CN110008683A - A kind of certificate recognition methods and equipment based on two dimensional code - Google Patents

A kind of certificate recognition methods and equipment based on two dimensional code Download PDF

Info

Publication number
CN110008683A
CN110008683A CN201910306966.0A CN201910306966A CN110008683A CN 110008683 A CN110008683 A CN 110008683A CN 201910306966 A CN201910306966 A CN 201910306966A CN 110008683 A CN110008683 A CN 110008683A
Authority
CN
China
Prior art keywords
certificate
dimensional code
data
information
recognition methods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910306966.0A
Other languages
Chinese (zh)
Inventor
朱银锋
刘少磊
沈怡
罗年庆
祝哲海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unitec (jiaxing) Information Technology Co Ltd
Original Assignee
Unitec (jiaxing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unitec (jiaxing) Information Technology Co Ltd filed Critical Unitec (jiaxing) Information Technology Co Ltd
Priority to CN201910306966.0A priority Critical patent/CN110008683A/en
Publication of CN110008683A publication Critical patent/CN110008683A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Abstract

The present invention relates to field of data recognition, especially planar bar code technology.The present invention proposes a kind of certificate recognition methods based on two dimensional code, comprising: step 1: obtaining the encryption data of two dimensional code;Step 2: decrypting the encryption data, obtain certificate data;Step 3: the signature in comparison certificate data and certificate identification equipment;Step 4: certificate data is presented.The present invention solves the problems, such as anti-fake environmental suitability, reduces data hidden danger and data maintenance cost.The expansion that two dimensional code certificate of the invention passes through data storage capacity, information is directly placed into certificate, it realizes and is obtained in two dimensional code by way of information parsing offline, achieve the effect that fake certification, it is no longer dependent on region network, the requirement for environment is lower, is not necessarily to database maintenance, it is at low cost, it is highly-safe.

