CN110163633A - A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car - Google Patents

A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car Download PDF

Info

Publication number
CN110163633A
CN110163633A CN201910337211.7A CN201910337211A CN110163633A CN 110163633 A CN110163633 A CN 110163633A CN 201910337211 A CN201910337211 A CN 201910337211A CN 110163633 A CN110163633 A CN 110163633A
Authority
CN
China
Prior art keywords
code
dimensional code
information
user
dimensional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910337211.7A
Other languages
Chinese (zh)
Inventor
韩牟
倪佳庆
马世典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201910337211.7A priority Critical patent/CN110163633A/en
Publication of CN110163633A publication Critical patent/CN110163633A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/10861Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Abstract

The invention discloses a kind of two-dimension code anti-counterfeit authentication method of shared bicycle and methods of hiring a car, and belong to planar bar code technology and encryption technology field.The present invention includes encryption, two dimensional code generation, two-dimentional code authentication, decryption.The invention firstly uses vehicle security codes to encrypt original two dimensional code, and generates the distinctive anti-fake two-dimension code of the vehicle.Secondly, user in barcode scanning for the first time, pops up authentication interface, shooting uploads two dimensional code to backstage, and after backstage authenticates the validity and safety of two dimensional code, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.Original two dimensional code is encrypted with vehicle security code, ensure that the unforgeable of two dimensional code.The case where two dimensional code is authenticated, prevents the toxic two dimensional code downloading malice APP of scanning input from hiring a car.When user is when barcode scanning is hired a car, needs to input solution confidential information and carry out authentication, not only ensure that the equity of user in this way, but also enhance the safety of shared bicycle.

Description

A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car
Technical field
The invention belongs to planar bar code technology and encryption technology fields, and more precisely, it is shared single that the present invention relates to one kind The two-dimension code anti-counterfeit authentication method of vehicle and method of hiring a car.
Background technique
The new things that bicycle is generated as Internet of Things cloud+epoch are shared, are city, life style locating for a kind of and people And the novel trip mode that life attitudes are all closely bound up, it greatly facilitates the trip of citizen.However, with major shared The addition of bicycle operator, the quantity for sharing bicycle are presented blowout and increase, and there is swindling gang on the market in original two dimensional Trojan horse is planted on code and steals the personal information and property of user.The peaces such as userspersonal information's leakage and property are stolen Full problem repeated, and be shared bicycle company urgent problem.
Two dimensional code is the chequered with black and white square being distributed on planar direction according to certain rules with specific geometric figure The barcode technology of new generation of shape square matrix record data symbol information, which has, to contain much information, and error correcting capability is strong, and recognition speed is fast, secrecy Property high, the characteristics such as traceability is high, and damage resistance is strong, and redundant is big, and cost is cheap.Mobile phone two-dimension code is planar bar code technology on mobile phone Application, have been widely used for invitation card at present, poster is registered, business card, direction board, the various occasions such as exploitation.If using Two dimensional code is needed when certain important events transmitting has the more demanding data of identity information, timeliness to its enciphering and deciphering algorithm It optimizes.
The maximum feature of public key algorithm is will to encrypt to separate with decryption capabilities using two association keys, one of them Key is disclosed, referred to as public-key cryptography, referred to as open key;Another key be for user it is dedicated, thus be secrecy, claim For privacy key, abbreviation secret keys, for decrypting.Therefore public-key cryptosystem is also referred to as conbined public or double key cipher system.Algorithm system has Following key property: it is computationally infeasible to solve secret keys for known cryptographic algorithm and encryption key.It is widely used in each Kind information is encrypted, and is also widely used in authentication, such as RSA technology.If using two dimensional code certain When important events transmitting has the data of identity information, then its ciphering process should be optimized in conjunction with the above encryption technology.
Summary of the invention
It is an object of the present invention to pour in society for bicycle is nowadays shared, there is swindling gang on the market and exist The shared bicycle safety problem such as plantation trojan horse and personal information and the property of stealing user, proposes one on original two dimensional code The shared bicycle two-dimension code anti-counterfeit authentication method of kind and method of hiring a car.
What the present invention adopts the following technical solutions to realize:
A kind of shared bicycle two-dimension code anti-counterfeit authentication method, including encryption, anti-fake two-dimension code generate, two-dimentional code authentication, solution It is close, in which:
(1) encrypt: for share vehicle security code that bicycle company provides as encryption key, to original two dimensional code into Row encryption;
(2) anti-fake two-dimension code generates: for being handled two-dimensional barcode information, being generated the anti-fake two-dimension code of encryption;
(3) two-dimentional code authentication: to prevent the toxic two dimensional code downloading malice APP of scanning input from hiring a car, there is information and wealth Produce the problem of losing;
(4) it decrypts: being decrypted with to the two dimensional code of encryption to obtain two-dimensional barcode information.
Further, the vehicle security code that the shared bicycle company provides includes vehicle identification code and random code, the vehicle Identification code includes: vehicle material information, vehicle type information, vehicle place of production information, processor's information, product batches letter Breath and identification code generate temporal information.
Further, described to two-dimensional barcode information processing, specific treatment process is as follows:
(1) original two dimensional code is decoded by two-dimensional code decoder, generates original two dimensional code information;
(2) using vehicle security code as encryption key, original two dimensional code is encrypted, generates ciphertext;
(3) above-mentioned ciphertext is inputted in two-dimension code generator, generates new anti-fake two-dimension code.
Further, the detailed process of the two dimension code authentication are as follows: user pops up authentication interface, shooting in barcode scanning for the first time Two dimensional code is uploaded to backstage, user side can download APP after authenticating the validity and safety of two dimensional code from the background.Specific authenticating party Method is as follows:
(1) authenticate the safety of two dimensional code: the two dimensional code that shared bicycle company uploads according to user is examined with two-dimension code safe Software is surveyed to detect it, if dangerous, the unusable bicycle of direct authentification failure, i.e. user;
(2) authenticate the validity of two dimensional code: if detect two dimensional code be it is safe, shared bicycle company passes through two dimension Code decoder decodes two dimensional code, and the two-dimensional barcode information in information and company database decoded compares, if it exists the information, It then proves that the two dimensional code is effective, otherwise shows that two dimensional code is invalid, is i.e. the unusable bicycle of user.
Further, the encryption and decryption, are all made of RSA encryption and decryption technology.
The present invention shares the method for hiring a car of bicycle are as follows:
1) to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, using RSA technology, to cleartext information M into Row encryption, obtains cipher-text information C.Vehicle security code includes vehicle identification code p and random code q, and the vehicle identification code includes: to produce Product raw material information, product type information, place of production information, product batches information and generation temporal information.Detailed process such as Fig. 1 institute Show.
1-3) as shown in Fig. 2, cipher-text information C is imported two-dimension code generator, new anti-fake two-dimension code Y is generated.
2) barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, it uses Family can not download APP.Detailed process is as shown in Figure 3.
3) it hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No..
3-12) user logs in APP.Detailed process is as shown in Figure 4.
4) as shown in figure 5, first being verified to user when scanning input two dimensional code is hired a car:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully; Otherwise, it unlocks and fails.
The beneficial effect comprise that
(1) the invention firstly uses vehicle security codes encrypts original two dimensional code, and it is distinctive anti-to generate the vehicle Pseudo- two dimensional code.
(2) user pops up authentication interface in barcode scanning for the first time, and shooting uploads two dimensional code to backstage, and backstage authenticates two dimensional code Validity and safety after, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.With anti-fake Code encrypts original two dimensional code, ensure that the unforgeable of two dimensional code.
(3) the case where two dimensional code being authenticated, preventing scanning input toxic two dimensional code downloading malice APP from hiring a car, when with Family needs to input solution confidential information when barcode scanning is hired a car, and carries out authentication, not only ensure that the equity of user in this way, but also enhance The safety of shared bicycle.
Detailed description of the invention
Fig. 1 is ciphering process schematic diagram of the invention.
Fig. 2 is two dimensional code generating process schematic diagram of the invention.
Fig. 3 is two dimensional code verification process schematic diagram of the invention.
Fig. 4 is that user of the invention hires a car detailed process schematic diagram for the first time.
Fig. 5 is decryption of the invention and verification process schematic diagram.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and in conjunction with example.
The present invention uses RSA encryption and decryption technology, improves current shared bicycle original two dimensional code.Innovation of the invention It is to encrypt original two dimensional code with security code, ensure that the unforgeable of two dimensional code.User is in barcode scanning for the first time, bullet Authentication interface out, shooting upload two dimensional code to backstage, backstage authenticate two dimensional code validity and safety after user side can under APP is carried, provides second guarantee for the safety of two dimensional code and APP.When user scan the two-dimensional code hire a car when, need to input solution Confidential information carries out authentication, ensure that the equity of user.
The present invention uses RSA encryption and decryption technology, improves current shared bicycle original two dimensional code.Current shared bicycle Two dimensional code is too simple, and there are safety problems.Socially, some criminals are on the basis of shared bicycle original two dimensional code On, two dimensional code is forged, the two dimensional code of trojan horse is had in the two dimensional code, it, can be normal when the scanning input two dimensional code downloads APP It hires a car, but trojan horse therein can be implanted into the mobile phone of user, to steal the personal information and property of user.Therefore, originally The innovation of invention is, first of guarantee: is encrypted, be ensure that shared bicycle original two dimensional code with vehicle security code The unforgeable of two dimensional code.Second guarantee: user will pop up authentication interface, user's shooting in barcode scanning for the first time on mobile phone Two dimensional code, and it is uploaded to backstage, after receiving two dimensional code from the background, the two dimensional code can be authenticated, only when two-dimentional code authentication passes through, After validity and safety, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.When User scan the two-dimensional code hire a car when, need to input solution confidential information, carry out authentication, ensure that the equity of user.
The method of hiring a car of shared bicycle proposed by the present invention is embodied using following procedure:
1) to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, using RSA technology, to cleartext information M into Row encryption, obtains cipher-text information C.Vehicle security code includes vehicle identification code p and random code q, and the vehicle identification code includes: to produce Product raw material information, product type information, place of production information, product batches information and generation temporal information.Detailed process such as Fig. 1 institute Show.
1-3) as shown in Fig. 2, cipher-text information C is imported two-dimension code generator, new anti-fake two-dimension code Y is generated.
2) barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, it uses Family can not download APP.Detailed process is as shown in Figure 3.
3) it hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No..
3-12) user logs in APP.
4) as shown in figure 4, first being verified to user when the non-first scan two dimensional code of user is hired a car:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully; Otherwise, it unlocks and fails.
The RSA enciphering and deciphering algorithm that the present invention uses, specific method are described as follows:
1. the generation of key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then group Synthesize vehicle security code;
(2) it enables n=p*q and calculates the value,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) private key d is calculated, is met
That is d is e in mouldUnder multiplicative inverse, because e withIt is coprime, by modular arithmetic it is found that its multiplicative inverse one It is fixed to exist;
It (5) is open key with { e, n }, { d, n } is secret keys.
2. encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is small In log2n.Then to each clear packets m, make cryptographic calculation:
c≡memodn
3. decryption:
Decryption operation to ciphertext block are as follows:
c≡cdmodn
Although the present invention has been described by way of example and in terms of the preferred embodiments, embodiment is not for the purpose of limiting the invention.Not In the case where being detached from the principle of the present invention and objective, any equivalent change or retouch done also belongs to protection of the invention Range.

Claims (8)

1. a kind of shared bicycle two-dimension code anti-counterfeit and authentication method characterized by comprising
Encrypt and generate anti-fake two-dimension code: the vehicle security code for being provided using shared bicycle company is as encryption key, to original Beginning two dimensional code is encrypted;Encrypted two-dimensional barcode information is handled, is generated the anti-fake two-dimension code of encryption;
Two-dimentional code authentication: preventing scanning input toxic two dimensional code downloading malice APP from hiring a car, there is information and property loses Problem;
Decryption: it is decrypted with to the two dimensional code of encryption to obtain two-dimensional barcode information.
2. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the encryption When the vehicle security code that uses include: vehicle identification code p and random code q, the vehicle identification code include: vehicle material information, Vehicle type information, vehicle place of production information, processor's information, product batches information and identification code generate temporal information.
3. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 2 and authentication method, which is characterized in that the encryption And the method for generating anti-fake two-dimension code is as follows:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, cleartext information M is encrypted, ciphertext is obtained Information C;
Cipher-text information C 1-3) is imported into two-dimension code generator, generates new two dimensional code Y.
4. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the certification Method is as follows:
(1) authenticate the safety of two dimensional code: the two dimensional code that shared bicycle company uploads according to user is detected soft with two-dimension code safe Part detects it, if dangerous, the unusable bicycle of direct authentification failure, i.e. user;
(2) authenticate two dimensional code validity: if detect two dimensional code be it is safe, share bicycle company pass through two dimensional code solution Code device decodes two dimensional code, and the two-dimensional barcode information in information and company database decoded compares, and the information, then demonstrate,prove if it exists The bright two dimensional code is effective, otherwise shows that two dimensional code is invalid, i.e. the unusable bicycle of user.
5. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the encryption RSA Algorithm is used with decryption, specific:
First, the generation of key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then is combined into Vehicle security code;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withIt is coprime, According to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Second, encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is less than log2n.Then to each clear packets m, make cryptographic calculation: c ≡ me mod n
Third, decryption:
Decryption operation to ciphertext block are as follows: c ≡ cd mod n。
6. a kind of method of hiring a car of shared bicycle, which is characterized in that include the following:
1) from the background to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) cleartext information M is added using RSA Algorithm using shared bicycle company car security code as encryption key k It is close, obtain cipher-text information C;
Cipher-text information C 1-3) is imported into two-dimension code generator, generates new anti-fake two-dimension code Y;
2) user's barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, Yong Huwu Method downloads APP;
3) user hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No.;
3-12) user logs in APP;
4) when the non-first scan two dimensional code of user is hired a car, first user is verified:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully;It is no Then, it unlocks and fails.
7. a kind of method of hiring a car of shared bicycle according to claim 6, which is characterized in that the vehicle security code includes Vehicle identification code p and random code q, the vehicle identification code include: products material information, product type information, place of production information, produce Product batch information and generation temporal information.
8. a kind of method of hiring a car of shared bicycle according to claim 6, which is characterized in that the RSA Algorithm is specifically such as Under:
Generate key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then is combined into Vehicle security code;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withIt is coprime, According to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is less than log2n;Then to each clear packets m, make cryptographic calculation: c ≡ me mod n
Decryption:
Decryption operation to ciphertext block are as follows: tri- c of cd mod n。
CN201910337211.7A 2019-04-25 2019-04-25 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car Pending CN110163633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910337211.7A CN110163633A (en) 2019-04-25 2019-04-25 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910337211.7A CN110163633A (en) 2019-04-25 2019-04-25 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car

