔科技有限公司 | Block chain-based coupon management method and system, electronic equipment and storage medium |
CN114973435A (en) * | 2022-05-18 | 2022-08-30 | 西门子交通技术(北京)有限公司 | Ticket checking method, gate, server, mobile terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109492366B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8340286B2 (en) | Interleaving and deinterleaving method for preventing periodic position interference | |
CN109684811A (en) | Pinpoint personal identification method, device and the server of authorization | |
US10911946B2 (en) | Local unit for monitoring the maintenance of an item of equipment and method for the validation of a task on the item of equipment | |
CN109492366A (en) | Scenic spot coupon verification method based on anti-tamper Encryption Algorithm | |
CN104851171A (en) | Intelligent access control method, device and system | |
CN105379409A (en) | EHF secure communication device | |
RU2008126715A (en) | METHOD AND DEVICE FOR CHECKING AUTHENTICITY OR RIGHT BY USING ONE-TIME TRANSACTION CODES | |
CN108933656A (en) | Online works voting method and device, computer equipment, readable storage medium storing program for executing | |
CN101772018A (en) | Theft preventing mobile terminal and theft preventing method of mobile terminal | |
CN109600519A (en) | Mobile phone control method and system | |
US20190073461A1 (en) | Methods and systems for ensuring that an individual is authorized to conduct an activity | |
CN112328995B (en) | Social management system based on TOF image sensor verification | |
CN108883711A (en) | passenger counting system | |
US20160196509A1 (en) | Ticket authorisation | |
CN105184871B (en) | Tourism box-office managing system and its management method based on mobile near-field communication | |
CN109871673A (en) | Based on the lasting identity identifying method and system in different context environmentals | |
JP2006344116A (en) | Database managing method using cellular phone and qr code | |
CN113593056B (en) | Intelligent scenic spot electronic ticket sale system based on block chain and verification method | |
KR101947874B1 (en) | System and method for parking fee payment cooperated with external service | |
JP2022093673A (en) | Parking lot management system | |
US20160087971A1 (en) | Method And System For Generating Identification And Certification Of E-License | |
KR101271778B1 (en) | Using Mobile Parking Crackdown Method and System | |
KR20020014271A (en) | Method for certifying an entrance and exit/administration of students by using a fingerprint pattern | |
CN109165961A (en) | The lottery anti-counterfeiting method and system of combined two-dimension code | |
CN108986343A (en) | A kind of method of getting tickets based on intelligent express delivery cabinet, intelligent express delivery cabinet and fetching system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220104 Address after: 519000 room 105-18456, No. 6, Baohua Road, Hengqin new area, Zhuhai, Guangdong Patentee after: Zhuhai hengqinjing tongrongzhi Technology Information Co.,Ltd. Address before: 519000 room 105-23329, No.6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province Patentee before: ZHUHAI HENGQIN XIANLIANSHENG TECHNOLOGY DEVELOPMENT Co.,Ltd. Patentee before: Zhuhai Hengqin Xianlian Financial Technology Co., Ltd |
|
TR01 | Transfer of patent right |