Description

A kind of certificate recognition methods and equipment based on two dimensional code
Technical field
The present invention relates to software approach fields, especially planar bar code technology.
Background technique
Two dimensional code especially needs to carry out efficiently article in hi-tech industry, storage transport service, wholesale and retail industry etc. The industry of beacon information is widely used.The prior art one is the Chinese patent application that patent publication No. is CN205992235U, such as Shown in Fig. 1, it discloses a kind of anti-fake two-dimension code certificate with light-emitting function.The prior art 1 in the production process, needs pair It is perforated, and fixed stainless steel is worn, fixed labels, the installation etc. of lamp, and operating procedure is more and cumbersome;The invention is in order to reach anti- Pseudo- function, has used a variety of components, and buying item is more and at high cost;The arrangement of a variety of components and light, inevitable card Book becomes heaviness, is unfavorable for user experience.The prior art two is the Chinese patent that patent publication No. is CN103605999A Application, as shown in Fig. 2, it discloses a kind of certificate and its application method with two dimensional code, the two dimensional code certificate is in use, Need request server that could obtain data, but postcard is probably sent to remote mountain area or other and does not have The region of network greatly limits the use of the invention.In addition, the cost of the data maintenance of data server is not low, so The operating cost of system or relatively high, and the stability of data server will also determine this whole system;Central server The data of database, there is also incipient fault for data security.Once database by hack, so data will all be exposed, This is extremely disadvantageous in data protection.
Summary of the invention
In order to solve the problems, such as anti-fake environmental suitability, solving data hidden danger and reduce data maintenance cost, the present invention is mentioned For providing a kind of certificate recognition methods and equipment based on two dimensional code, information is directly placed into certificate, is realized by solving offline Analysis obtains the mode of information in two dimensional code, achievees the effect that fake certification.The present invention is no longer dependent on region network, for environment Requirement it is lower, be not necessarily to database maintenance, it is at low cost, it is highly-safe.
To achieve the above object, the present invention provides a kind of certificate recognition methods based on two dimensional code, comprising:
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data, obtain certificate data;
Step 3: the signature in comparison certificate data and certificate identification equipment;
Step 4: certificate data is presented.
It preferably, further include two dimensional code preparation process, the preparation process includes:
Preparation process 1: the certificate information of the certificate is acquired;
Preparation process 2: the certificate information of the acquisition is encoded to the two dimensional code;
Preparation process 3: the two dimensional code and certificate are integrated.
Preferably, the certificate are as follows: credentials, grading certificate, examining report;The certificate is papery certificate or electronics Certificate.
Preferably, the certificate information is First Certificate information and the second certificate information;The First Certificate information is step The certificate data directly presented in rapid 4, second certificate information are the certificate data that presents after authenticated process;
Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
Preferably, the First Certificate information includes name, photo, Business Name;Second certificate information is communication Information, privacy information, the communication information include phone, mailbox, address.
Preferably, the step 1 further include: the data based on acquisition are synthesized according to the image being stored in identification equipment Program obtains image and data is presented.
Preferably, the preparation process 2 further includes ciphering process and compression process, and the ciphering process is asymmetric adds It is close, symmetric cryptography;The compression process is binary compression algorithms.
Preferably, the preparation process 3 are as follows:
The two dimensional code that preparation process 2 is encoded prints in conjunction with the certificate;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on certificate.
Preferably, the encryption data includes and the first encryption in the identification equipment for the encryption data for obtaining certificate The second ciphering signature that signature matches.
Preferably, when scanning the encryption data of the two dimensional code using identification equipment, if the first ciphering signature and second adds Close signatures match then exports the encryption data;Otherwise, stop output process or output prompt information.
Preferably, the step 4 are as follows:
Step 4.1: First Certificate information is presented,
Step 4.2: the first authentication information of input;
Step 4.3: if first authentication information is matched with the second authentication information in two dimensional code, the second certificate is presented Information;Otherwise, stop that the second certificate information is presented.
A kind of certificate identification equipment based on two dimensional code, comprising:
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains certificate data for decrypting the encryption data;
Compare display unit, for comparing the signature in certificate data and certificate identification equipment, certificate data is presented.
Preferably, the input resolution unit includes offline analysis program.
Preferably, the decryption unit includes symmetrical code key, and/or, asymmetric code key.
Preferably, the certificate data of the presentation include First Certificate data and presented after needing authentication information to match the Two certificate datas;Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
Preferably, the identification equipment is plate, cell phone, computer, equipment for customizing;Or, based on cell phone Application software or small routine.
It is of the invention in order to solve the problems, such as anti-fake environmental suitability, solving data hidden danger and reduce data maintenance cost Information is directly placed into certificate by two dimensional code certificate by the expansion of data storage capacity, is realized and is obtained two dimension by parsing offline The mode of information, achievees the effect that fake certification in code.The present invention is no longer dependent on region network, and the requirement for environment is more It is low, it is not necessarily to database maintenance, it is at low cost, it is highly-safe.
Detailed description of the invention
Fig. 1 is one structural schematic diagram of prior art;
Two structural schematic diagram of the position Fig. 2 prior art;
Fig. 3 is the certificate recognition methods flow chart based on two dimensional code that the embodiment of the present invention one provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to the scope of the present invention.
It can not achieve in view of existing method and meet the needs of different application scene, quickly and easily data medium acquisition Method, the embodiment of the invention provides a kind of acquisition methods of two-dimensional code data carrier.
Embodiment one
The present embodiment provides the recognition methods and equipment of a kind of two-dimensional code data carrier, as shown in figure 3, design of the invention Process is as follows:
1. acquiring certificate information
Here certificate information is generally but is not limited to: certificate name personage's main body name telephone number mailbox address.
Certificate information can also include: personage's head portrait, company logo, biological characteristic value etc.;
2. generating two dimensional code
Above-mentioned two dimensional code is a kind of two dimensional code of high capacity.Two dimensional code can support the total amount of certificate information, i.e. certificate Information can all be encoded as binary data, and store into two dimensional code, including pictorial information and biological characteristic etc..Two dimensional code Generating process is a kind of generation program of stand-alone development, and generating process combines a variety of encryptions and compress technique, and tactical rule is multiple It is miscellaneous to be difficult to crack.Above-mentioned a variety of encryption technologies can be asymmetric encryption, symmetric cryptography etc..Above-mentioned compress technique is mainly two System compression algorithm.So two dimensional code can not be forged, it can not distort, it is ensured that the safety of data.Due to all numbers According to being stored in two dimensional code, so not needing server to support data to store, cost is greatly saved.Original data The information in library will be undertaken by two dimensional code one by one, realize the decentralization of data.
By two dimensional code in conjunction with certificate
The display form of two dimensional code can be presented on the lower section of certificate in conjunction with certificate, General Two-Dimensional code.When printing certificate, Directly two dimensional code is printed together.Two dimensional code can certainly be attached on certificate, by way of pasting.
4. veritifying certificate using equipment for customizing or app
Above-mentioned equipment for customizing is the equipment containing two dimensional code analysis program.Above-mentioned equipment for customizing can be divided into following 5 part;
Importation: for receiving two dimensional code;
Parsing part: the data of encryption are obtained for parsing two dimensional code containing two dimensional code analysis program;
Decryption portion: using the asymmetric code key in equipment, ciphertext data, and signature section letter is obtained according to integration rules Breath;
Rating unit: for comparing signature;
Present part: for rendering as a result, presentation mode can with multiplicity both sides' difference or tripartite's difference;
Device type can be with are as follows: pad, cell phone, customization android equipment etc..Above-mentioned cell phone can be utilization App on cell phone is also possible to small routine etc..If it is small routine, need just to may be implemented in the case where network Certificate is veritified.
Two dimensional code is non-public technology, so two dimensional code has and can only be customized equipment parsing, it ensure that the private of information It is sexual and authoritative.
Equipment for customizing contains the ciphering signature of mainstream corporation, and equally containing the ciphering signature of the said firm in two dimensional code. While the setting can guarantee the safety of equipment for customizing, accomplish the binding of equipment and two dimensional code, accomplishes the double-deck guarantee. If there is criminal wants steal information or spurious information, then he must steal while generating code, oneself transformation Equipment, technical difficulty and cost are huge.
Verification procedure after decryption completion, can be naked eye comparing, be also possible to be directly realized by OCR comparison.It is first First successful decryption is the authority for realizing data, then comparison data, then can prove the authentic and valid of data.So this method The anti-fake of certificate may be implemented, protect the safety of information and main body.
And after decryption is completed, since two dimensional code includes the biological information of user, we can also utilize should The secondary verifying of biological characteristic realization information.Such as recognition of face, fingerprint recognition and iris comparison etc..Certainly these need to rely on It is supported in equipment.Secondary verifying of the invention can equally be completed under off-line state.
The present invention is since all data are stored in two dimensional code, and analysis program is also in equipment.So the present invention can be with Verification procedure is completed under off-line state.
In conclusion the data medium acquisition methods for the two dimensional code that the embodiment of the present invention provides, have below beneficial to effect Fruit:
(1) certificate of the invention based on two dimensional code can verify the certificate true and false in off-line case, strengthen it to ring The adaptability in border, expands use scope;
(2) the bio-identification re-authentication of two dimensional code certificate of the invention, greatly strengthens information security, prevents certificate It is stolen;
(3) two dimensional code in certificate of the present invention is a information carrier, it is no longer necessary to which the support of huge database is saved Data cost, realizes decentralization.
Particular embodiments described above, to the purpose of the present invention, technical scheme and beneficial effects have been carried out further in detail Describe in detail it is bright, it should be understood that above is only a specific embodiment of the present invention, the protection model being not intended to limit the present invention It encloses, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention Protection scope within.

