CN110163633A - A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car - Google Patents
A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car Download PDFInfo
- Publication number
- CN110163633A CN110163633A CN201910337211.7A CN201910337211A CN110163633A CN 110163633 A CN110163633 A CN 110163633A CN 201910337211 A CN201910337211 A CN 201910337211A CN 110163633 A CN110163633 A CN 110163633A
- Authority
- CN
- China
- Prior art keywords
- code
- dimensional code
- information
- user
- dimensional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 231100000331 toxic Toxicity 0.000 claims abstract description 4
- 230000002588 toxic effect Effects 0.000 claims abstract description 4
- 238000004519 manufacturing process Methods 0.000 claims description 5
- 230000002123 temporal effect Effects 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 claims description 3
- 239000000463 material Substances 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 13
- 238000010586 diagram Methods 0.000 description 5
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 4
- 239000002994 raw material Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
- G06K7/10861—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
Abstract
The invention discloses a kind of two-dimension code anti-counterfeit authentication method of shared bicycle and methods of hiring a car, and belong to planar bar code technology and encryption technology field.The present invention includes encryption, two dimensional code generation, two-dimentional code authentication, decryption.The invention firstly uses vehicle security codes to encrypt original two dimensional code, and generates the distinctive anti-fake two-dimension code of the vehicle.Secondly, user in barcode scanning for the first time, pops up authentication interface, shooting uploads two dimensional code to backstage, and after backstage authenticates the validity and safety of two dimensional code, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.Original two dimensional code is encrypted with vehicle security code, ensure that the unforgeable of two dimensional code.The case where two dimensional code is authenticated, prevents the toxic two dimensional code downloading malice APP of scanning input from hiring a car.When user is when barcode scanning is hired a car, needs to input solution confidential information and carry out authentication, not only ensure that the equity of user in this way, but also enhance the safety of shared bicycle.
Description
Technical field
The invention belongs to planar bar code technology and encryption technology fields, and more precisely, it is shared single that the present invention relates to one kind
The two-dimension code anti-counterfeit authentication method of vehicle and method of hiring a car.
Background technique
The new things that bicycle is generated as Internet of Things cloud+epoch are shared, are city, life style locating for a kind of and people
And the novel trip mode that life attitudes are all closely bound up, it greatly facilitates the trip of citizen.However, with major shared
The addition of bicycle operator, the quantity for sharing bicycle are presented blowout and increase, and there is swindling gang on the market in original two dimensional
Trojan horse is planted on code and steals the personal information and property of user.The peaces such as userspersonal information's leakage and property are stolen
Full problem repeated, and be shared bicycle company urgent problem.
Two dimensional code is the chequered with black and white square being distributed on planar direction according to certain rules with specific geometric figure
The barcode technology of new generation of shape square matrix record data symbol information, which has, to contain much information, and error correcting capability is strong, and recognition speed is fast, secrecy
Property high, the characteristics such as traceability is high, and damage resistance is strong, and redundant is big, and cost is cheap.Mobile phone two-dimension code is planar bar code technology on mobile phone
Application, have been widely used for invitation card at present, poster is registered, business card, direction board, the various occasions such as exploitation.If using
Two dimensional code is needed when certain important events transmitting has the more demanding data of identity information, timeliness to its enciphering and deciphering algorithm
It optimizes.
The maximum feature of public key algorithm is will to encrypt to separate with decryption capabilities using two association keys, one of them
Key is disclosed, referred to as public-key cryptography, referred to as open key;Another key be for user it is dedicated, thus be secrecy, claim
For privacy key, abbreviation secret keys, for decrypting.Therefore public-key cryptosystem is also referred to as conbined public or double key cipher system.Algorithm system has
Following key property: it is computationally infeasible to solve secret keys for known cryptographic algorithm and encryption key.It is widely used in each
Kind information is encrypted, and is also widely used in authentication, such as RSA technology.If using two dimensional code certain
When important events transmitting has the data of identity information, then its ciphering process should be optimized in conjunction with the above encryption technology.
Summary of the invention
It is an object of the present invention to pour in society for bicycle is nowadays shared, there is swindling gang on the market and exist
The shared bicycle safety problem such as plantation trojan horse and personal information and the property of stealing user, proposes one on original two dimensional code
The shared bicycle two-dimension code anti-counterfeit authentication method of kind and method of hiring a car.