Publications (1)

Publication Number Publication Date
CN110163633A true CN110163633A (en) 2019-08-23

Family

ID=67640000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910337211.7A Pending CN110163633A (en) 2019-04-25 2019-04-25 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car

Country Status (1)

Country Link
CN (1) CN110163633A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112381553A (en) * 2020-11-20 2021-02-19 王永攀 Product anti-counterfeiting method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN105323063A (en) * 2014-06-13 2016-02-10 广州涌智信息科技有限公司 Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code
CN105976531A (en) * 2016-05-23 2016-09-28 杭州金通公共自行车科技股份有限公司 Public bicycle renting method achieved by scanning two-dimensional code
CN106548565A (en) * 2015-09-16 2017-03-29 天津乾丰机电设备有限公司 Public bicycles mobile phone is without card rent method
US20170161750A1 (en) * 2014-08-26 2017-06-08 Tencent Technology (Shenzhen) Company Limited Identity Authentication Method, Terminal Device And System
CN109242645A (en) * 2018-10-10 2019-01-18 南京信息工程大学 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN105323063A (en) * 2014-06-13 2016-02-10 广州涌智信息科技有限公司 Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code
US20170161750A1 (en) * 2014-08-26 2017-06-08 Tencent Technology (Shenzhen) Company Limited Identity Authentication Method, Terminal Device And System
CN106548565A (en) * 2015-09-16 2017-03-29 天津乾丰机电设备有限公司 Public bicycles mobile phone is without card rent method
CN105976531A (en) * 2016-05-23 2016-09-28 杭州金通公共自行车科技股份有限公司 Public bicycle renting method achieved by scanning two-dimensional code
CN109242645A (en) * 2018-10-10 2019-01-18 南京信息工程大学 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112381553A (en) * 2020-11-20 2021-02-19 王永攀 Product anti-counterfeiting method

Similar Documents

Publication Publication Date Title
CN109067524B (en) Public and private key pair generation method and system
CN101018125B (en) Radio terminal security network and card locking method based on the ellipse curve public key cipher
CN104104517B (en) The method and system of disposal password checking
JP4870155B2 (en) Electronic passport authentication protocol with enhanced privacy
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN1922816B (en) One way authentication
CN101359991A (en) Public key cipher system private key escrowing system based on identification
CN110971411B (en) SM2 homomorphic signature method for encrypting private key by multiplying based on SOTP technology
Patel Information security: theory and practice
US6640303B1 (en) System and method for encryption using transparent keys
Yin et al. Protecting private data by honey encryption
Simmons Secure communications and asymmetric cryptosystems
JPH11298470A (en) Key distribution method and system
US7360238B2 (en) Method and system for authentication of a user
US7424114B2 (en) Method for enhancing security of public key encryption schemas
CN110163633A (en) A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car
US20210044435A1 (en) Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel
Abiega-L’Eglisse et al. A New Fuzzy Vault based Biometric System robust to Brute-Force Attack
CN113779594B (en) Block chain-based data distribution sharing method and system
CN110113152B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and digital signature
CN114117392A (en) Security verification code obtaining method based on paillier encryption
CN110138547B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and serial number
Seo et al. Fuzzy vector signature and its application to privacy-preserving authentication
JP2007521676A (en) Generation and verification of Diffie-Hellman digital signatures
CN110838918B (en) Anti-quantum certificate issuing method and system based on public key pool and signature offset

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823

RJ01 Rejection of invention patent application after publication