Claims (16)

1. a kind of certificate recognition methods based on two dimensional code characterized by comprising
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data, obtain certificate data;
Step 3: the signature in comparison certificate data and certificate identification equipment;
Step 4: certificate data is presented.
2. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that further include that two dimensional code prepares Process, the preparation process include:
Preparation process 1: the certificate information of the certificate is acquired;
Preparation process 2: the certificate information of the acquisition is encoded to the two dimensional code;
Preparation process 3: the two dimensional code and certificate are integrated.
3. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the certificate are as follows: qualification Certificate, grading certificate, examining report;The certificate is papery certificate or digital certificates.
4. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the certificate information is the One certificate information and the second certificate information;
The First Certificate information is the certificate data directly presented in step 4, and second certificate information is authenticated process The certificate data presented afterwards;
Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
5. a kind of certificate recognition methods based on two dimensional code as claimed in claim 5, which is characterized in that the First Certificate information Including name, photo, Business Name;Second certificate information is the communication information, and privacy information, the communication information includes electricity Words, mailbox, address.
6. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the step 1 further include: Data based on acquisition obtain image according to the image synthesis program being stored in identification equipment and data are presented.
7. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the preparation process 2 is also Including ciphering process and compression process, the ciphering process is asymmetric encryption, symmetric cryptography;The compression process is binary system Compression algorithm.
8. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the preparation process 3 are as follows:
The two dimensional code that preparation process 2 is encoded prints in conjunction with the certificate;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on certificate.
9. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the encryption data includes The second ciphering signature to match with the first ciphering signature in the identification equipment of the encryption data for obtaining certificate.
10. a kind of certificate recognition methods based on two dimensional code as claimed in claim 9, which is characterized in that swept using identification equipment When retouching the encryption data of the two dimensional code, if the first ciphering signature is matched with the second ciphering signature, the encryption data is exported; Otherwise, stop output process or output prompt information.
11. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the step 4 are as follows:
Step 4.1: First Certificate information is presented,
Step 4.2: the first authentication information of input;
Step 4.3: if first authentication information is matched with the second authentication information in two dimensional code, the second certificate letter is presented Breath;Otherwise, stop that the second certificate information is presented.
12. a kind of certificate based on two dimensional code identifies equipment characterized by comprising
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains certificate data for decrypting the encryption data;
Compare display unit, for comparing the signature in certificate data and certificate identification equipment, certificate data is presented.
13. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the input parsing is single Member includes offline analysis program.
14. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the decryption unit packet Symmetrical code key is included, and/or, asymmetric code key.
15. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the certificate of the presentation The second certificate data for presenting after data include First Certificate data and authentication information is needed to match;Or, the First Certificate letter Breath is that certificate data is presented after authenticated process with second certificate information.
16. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the identification equipment is Plate, cell phone, computer, equipment for customizing;Or, application software or small routine based on cell phone.
CN201910306966.0A 2019-04-17 2019-04-17 A kind of certificate recognition methods and equipment based on two dimensional code Pending CN110008683A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910306966.0A CN110008683A (en) 2019-04-17 2019-04-17 A kind of certificate recognition methods and equipment based on two dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910306966.0A CN110008683A (en) 2019-04-17 2019-04-17 A kind of certificate recognition methods and equipment based on two dimensional code