What the present invention adopts the following technical solutions to realize:
A kind of shared bicycle two-dimension code anti-counterfeit authentication method, including encryption, anti-fake two-dimension code generate, two-dimentional code authentication, solution
It is close, in which:
(1) encrypt: for share vehicle security code that bicycle company provides as encryption key, to original two dimensional code into
Row encryption;
(2) anti-fake two-dimension code generates: for being handled two-dimensional barcode information, being generated the anti-fake two-dimension code of encryption;
(3) two-dimentional code authentication: to prevent the toxic two dimensional code downloading malice APP of scanning input from hiring a car, there is information and wealth
Produce the problem of losing;
(4) it decrypts: being decrypted with to the two dimensional code of encryption to obtain two-dimensional barcode information.
Further, the vehicle security code that the shared bicycle company provides includes vehicle identification code and random code, the vehicle
Identification code includes: vehicle material information, vehicle type information, vehicle place of production information, processor's information, product batches letter
Breath and identification code generate temporal information.
Further, described to two-dimensional barcode information processing, specific treatment process is as follows:
(1) original two dimensional code is decoded by two-dimensional code decoder, generates original two dimensional code information;
(2) using vehicle security code as encryption key, original two dimensional code is encrypted, generates ciphertext;
(3) above-mentioned ciphertext is inputted in two-dimension code generator, generates new anti-fake two-dimension code.
Further, the detailed process of the two dimension code authentication are as follows: user pops up authentication interface, shooting in barcode scanning for the first time
Two dimensional code is uploaded to backstage, user side can download APP after authenticating the validity and safety of two dimensional code from the background.Specific authenticating party
Method is as follows:
(1) authenticate the safety of two dimensional code: the two dimensional code that shared bicycle company uploads according to user is examined with two-dimension code safe
Software is surveyed to detect it, if dangerous, the unusable bicycle of direct authentification failure, i.e. user;
(2) authenticate the validity of two dimensional code: if detect two dimensional code be it is safe, shared bicycle company passes through two dimension
Code decoder decodes two dimensional code, and the two-dimensional barcode information in information and company database decoded compares, if it exists the information,
It then proves that the two dimensional code is effective, otherwise shows that two dimensional code is invalid, is i.e. the unusable bicycle of user.
Further, the encryption and decryption, are all made of RSA encryption and decryption technology.
The present invention shares the method for hiring a car of bicycle are as follows:
1) to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, using RSA technology, to cleartext information M into
Row encryption, obtains cipher-text information C.Vehicle security code includes vehicle identification code p and random code q, and the vehicle identification code includes: to produce
Product raw material information, product type information, place of production information, product batches information and generation temporal information.Detailed process such as Fig. 1 institute
Show.
1-3) as shown in Fig. 2, cipher-text information C is imported two-dimension code generator, new anti-fake two-dimension code Y is generated.
2) barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, it uses
Family can not download APP.Detailed process is as shown in Figure 3.
3) it hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No..
3-12) user logs in APP.Detailed process is as shown in Figure 4.
4) as shown in figure 5, first being verified to user when scanning input two dimensional code is hired a car:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully;
Otherwise, it unlocks and fails.
The beneficial effect comprise that
(1) the invention firstly uses vehicle security codes encrypts original two dimensional code, and it is distinctive anti-to generate the vehicle
Pseudo- two dimensional code.
(2) user pops up authentication interface in barcode scanning for the first time, and shooting uploads two dimensional code to backstage, and backstage authenticates two dimensional code
Validity and safety after, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.With anti-fake
Code encrypts original two dimensional code, ensure that the unforgeable of two dimensional code.
(3) the case where two dimensional code being authenticated, preventing scanning input toxic two dimensional code downloading malice APP from hiring a car, when with
Family needs to input solution confidential information when barcode scanning is hired a car, and carries out authentication, not only ensure that the equity of user in this way, but also enhance
The safety of shared bicycle.
Detailed description of the invention
Fig. 1 is ciphering process schematic diagram of the invention.
Fig. 2 is two dimensional code generating process schematic diagram of the invention.
Fig. 3 is two dimensional code verification process schematic diagram of the invention.
Fig. 4 is that user of the invention hires a car detailed process schematic diagram for the first time.
Fig. 5 is decryption of the invention and verification process schematic diagram.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and in conjunction with example.
