CN110008683A - A kind of certificate recognition methods and equipment based on two dimensional code - Google Patents
A kind of certificate recognition methods and equipment based on two dimensional code Download PDFInfo
- Publication number
- CN110008683A CN110008683A CN201910306966.0A CN201910306966A CN110008683A CN 110008683 A CN110008683 A CN 110008683A CN 201910306966 A CN201910306966 A CN 201910306966A CN 110008683 A CN110008683 A CN 110008683A
- Authority
- CN
- China
- Prior art keywords
- certificate
- dimensional code
- data
- information
- recognition methods
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Abstract
The present invention relates to field of data recognition, especially planar bar code technology.The present invention proposes a kind of certificate recognition methods based on two dimensional code, comprising: step 1: obtaining the encryption data of two dimensional code;Step 2: decrypting the encryption data, obtain certificate data;Step 3: the signature in comparison certificate data and certificate identification equipment;Step 4: certificate data is presented.The present invention solves the problems, such as anti-fake environmental suitability, reduces data hidden danger and data maintenance cost.The expansion that two dimensional code certificate of the invention passes through data storage capacity, information is directly placed into certificate, it realizes and is obtained in two dimensional code by way of information parsing offline, achieve the effect that fake certification, it is no longer dependent on region network, the requirement for environment is lower, is not necessarily to database maintenance, it is at low cost, it is highly-safe.
Description
Technical field
The present invention relates to software approach fields, especially planar bar code technology.
Background technique
Two dimensional code especially needs to carry out efficiently article in hi-tech industry, storage transport service, wholesale and retail industry etc.
The industry of beacon information is widely used.The prior art one is the Chinese patent application that patent publication No. is CN205992235U, such as
Shown in Fig. 1, it discloses a kind of anti-fake two-dimension code certificate with light-emitting function.The prior art 1 in the production process, needs pair
It is perforated, and fixed stainless steel is worn, fixed labels, the installation etc. of lamp, and operating procedure is more and cumbersome;The invention is in order to reach anti-
Pseudo- function, has used a variety of components, and buying item is more and at high cost;The arrangement of a variety of components and light, inevitable card
Book becomes heaviness, is unfavorable for user experience.The prior art two is the Chinese patent that patent publication No. is CN103605999A
Application, as shown in Fig. 2, it discloses a kind of certificate and its application method with two dimensional code, the two dimensional code certificate is in use,
Need request server that could obtain data, but postcard is probably sent to remote mountain area or other and does not have
The region of network greatly limits the use of the invention.In addition, the cost of the data maintenance of data server is not low, so
The operating cost of system or relatively high, and the stability of data server will also determine this whole system;Central server
The data of database, there is also incipient fault for data security.Once database by hack, so data will all be exposed,
This is extremely disadvantageous in data protection.
Summary of the invention
In order to solve the problems, such as anti-fake environmental suitability, solving data hidden danger and reduce data maintenance cost, the present invention is mentioned
For providing a kind of certificate recognition methods and equipment based on two dimensional code, information is directly placed into certificate, is realized by solving offline
Analysis obtains the mode of information in two dimensional code, achievees the effect that fake certification.The present invention is no longer dependent on region network, for environment
Requirement it is lower, be not necessarily to database maintenance, it is at low cost, it is highly-safe.
To achieve the above object, the present invention provides a kind of certificate recognition methods based on two dimensional code, comprising:
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data, obtain certificate data;
Step 3: the signature in comparison certificate data and certificate identification equipment;
Step 4: certificate data is presented.
It preferably, further include two dimensional code preparation process, the preparation process includes:
Preparation process 1: the certificate information of the certificate is acquired;
Preparation process 2: the certificate information of the acquisition is encoded to the two dimensional code;
Preparation process 3: the two dimensional code and certificate are integrated.
Preferably, the certificate are as follows: credentials, grading certificate, examining report;The certificate is papery certificate or electronics
Certificate.
Preferably, the certificate information is First Certificate information and the second certificate information;The First Certificate information is step
The certificate data directly presented in rapid 4, second certificate information are the certificate data that presents after authenticated process;
Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
Preferably, the First Certificate information includes name, photo, Business Name;Second certificate information is communication
Information, privacy information, the communication information include phone, mailbox, address.
Preferably, the step 1 further include: the data based on acquisition are synthesized according to the image being stored in identification equipment
Program obtains image and data is presented.
Preferably, the preparation process 2 further includes ciphering process and compression process, and the ciphering process is asymmetric adds
It is close, symmetric cryptography;The compression process is binary compression algorithms.