Publications (1)

Publication Number Publication Date
CN110008683A true CN110008683A (en) 2019-07-12

Family

ID=67172642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910306966.0A Pending CN110008683A (en) 2019-04-17 2019-04-17 A kind of certificate recognition methods and equipment based on two dimensional code

Country Status (1)

Country Link
CN (1) CN110008683A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605999A (en) * 2013-12-08 2014-02-26 王恩惠 Card with QR (Quick Response) code and application method of card
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN104394166A (en) * 2014-12-04 2015-03-04 东北大学 Certificate anti-fake authentication system and method for mobile terminal under cloud environment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN107528833A (en) * 2017-08-09 2017-12-29 成都派沃特科技有限公司 The method and its system of contactless network transmission are carried out based on Quick Response Code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN103605999A (en) * 2013-12-08 2014-02-26 王恩惠 Card with QR (Quick Response) code and application method of card
CN104394166A (en) * 2014-12-04 2015-03-04 东北大学 Certificate anti-fake authentication system and method for mobile terminal under cloud environment
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN107528833A (en) * 2017-08-09 2017-12-29 成都派沃特科技有限公司 The method and its system of contactless network transmission are carried out based on Quick Response Code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国物品编码中心编著: "《QR Code 二维码技术与应用》", 31 January 2002, 中国标准出版社 *

Similar Documents

Publication Publication Date Title
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
US9646296B2 (en) Mobile-to-mobile transactions
US8285991B2 (en) Electronically signing a document
US8478990B2 (en) Mobile transaction methods and devices with three-dimensional colorgram tokens
CN109190347A (en) A kind of electric endorsement method
CN108540470A (en) Verification System and method based on digital certificate label
CN110290134B (en) Identity authentication method, identity authentication device, storage medium and processor
CN103854170A (en) Payment system and payment method based on two-dimension code
US20180288037A1 (en) Identity authentication using a barcode
US20140245019A1 (en) Apparatus for generating privacy-protecting document authentication information and method of performing privacy-protecting document authentication using the same
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
CN104361494A (en) Bank counter authorization and certification method and system based on fingerprint recognition
CN110020540A (en) A kind of certificate recognition methods and equipment based on two dimensional code
CN108512660B (en) Virtual card verification method
JP2012008816A (en) Authentication card, card authentication terminal, card authentication server and card authentication system
GB2517949A (en) Ticket authorisation
CN110009079A (en) A kind of label identification method and equipment based on two dimensional code
CN104835039A (en) Data label generation method
CN104715537A (en) Encryption and decryption method based on digital tags
CN109992984A (en) A kind of file identification method and equipment based on two dimensional code
CN110111461A (en) A kind of pass identified off-line method and apparatus based on two dimensional code
CN101127592A (en) A biological template registration method and system
CN106254341B (en) For the data fingerprint extracting method and system of centralized electronic data safety system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination