CN110086625A - A kind of mutual authentication method and system based on ciphering two-dimension code - Google Patents

A kind of mutual authentication method and system based on ciphering two-dimension code Download PDF

Info

Publication number
CN110086625A
CN110086625A CN201910238299.7A CN201910238299A CN110086625A CN 110086625 A CN110086625 A CN 110086625A CN 201910238299 A CN201910238299 A CN 201910238299A CN 110086625 A CN110086625 A CN 110086625A
Authority
CN
China
Prior art keywords
ciphering
public key
dimension code
key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910238299.7A
Other languages
Chinese (zh)
Inventor
王学军
周峰
刘译文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Original Assignee
XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY filed Critical XINGHUO ELECTRONICS ENGINEERING Co SHENZHEN CITY
Priority to CN201910238299.7A priority Critical patent/CN110086625A/en
Publication of CN110086625A publication Critical patent/CN110086625A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of mutual authentication method and system based on ciphering two-dimension code.This method comprises: step 1: accessed end discloses its first public key;Step 2: access end encrypts the first information for needing to be sent to accessed end and the second public key of itself using first public key after obtaining first public key, forms the first ciphering two-dimension code, and first two dimensional code is sent to accessed end;Step 3: accessed end is after receiving the first ciphering two-dimension code, the first ciphering two-dimension code is decrypted using first private key, obtain the first information and the second public key, then the second information for needing to feed back to access end is encrypted using second public key, the second ciphering two-dimension code is formed, and the second ciphering two-dimension code is sent to access end;Step 4: access end is decrypted the second ciphering two-dimension code after receiving the second ciphering two-dimension code, using second private key, obtains second information.This method greatly improves information security, and can guarantee that accessed end will not be recognized by emitting.

Description

A kind of mutual authentication method and system based on ciphering two-dimension code
Technical field
The present invention relates to information transmission more particularly to a kind of mutual authentication methods and system based on ciphering two-dimension code.
Background technique
Two dimensional code can include a large amount of information because itself can be distinguished by computer, in friend-making, identification, payment, a surname The extensive use that the various aspects such as biography, link obtain.
The recognition methods of one-way, there is great security breaches.Have been reported that thief has replaced large-scale businessman, company on the net As a result the gathering two dimensional code of locksmith results in the transaction amount of client whithin a period of time all into the account of thief, using double It can solve to certification without loophole existing for verifying or simple authentication method in interactive process, to supplement in current two-dimension application Loophole.
Summary of the invention
In order to solve above-mentioned the deficiencies in the prior art, the present invention provides a kind of mutual authentication method based on ciphering two-dimension code And system greatly improves information security, and can guarantee that accessed end will not be recognized by emitting.
The technical problems to be solved by the invention are achieved by the following technical programs:
A kind of mutual authentication method based on ciphering two-dimension code, comprising:
Step 1: accessed end discloses its first public key, and first public key is corresponding with the first private key of accessed end;
Step 2: access end is after obtaining first public key, using first public key to needing to be sent to the of accessed end One information and itself the second public key are encrypted, and form the first ciphering two-dimension code, and by first two dimensional code be sent to by Access end, second public key are corresponding with the second private key of access end;
Step 3: accessed end is after receiving the first ciphering two-dimension code, using first private key to first encryption Two dimensional code is decrypted, and obtains the first information and the second public key, then feeds back to visit to needs using second public key It asks that second information at end is encrypted, forms the second ciphering two-dimension code, and the second ciphering two-dimension code is sent to access end;
Step 4: access end is after receiving the second ciphering two-dimension code, using second private key to second encryption two Dimension code is decrypted, and obtains second information.
Further, in step 1, its first public key is converted to public key two dimensional code by accessed end, by the public key two Dimension code carries out disclosure.
Further, in step 2, it is public to obtain described first by barcode scanning mode in the public key two dimensional code for access end Key.
Further, in step 1, first public key and the first private key are preset.
Further, in step 2, second public key and the second private key generate at random.
A kind of two-way authentication system based on ciphering two-dimension code, including access end and accessed end, wherein
Access end includes:
Module is obtained, for obtaining the first public key disclosed in accessed end, first public key is corresponding with the first of accessed end Private key;
First encrypting module, for using first public key to the first information for needing to be sent to accessed end and itself Two public keys are encrypted, and the first ciphering two-dimension code is formed, and second public key is corresponding with the second private key of access end;
First sending module, for the first ciphering two-dimension code to be sent to accessed end;
First receiving module, for receiving the second ciphering two-dimension code of accessed end transmission;
First deciphering module obtains described for the second ciphering two-dimension code to be decrypted using second private key The second information in two ciphering two-dimension codes;
Accessed end includes:
Open module, for disclosing first public key;
Second receiving module, for receiving the first ciphering two-dimension code of access end transmission;
Second deciphering module obtains described for the first ciphering two-dimension code to be decrypted using first private key One information and the second public key;
Second encrypting module, for being encrypted using second private key to the second information for needing to feed back to access end, shape At the second ciphering two-dimension code;
Second sending module, for the second ciphering two-dimension code to be sent to access end.
Further, accessed end further include: key presetting module, for presetting first public key and first key.
Further, access end further include: key production module, for generating second public key and second close at random Key.
Further, first public key is converted to public key two dimensional code by the open module, by the public key two dimensional code Carry out disclosure.
Further, the acquisition module obtains first public key by barcode scanning mode in the public key two dimensional code.
The invention has the following beneficial effects: this, and mutual authentication method and system based on ciphering two-dimension code use public key The mode that encryption, private key are decrypted carries out encrypting and decrypting to the information of transmission, since private key is underground, even if the information sent It is trapped, outflows, will not be cracked, greatly improve information security;And use two-way authentication, it is ensured that accessed End will not be recognized by emitting.
Detailed description of the invention
Fig. 1 is the step block diagram of the mutual authentication method provided by the invention based on ciphering two-dimension code;
Fig. 2 is the functional block diagram of the two-way authentication system provided by the invention based on ciphering two-dimension code.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawings and examples.
As shown in Figure 1, a kind of mutual authentication method based on ciphering two-dimension code, comprising:
Step 1: accessed end discloses its first public key, and first public key is corresponding with the first private key of accessed end;
The first key pair for being encrypted and decrypted, i.e. the first public key are preset in the step 1, in accessed end With the first private key, wherein first public key is for encrypting information, and first private key is for solving information Information that is close, being encrypted by first public key, it is necessary to be decrypted by first private key.
Its first public key is converted to public key two dimensional code using two dimensional code algorithm by accessed end, by first public key with institute The form for stating public key two dimensional code carries out disclosure in any public area such as the network platform, device screen or equipment surface, by accessing End obtains the first public key of accessed end by the APP in terminal in a manner of barcode scanning from the public key two dimensional code, and described the One private key is then saved privately by accessed end and is not disclosed outward.
Step 2: access end is after obtaining first public key, using first public key to needing to be sent to accessed end The first information and itself the second public key encrypted, form the first ciphering two-dimension code, and will first two dimensional code transmission To accessed end, second public key is corresponding with the second private key of access end;
In the step 2, access end obtains accessed end from the public key two dimensional code in a manner of barcode scanning by the APP in terminal The first public key, and be applicable in first public key and the first information for needing to be sent to accessed end encrypted, and by described The information of first public key encryption can only can be just decrypted by first private key, therefore even if the first ciphering two-dimension code It is stolen, due to lacking first private key, the first information in the first ciphering two-dimension code will not leak, greatly Ground improves information security.
Access end is random raw first according to preset rivest, shamir, adelman before encrypting to the first information At the second key pair for being encrypted and decrypted, i.e. the second public key and the second private key, wherein second public key for pair Information is encrypted, and second private key is for being decrypted information, the information encrypted by second public key, it is necessary to It is decrypted by second private key.
The second public key that access end generates it at random is together with needing to be sent to described in the first information use of accessed end First public key is encrypted, and is formed the first ciphering two-dimension code and is sent jointly to accessed end, and second private key then by Access end saves privately not to be disclosed outward.
Step 3: accessed end is after receiving the first ciphering two-dimension code, using first private key to described first Ciphering two-dimension code is decrypted, and obtains the first information and the second public key, then using second public key to needing to feed back It is encrypted to the second information of access end, forms the second ciphering two-dimension code, and the second ciphering two-dimension code is sent to visit Ask end;
In the step 3, by the information of second public key encryption, it is necessary to be decrypted, and obtained by second private key Second public key, and need first private key and the first information is decrypted, therefore in accessed end to access When end is fed back, even if the second ciphering two-dimension code is stolen, due to lacking second public key, second encryption two The second information in dimension code will not leak, and greatly improve information security.
Step 4: access end is added after receiving the second ciphering two-dimension code, using second private key to described second Close two dimensional code is decrypted, and obtains second information.
In the step 4, even if someone emits and recognizes accessed end and feed back to access end, lacks due to emitting the person of recognizing and added Close second public key, if therefore access end the second ciphering two-dimension code for receiving can not be carried out using second key If decryption, then can be determined that the second ciphering two-dimension code that can not be decrypted be it is false, someone recognizes accessed end to access emitting It is fed back at end.
Embodiment two
As shown in Fig. 2, a kind of two-way authentication system based on ciphering two-dimension code, applied in method described in embodiment one. The system includes access end and accessed end, wherein
Access end includes:
Module is obtained, for obtaining the first public key disclosed in accessed end, preferably by barcode scanning mode in the public key two dimension First public key is obtained in code, first public key is corresponding with the first private key of accessed end;
Key production module, for generating second public key and the second key at random;
First encrypting module, for using first public key to the first information for needing to be sent to accessed end and itself Two public keys are encrypted, and the first ciphering two-dimension code is formed, and second public key is corresponding with the second private key of access end;
First sending module, for the first ciphering two-dimension code to be sent to accessed end;
First receiving module, for receiving the second ciphering two-dimension code of accessed end transmission;
First deciphering module obtains described for the second ciphering two-dimension code to be decrypted using second private key The second information in two ciphering two-dimension codes;
Accessed end includes:
Key presetting module, for presetting first public key and first key;
Open module is used to disclose first public key, first public key is preferably converted to public key two dimensional code, will be described Public key two dimensional code carries out disclosure;
Second receiving module, for receiving the first ciphering two-dimension code of access end transmission;
Second deciphering module obtains described for the first ciphering two-dimension code to be decrypted using first private key One information and the second public key;
Second encrypting module, for being encrypted using second private key to the second information for needing to feed back to access end, shape At the second ciphering two-dimension code;
Second sending module, for the second ciphering two-dimension code to be sent to access end.
Embodiments of the present invention above described embodiment only expresses, the description thereof is more specific and detailed, but can not Therefore limitations on the scope of the patent of the present invention are interpreted as, as long as skill obtained in the form of equivalent substitutions or equivalent transformations Art scheme should all be fallen within the scope and spirit of the invention.