The present invention uses RSA encryption and decryption technology, improves current shared bicycle original two dimensional code.Innovation of the invention
It is to encrypt original two dimensional code with security code, ensure that the unforgeable of two dimensional code.User is in barcode scanning for the first time, bullet
Authentication interface out, shooting upload two dimensional code to backstage, backstage authenticate two dimensional code validity and safety after user side can under
APP is carried, provides second guarantee for the safety of two dimensional code and APP.When user scan the two-dimensional code hire a car when, need to input solution
Confidential information carries out authentication, ensure that the equity of user.
The present invention uses RSA encryption and decryption technology, improves current shared bicycle original two dimensional code.Current shared bicycle
Two dimensional code is too simple, and there are safety problems.Socially, some criminals are on the basis of shared bicycle original two dimensional code
On, two dimensional code is forged, the two dimensional code of trojan horse is had in the two dimensional code, it, can be normal when the scanning input two dimensional code downloads APP
It hires a car, but trojan horse therein can be implanted into the mobile phone of user, to steal the personal information and property of user.Therefore, originally
The innovation of invention is, first of guarantee: is encrypted, be ensure that shared bicycle original two dimensional code with vehicle security code
The unforgeable of two dimensional code.Second guarantee: user will pop up authentication interface, user's shooting in barcode scanning for the first time on mobile phone
Two dimensional code, and it is uploaded to backstage, after receiving two dimensional code from the background, the two dimensional code can be authenticated, only when two-dimentional code authentication passes through,
After validity and safety, user side can download APP, provide second guarantee for the safety of two dimensional code and APP.When
User scan the two-dimensional code hire a car when, need to input solution confidential information, carry out authentication, ensure that the equity of user.
The method of hiring a car of shared bicycle proposed by the present invention is embodied using following procedure:
1) to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, using RSA technology, to cleartext information M into
Row encryption, obtains cipher-text information C.Vehicle security code includes vehicle identification code p and random code q, and the vehicle identification code includes: to produce
Product raw material information, product type information, place of production information, product batches information and generation temporal information.Detailed process such as Fig. 1 institute
Show.
1-3) as shown in Fig. 2, cipher-text information C is imported two-dimension code generator, new anti-fake two-dimension code Y is generated.
2) barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, it uses
Family can not download APP.Detailed process is as shown in Figure 3.
3) it hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No..
3-12) user logs in APP.
4) as shown in figure 4, first being verified to user when the non-first scan two dimensional code of user is hired a car:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully;
Otherwise, it unlocks and fails.
The RSA enciphering and deciphering algorithm that the present invention uses, specific method are described as follows:
1. the generation of key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then group
Synthesize vehicle security code;
(2) it enables n=p*q and calculates the value,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) private key d is calculated, is met
That is d is e in mouldUnder multiplicative inverse, because e withIt is coprime, by modular arithmetic it is found that its multiplicative inverse one
It is fixed to exist;
It (5) is open key with { e, n }, { d, n } is secret keys.
2. encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is small
In log2n.Then to each clear packets m, make cryptographic calculation:
c≡memodn
3. decryption:
Decryption operation to ciphertext block are as follows:
c≡cdmodn
Although the present invention has been described by way of example and in terms of the preferred embodiments, embodiment is not for the purpose of limiting the invention.Not
In the case where being detached from the principle of the present invention and objective, any equivalent change or retouch done also belongs to protection of the invention
Range.
Claims (8)
1. a kind of shared bicycle two-dimension code anti-counterfeit and authentication method characterized by comprising
Encrypt and generate anti-fake two-dimension code: the vehicle security code for being provided using shared bicycle company is as encryption key, to original
Beginning two dimensional code is encrypted;Encrypted two-dimensional barcode information is handled, is generated the anti-fake two-dimension code of encryption;
Two-dimentional code authentication: preventing scanning input toxic two dimensional code downloading malice APP from hiring a car, there is information and property loses
Problem;
Decryption: it is decrypted with to the two dimensional code of encryption to obtain two-dimensional barcode information.
2. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the encryption
When the vehicle security code that uses include: vehicle identification code p and random code q, the vehicle identification code include: vehicle material information,
Vehicle type information, vehicle place of production information, processor's information, product batches information and identification code generate temporal information.
3. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 2 and authentication method, which is characterized in that the encryption
And the method for generating anti-fake two-dimension code is as follows:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) using shared bicycle company car security code as encryption key k, cleartext information M is encrypted, ciphertext is obtained
Information C;
Cipher-text information C 1-3) is imported into two-dimension code generator, generates new two dimensional code Y.
4. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the certification
Method is as follows:
(1) authenticate the safety of two dimensional code: the two dimensional code that shared bicycle company uploads according to user is detected soft with two-dimension code safe
Part detects it, if dangerous, the unusable bicycle of direct authentification failure, i.e. user;
(2) authenticate two dimensional code validity: if detect two dimensional code be it is safe, share bicycle company pass through two dimensional code solution
Code device decodes two dimensional code, and the two-dimensional barcode information in information and company database decoded compares, and the information, then demonstrate,prove if it exists
The bright two dimensional code is effective, otherwise shows that two dimensional code is invalid, i.e. the unusable bicycle of user.
5. a kind of shared bicycle two-dimension code anti-counterfeit according to claim 1 and authentication method, which is characterized in that the encryption
RSA Algorithm is used with decryption, specific:
First, the generation of key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then is combined into
Vehicle security code;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withIt is coprime,
According to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Second, encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is less than
log2n.Then to each clear packets m, make cryptographic calculation: c ≡ me mod n
Third, decryption:
Decryption operation to ciphertext block are as follows: c ≡ cd mod n。
6. a kind of method of hiring a car of shared bicycle, which is characterized in that include the following:
1) from the background to shared bicycle original two dimensional code encryption:
1-1) original two dimensional code X is decoded with two-dimensional code decoder, obtains cleartext information M;
1-2) cleartext information M is added using RSA Algorithm using shared bicycle company car security code as encryption key k
It is close, obtain cipher-text information C;
Cipher-text information C 1-3) is imported into two-dimension code generator, generates new anti-fake two-dimension code Y;
2) user's barcode scanning for the first time carries out two-dimentional code authentication:
2-1) user, which opens mobile phone and sweeps, sweeps or wechat etc. carries out barcode scanning;
2-2) pop up two dimensional code authentication interface, it is desirable that user shoots and uploads two dimensional code;
2-3) user shoots and uploads two dimensional code;
It 2-4) uploads successfully, backstage authenticates two dimensional code, skips to 2-6);
Failure 2-5) is uploaded, 2-3 is returned);
2-6) whether certification two dimensional code in backstage is effective and safe;
2-7) if effective and safe two dimensional code, then pops up APP downloading interface and user is instructed to download APP;Otherwise, Yong Huwu
Method downloads APP;
3) user hires a car for the first time:
3-1) user opens APP;
3-2) user registers first;
3-3) enter register interface, input handset number is to obtain identifying code;
3-4) mobile phone receives short message verification code, skips to 3-6);
3-5) mobile phone does not receive identifying code, returns to 3-3);
3-6) user inputs identifying code;
If 3-7) identifying code input is correct, 3-10 is skipped to);
If 3-8) identifying code input error skips to 3-6);
If 3-9) not inputting identifying code more than 5 minutes, it is back to 3-3);
3-10) complete registration;
3-11) user carries out real-name authentication, fills in name, the information such as ID card No.;
3-12) user logs in APP;
4) when the non-first scan two dimensional code of user is hired a car, first user is verified:
When 4-1) scanning input two dimensional code Y hires a car, the identifying code that background system is sent, i.e. decruption key will receive;
4-2) identifying code that user's input receives is decrypted;
4-3) successful decryption, then it represents that authenticate successfully;Otherwise, authentification failure is indicated;
4-4) cleartext information shown by the two dimensional code after decryption is compared from the background, after comparing successfully, is unlocked successfully;It is no
Then, it unlocks and fails.
7. a kind of method of hiring a car of shared bicycle according to claim 6, which is characterized in that the vehicle security code includes
Vehicle identification code p and random code q, the vehicle identification code include: products material information, product type information, place of production information, produce
Product batch information and generation temporal information.
8. a kind of method of hiring a car of shared bicycle according to claim 6, which is characterized in that the RSA Algorithm is specifically such as
Under:
Generate key:
(1) Big prime p and q that bicycle company chooses two secrecy are shared, as vehicle identification code and random code, and then is combined into
Vehicle security code;
(2) n=p*q is calculated,WhereinIt is the Euler's function value of n;
(3) an integer e is chosen, is metAnd
(4) d is calculated, is metThat is d is e in mouldUnder multiplicative inverse, because e withIt is coprime,
According to modular arithmetic, its multiplicative inverse is certainly existed;
It (5) is open key with { e, n }, { d, n } is secret keys;
Encryption:
Plaintext Bit String is grouped first when encryption, so that the corresponding decimal system of each grouping is less than n, i.e. block length is less than
log2n;Then to each clear packets m, make cryptographic calculation: c ≡ me mod n
Decryption:
Decryption operation to ciphertext block are as follows: tri- c of cd mod n。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910337211.7A CN110163633A (en) | 2019-04-25 | 2019-04-25 | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910337211.7A CN110163633A (en) | 2019-04-25 | 2019-04-25 | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110163633A true CN110163633A (en) | 2019-08-23 |
Family
ID=67640000
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910337211.7A Pending CN110163633A (en) | 2019-04-25 | 2019-04-25 | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110163633A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112381553A (en) * | 2020-11-20 | 2021-02-19 | 王永攀 | Product anti-counterfeiting method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932148A (en) * | 2012-10-25 | 2013-02-13 | 成都市易恒信科技有限公司 | System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication |
CN105323063A (en) * | 2014-06-13 | 2016-02-10 | 广州涌智信息科技有限公司 | Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code |
CN105976531A (en) * | 2016-05-23 | 2016-09-28 | 杭州金通公共自行车科技股份有限公司 | Public bicycle renting method achieved by scanning two-dimensional code |
CN106548565A (en) * | 2015-09-16 | 2017-03-29 | 天津乾丰机电设备有限公司 | Public bicycles mobile phone is without card rent method |
US20170161750A1 (en) * | 2014-08-26 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | Identity Authentication Method, Terminal Device And System |
CN109242645A (en) * | 2018-10-10 | 2019-01-18 | 南京信息工程大学 | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning |
-
2019
- 2019-04-25 CN CN201910337211.7A patent/CN110163633A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932148A (en) * | 2012-10-25 | 2013-02-13 | 成都市易恒信科技有限公司 | System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication |
CN105323063A (en) * | 2014-06-13 | 2016-02-10 | 广州涌智信息科技有限公司 | Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code |
US20170161750A1 (en) * | 2014-08-26 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | Identity Authentication Method, Terminal Device And System |
CN106548565A (en) * | 2015-09-16 | 2017-03-29 | 天津乾丰机电设备有限公司 | Public bicycles mobile phone is without card rent method |
CN105976531A (en) * | 2016-05-23 | 2016-09-28 | 杭州金通公共自行车科技股份有限公司 | Public bicycle renting method achieved by scanning two-dimensional code |
CN109242645A (en) * | 2018-10-10 | 2019-01-18 | 南京信息工程大学 | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112381553A (en) * | 2020-11-20 | 2021-02-19 | 王永攀 | Product anti-counterfeiting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109067524B (en) | Public and private key pair generation method and system | |
CN101018125B (en) | Radio terminal security network and card locking method based on the ellipse curve public key cipher | |
CN104104517B (en) | The method and system of disposal password checking | |
JP4870155B2 (en) | Electronic passport authentication protocol with enhanced privacy | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
CN1922816B (en) | One way authentication | |
CN101359991A (en) | Public key cipher system private key escrowing system based on identification | |
CN110971411B (en) | SM2 homomorphic signature method for encrypting private key by multiplying based on SOTP technology | |
Patel | Information security: theory and practice | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
Yin et al. | Protecting private data by honey encryption | |
Simmons | Secure communications and asymmetric cryptosystems | |
JPH11298470A (en) | Key distribution method and system | |
US7360238B2 (en) | Method and system for authentication of a user | |
US7424114B2 (en) | Method for enhancing security of public key encryption schemas | |
CN110163633A (en) | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car | |
US20210044435A1 (en) | Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel | |
Abiega-L’Eglisse et al. | A New Fuzzy Vault based Biometric System robust to Brute-Force Attack | |
CN113779594B (en) | Block chain-based data distribution sharing method and system | |
CN110113152B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and digital signature | |
CN114117392A (en) | Security verification code obtaining method based on paillier encryption | |
CN110138547B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and serial number | |
Seo et al. | Fuzzy vector signature and its application to privacy-preserving authentication | |
JP2007521676A (en) | Generation and verification of Diffie-Hellman digital signatures | |
CN110838918B (en) | Anti-quantum certificate issuing method and system based on public key pool and signature offset |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190823 |
|
RJ01 | Rejection of invention patent application after publication |