Preferably, the preparation process 3 are as follows:
The two dimensional code that preparation process 2 is encoded prints in conjunction with the certificate;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on certificate.
Preferably, the encryption data includes and the first encryption in the identification equipment for the encryption data for obtaining certificate
The second ciphering signature that signature matches.
Preferably, when scanning the encryption data of the two dimensional code using identification equipment, if the first ciphering signature and second adds
Close signatures match then exports the encryption data;Otherwise, stop output process or output prompt information.
Preferably, the step 4 are as follows:
Step 4.1: First Certificate information is presented,
Step 4.2: the first authentication information of input;
Step 4.3: if first authentication information is matched with the second authentication information in two dimensional code, the second certificate is presented
Information;Otherwise, stop that the second certificate information is presented.
A kind of certificate identification equipment based on two dimensional code, comprising:
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains certificate data for decrypting the encryption data;
Compare display unit, for comparing the signature in certificate data and certificate identification equipment, certificate data is presented.
Preferably, the input resolution unit includes offline analysis program.
Preferably, the decryption unit includes symmetrical code key, and/or, asymmetric code key.
Preferably, the certificate data of the presentation include First Certificate data and presented after needing authentication information to match the
Two certificate datas;Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
Preferably, the identification equipment is plate, cell phone, computer, equipment for customizing;Or, based on cell phone
Application software or small routine.
It is of the invention in order to solve the problems, such as anti-fake environmental suitability, solving data hidden danger and reduce data maintenance cost
Information is directly placed into certificate by two dimensional code certificate by the expansion of data storage capacity, is realized and is obtained two dimension by parsing offline
The mode of information, achievees the effect that fake certification in code.The present invention is no longer dependent on region network, and the requirement for environment is more
It is low, it is not necessarily to database maintenance, it is at low cost, it is highly-safe.
Detailed description of the invention
Fig. 1 is one structural schematic diagram of prior art;
Two structural schematic diagram of the position Fig. 2 prior art;
Fig. 3 is the certificate recognition methods flow chart based on two dimensional code that the embodiment of the present invention one provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, belongs to the scope of the present invention.
It can not achieve in view of existing method and meet the needs of different application scene, quickly and easily data medium acquisition
Method, the embodiment of the invention provides a kind of acquisition methods of two-dimensional code data carrier.
Embodiment one
The present embodiment provides the recognition methods and equipment of a kind of two-dimensional code data carrier, as shown in figure 3, design of the invention
Process is as follows:
1. acquiring certificate information
Here certificate information is generally but is not limited to: certificate name personage's main body name telephone number mailbox address.
Certificate information can also include: personage's head portrait, company logo, biological characteristic value etc.;
2. generating two dimensional code
Above-mentioned two dimensional code is a kind of two dimensional code of high capacity.Two dimensional code can support the total amount of certificate information, i.e. certificate
Information can all be encoded as binary data, and store into two dimensional code, including pictorial information and biological characteristic etc..Two dimensional code
Generating process is a kind of generation program of stand-alone development, and generating process combines a variety of encryptions and compress technique, and tactical rule is multiple
It is miscellaneous to be difficult to crack.Above-mentioned a variety of encryption technologies can be asymmetric encryption, symmetric cryptography etc..Above-mentioned compress technique is mainly two
System compression algorithm.So two dimensional code can not be forged, it can not distort, it is ensured that the safety of data.Due to all numbers
According to being stored in two dimensional code, so not needing server to support data to store, cost is greatly saved.Original data
The information in library will be undertaken by two dimensional code one by one, realize the decentralization of data.
By two dimensional code in conjunction with certificate
The display form of two dimensional code can be presented on the lower section of certificate in conjunction with certificate, General Two-Dimensional code.When printing certificate,
Directly two dimensional code is printed together.Two dimensional code can certainly be attached on certificate, by way of pasting.
4. veritifying certificate using equipment for customizing or app
Above-mentioned equipment for customizing is the equipment containing two dimensional code analysis program.Above-mentioned equipment for customizing can be divided into following 5 part;
Importation: for receiving two dimensional code;
Parsing part: the data of encryption are obtained for parsing two dimensional code containing two dimensional code analysis program;
Decryption portion: using the asymmetric code key in equipment, ciphertext data, and signature section letter is obtained according to integration rules
Breath;
Rating unit: for comparing signature;
Present part: for rendering as a result, presentation mode can with multiplicity both sides' difference or tripartite's difference;
Device type can be with are as follows: pad, cell phone, customization android equipment etc..Above-mentioned cell phone can be utilization
App on cell phone is also possible to small routine etc..If it is small routine, need just to may be implemented in the case where network
Certificate is veritified.