Claims (10)

1. a kind of mutual authentication method based on ciphering two-dimension code characterized by comprising
Step 1: accessed end discloses its first public key, and first public key is corresponding with the first private key of accessed end;
Step 2: access end is after obtaining first public key, using first public key to needing to be sent to the of accessed end One information and itself the second public key are encrypted, and form the first ciphering two-dimension code, and by first two dimensional code be sent to by Access end, second public key are corresponding with the second private key of access end;
Step 3: accessed end is after receiving the first ciphering two-dimension code, using first private key to first encryption Two dimensional code is decrypted, and obtains the first information and the second public key, then feeds back to visit to needs using second public key It asks that second information at end is encrypted, forms the second ciphering two-dimension code, and the second ciphering two-dimension code is sent to access end;
Step 4: access end is after receiving the second ciphering two-dimension code, using second private key to second encryption two Dimension code is decrypted, and obtains second information.
2. the mutual authentication method according to claim 1 based on ciphering two-dimension code, which is characterized in that in step 1, quilt Its first public key is converted to public key two dimensional code by access end, and the public key two dimensional code is carried out disclosure.
3. the mutual authentication method according to claim 2 based on ciphering two-dimension code, which is characterized in that in step 2, visit Ask that end obtains first public key by barcode scanning mode in the public key two dimensional code.
4. the mutual authentication method according to claim 1 to 3 based on ciphering two-dimension code, which is characterized in that in step In rapid 1, first public key and the first private key are preset.
5. the mutual authentication method according to claim 1 to 3 based on ciphering two-dimension code, which is characterized in that in step In rapid 2, second public key and the second private key generate at random.
6. a kind of two-way authentication system based on ciphering two-dimension code, which is characterized in that including access end and accessed end, wherein
Access end includes:
Module is obtained, for obtaining the first public key disclosed in accessed end, first public key is corresponding with the first of accessed end Private key;
First encrypting module, for using first public key to the first information for needing to be sent to accessed end and itself Two public keys are encrypted, and the first ciphering two-dimension code is formed, and second public key is corresponding with the second private key of access end;
First sending module, for the first ciphering two-dimension code to be sent to accessed end;
First receiving module, for receiving the second ciphering two-dimension code of accessed end transmission;
First deciphering module obtains described for the second ciphering two-dimension code to be decrypted using second private key The second information in two ciphering two-dimension codes;
Accessed end includes:
Open module, for disclosing first public key;
Second receiving module, for receiving the first ciphering two-dimension code of access end transmission;
Second deciphering module obtains described for the first ciphering two-dimension code to be decrypted using first private key One information and the second public key;
Second encrypting module, for being encrypted using second private key to the second information for needing to feed back to access end, shape At the second ciphering two-dimension code;
Second sending module, for the second ciphering two-dimension code to be sent to access end.
7. the two-way authentication system according to claim 6 based on ciphering two-dimension code, which is characterized in that also wrap accessed end It includes: key presetting module, for presetting first public key and first key.
8. the two-way authentication system according to claim 6 or 7 based on ciphering two-dimension code, which is characterized in that access end is also It include: key production module, for generating second public key and the second key at random.
9. the two-way authentication system according to claim 6 based on ciphering two-dimension code, which is characterized in that the open module First public key is converted into public key two dimensional code, the public key two dimensional code is subjected to disclosure.
10. the two-way authentication system according to claim 9 based on ciphering two-dimension code, which is characterized in that the acquisition mould Block obtains first public key by barcode scanning mode in the public key two dimensional code.
CN201910238299.7A 2019-03-27 2019-03-27 A kind of mutual authentication method and system based on ciphering two-dimension code Pending CN110086625A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910238299.7A CN110086625A (en) 2019-03-27 2019-03-27 A kind of mutual authentication method and system based on ciphering two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910238299.7A CN110086625A (en) 2019-03-27 2019-03-27 A kind of mutual authentication method and system based on ciphering two-dimension code