Two dimensional code is non-public technology, so two dimensional code has and can only be customized equipment parsing, it ensure that the private of information
It is sexual and authoritative.
Equipment for customizing contains the ciphering signature of mainstream corporation, and equally containing the ciphering signature of the said firm in two dimensional code.
While the setting can guarantee the safety of equipment for customizing, accomplish the binding of equipment and two dimensional code, accomplishes the double-deck guarantee.
If there is criminal wants steal information or spurious information, then he must steal while generating code, oneself transformation
Equipment, technical difficulty and cost are huge.
Verification procedure after decryption completion, can be naked eye comparing, be also possible to be directly realized by OCR comparison.It is first
First successful decryption is the authority for realizing data, then comparison data, then can prove the authentic and valid of data.So this method
The anti-fake of certificate may be implemented, protect the safety of information and main body.
And after decryption is completed, since two dimensional code includes the biological information of user, we can also utilize should
The secondary verifying of biological characteristic realization information.Such as recognition of face, fingerprint recognition and iris comparison etc..Certainly these need to rely on
It is supported in equipment.Secondary verifying of the invention can equally be completed under off-line state.
The present invention is since all data are stored in two dimensional code, and analysis program is also in equipment.So the present invention can be with
Verification procedure is completed under off-line state.
In conclusion the data medium acquisition methods for the two dimensional code that the embodiment of the present invention provides, have below beneficial to effect
Fruit:
(1) certificate of the invention based on two dimensional code can verify the certificate true and false in off-line case, strengthen it to ring
The adaptability in border, expands use scope;
(2) the bio-identification re-authentication of two dimensional code certificate of the invention, greatly strengthens information security, prevents certificate
It is stolen;
(3) two dimensional code in certificate of the present invention is a information carrier, it is no longer necessary to which the support of huge database is saved
Data cost, realizes decentralization.
Particular embodiments described above, to the purpose of the present invention, technical scheme and beneficial effects have been carried out further in detail
Describe in detail it is bright, it should be understood that above is only a specific embodiment of the present invention, the protection model being not intended to limit the present invention
It encloses, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention
Protection scope within.
Claims (16)
1. a kind of certificate recognition methods based on two dimensional code characterized by comprising
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data, obtain certificate data;
Step 3: the signature in comparison certificate data and certificate identification equipment;
Step 4: certificate data is presented.
2. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that further include that two dimensional code prepares
Process, the preparation process include:
Preparation process 1: the certificate information of the certificate is acquired;
Preparation process 2: the certificate information of the acquisition is encoded to the two dimensional code;
Preparation process 3: the two dimensional code and certificate are integrated.
3. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the certificate are as follows: qualification
Certificate, grading certificate, examining report;The certificate is papery certificate or digital certificates.
4. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the certificate information is the
One certificate information and the second certificate information;
The First Certificate information is the certificate data directly presented in step 4, and second certificate information is authenticated process
The certificate data presented afterwards;
Or, the First Certificate information and second certificate information are that certificate data is presented after authenticated process.
5. a kind of certificate recognition methods based on two dimensional code as claimed in claim 5, which is characterized in that the First Certificate information
Including name, photo, Business Name;Second certificate information is the communication information, and privacy information, the communication information includes electricity
Words, mailbox, address.
6. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the step 1 further include:
Data based on acquisition obtain image according to the image synthesis program being stored in identification equipment and data are presented.
7. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the preparation process 2 is also
Including ciphering process and compression process, the ciphering process is asymmetric encryption, symmetric cryptography;The compression process is binary system
Compression algorithm.
8. a kind of certificate recognition methods based on two dimensional code as claimed in claim 2, which is characterized in that the preparation process 3 are as follows:
The two dimensional code that preparation process 2 is encoded prints in conjunction with the certificate;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on certificate.
9. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the encryption data includes
The second ciphering signature to match with the first ciphering signature in the identification equipment of the encryption data for obtaining certificate.
10. a kind of certificate recognition methods based on two dimensional code as claimed in claim 9, which is characterized in that swept using identification equipment
When retouching the encryption data of the two dimensional code, if the first ciphering signature is matched with the second ciphering signature, the encryption data is exported;
Otherwise, stop output process or output prompt information.