Publications (1)

Publication Number Publication Date
CN110086625A true CN110086625A (en) 2019-08-02

Family

ID=67413609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910238299.7A Pending CN110086625A (en) 2019-03-27 2019-03-27 A kind of mutual authentication method and system based on ciphering two-dimension code

Country Status (1)

Country Link
CN (1) CN110086625A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021208615A1 (en) * 2020-04-15 2021-10-21 腾讯科技(深圳)有限公司 User invitation method and apparatus, computer device, and computer readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096277A1 (en) * 2009-04-20 2012-04-19 Alter Core, S.L. System and method for personal authentication using a mobile device
CN102868519A (en) * 2011-07-04 2013-01-09 周哲仰 Data security method and system
CN104038472A (en) * 2014-04-29 2014-09-10 广州华多网络科技有限公司 Information transmission method and device
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
CN105554028A (en) * 2016-01-22 2016-05-04 合肥学院 Method for establishing secure communication channel between mobile handheld devices based on two-dimension code
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
US20180192287A1 (en) * 2016-03-18 2018-07-05 Raymond Edward Ozzie Providing Low Risk Exceptional Access with Verification of Device Possession
CN108712382A (en) * 2018-04-17 2018-10-26 新大陆(福建)公共服务有限公司 A kind of authentication method and system of the digital identity based on safe Quick Response Code
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096277A1 (en) * 2009-04-20 2012-04-19 Alter Core, S.L. System and method for personal authentication using a mobile device
CN102868519A (en) * 2011-07-04 2013-01-09 周哲仰 Data security method and system
CN104038472A (en) * 2014-04-29 2014-09-10 广州华多网络科技有限公司 Information transmission method and device
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
CN105554028A (en) * 2016-01-22 2016-05-04 合肥学院 Method for establishing secure communication channel between mobile handheld devices based on two-dimension code
US20180192287A1 (en) * 2016-03-18 2018-07-05 Raymond Edward Ozzie Providing Low Risk Exceptional Access with Verification of Device Possession
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium
CN108712382A (en) * 2018-04-17 2018-10-26 新大陆(福建)公共服务有限公司 A kind of authentication method and system of the digital identity based on safe Quick Response Code
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021208615A1 (en) * 2020-04-15 2021-10-21 腾讯科技(深圳)有限公司 User invitation method and apparatus, computer device, and computer readable storage medium
US12088566B2 (en) 2020-04-15 2024-09-10 Tencent Technology (Shenzhen) Company Limited User inviting method and apparatus, computer device, and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN102882847B (en) Secure digital (SD)-password-card-based secure communication method of Internet of things healthcare service system
PH12019500938A1 (en) Data transmission method, apparatus and system
KR101874721B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
US11163867B2 (en) Method and system for authorizing acquisition of attack alarm information log of terminal
CN101656748A (en) Second-generation ID card online inquiry system and method based on secure network
CN103544746A (en) Electronic access control system of dynamic bar code
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN101005361A (en) Server and software protection method and system
CN103634114A (en) Verifying method and system for intelligent secret key
CN105207776A (en) Fingerprint authentication method and system
TW201409990A (en) Communication method utilizing fingerprint information for authentication
CN103560892A (en) Secret key generation method and secret key generation device
CN105450419A (en) Method, device and system
CN109474583A (en) A kind of data safety management system
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN102857503B (en) A kind of safe finger print data radio transmitting method
CN108848503B (en) A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis
CN104038336A (en) Data encryption method based on 3DES
CN1953366B (en) Password management method and system for intelligent secret key device
CN113965396B (en) Data security communication system and method based on risk assessment
CN110086625A (en) A kind of mutual authentication method and system based on ciphering two-dimension code
CN106790135B (en) Data encryption method and system based on cloud and communication equipment
CN100566239C (en) The key transmission method of multi-stage intelligent key apparatus and system
WO2013025091A1 (en) Mobile access control system involving a quantum random number generator
CN110138544A (en) A kind of encrypting and decrypting system and method for internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190802

RJ01 Rejection of invention patent application after publication