11. a kind of certificate recognition methods based on two dimensional code as described in claim 1, which is characterized in that the step 4 are as follows:
Step 4.1: First Certificate information is presented,
Step 4.2: the first authentication information of input;
Step 4.3: if first authentication information is matched with the second authentication information in two dimensional code, the second certificate letter is presented
Breath;Otherwise, stop that the second certificate information is presented.
12. a kind of certificate based on two dimensional code identifies equipment characterized by comprising
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains certificate data for decrypting the encryption data;
Compare display unit, for comparing the signature in certificate data and certificate identification equipment, certificate data is presented.
13. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the input parsing is single
Member includes offline analysis program.
14. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the decryption unit packet
Symmetrical code key is included, and/or, asymmetric code key.
15. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the certificate of the presentation
The second certificate data for presenting after data include First Certificate data and authentication information is needed to match;Or, the First Certificate letter
Breath is that certificate data is presented after authenticated process with second certificate information.
16. a kind of certificate based on two dimensional code as claimed in claim 12 identifies equipment, which is characterized in that the identification equipment is
Plate, cell phone, computer, equipment for customizing;Or, application software or small routine based on cell phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910306966.0A CN110008683A (en) | 2019-04-17 | 2019-04-17 | A kind of certificate recognition methods and equipment based on two dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910306966.0A CN110008683A (en) | 2019-04-17 | 2019-04-17 | A kind of certificate recognition methods and equipment based on two dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110008683A true CN110008683A (en) | 2019-07-12 |
Family
ID=67172642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910306966.0A Pending CN110008683A (en) | 2019-04-17 | 2019-04-17 | A kind of certificate recognition methods and equipment based on two dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110008683A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103605999A (en) * | 2013-12-08 | 2014-02-26 | 王恩惠 | Card with QR (Quick Response) code and application method of card |
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN104394166A (en) * | 2014-12-04 | 2015-03-04 | 东北大学 | Certificate anti-fake authentication system and method for mobile terminal under cloud environment |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
CN107528833A (en) * | 2017-08-09 | 2017-12-29 | 成都派沃特科技有限公司 | The method and its system of contactless network transmission are carried out based on Quick Response Code |
-
2019
- 2019-04-17 CN CN201910306966.0A patent/CN110008683A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN103605999A (en) * | 2013-12-08 | 2014-02-26 | 王恩惠 | Card with QR (Quick Response) code and application method of card |
CN104394166A (en) * | 2014-12-04 | 2015-03-04 | 东北大学 | Certificate anti-fake authentication system and method for mobile terminal under cloud environment |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
CN107528833A (en) * | 2017-08-09 | 2017-12-29 | 成都派沃特科技有限公司 | The method and its system of contactless network transmission are carried out based on Quick Response Code |
Non-Patent Citations (1)
Title |
---|
中国物品编码中心编著: "《QR Code 二维码技术与应用》", 31 January 2002, 中国标准出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
US10320807B2 (en) | Systems and methods relating to the authenticity and verification of photographic identity documents | |
US9646296B2 (en) | Mobile-to-mobile transactions | |
US8285991B2 (en) | Electronically signing a document | |
US8478990B2 (en) | Mobile transaction methods and devices with three-dimensional colorgram tokens | |
CN109190347A (en) | A kind of electric endorsement method | |
CN108540470A (en) | Verification System and method based on digital certificate label | |
CN110290134B (en) | Identity authentication method, identity authentication device, storage medium and processor | |
CN103854170A (en) | Payment system and payment method based on two-dimension code | |
US20180288037A1 (en) | Identity authentication using a barcode | |
US20140245019A1 (en) | Apparatus for generating privacy-protecting document authentication information and method of performing privacy-protecting document authentication using the same | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
CN104361494A (en) | Bank counter authorization and certification method and system based on fingerprint recognition | |
CN110020540A (en) | A kind of certificate recognition methods and equipment based on two dimensional code | |
CN108512660B (en) | Virtual card verification method | |
JP2012008816A (en) | Authentication card, card authentication terminal, card authentication server and card authentication system | |
GB2517949A (en) | Ticket authorisation | |
CN110009079A (en) | A kind of label identification method and equipment based on two dimensional code | |
CN104835039A (en) | Data label generation method | |
CN104715537A (en) | Encryption and decryption method based on digital tags | |
CN109992984A (en) | A kind of file identification method and equipment based on two dimensional code | |
CN110111461A (en) | A kind of pass identified off-line method and apparatus based on two dimensional code | |
CN101127592A (en) | A biological template registration method and system | |
CN106254341B (en) | For the data fingerprint extracting method and system of centralized electronic data safety system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |