CN110298421A - A kind of online generation, offline generation and the verification method and device of two dimensional code - Google Patents

A kind of online generation, offline generation and the verification method and device of two dimensional code Download PDF

Info

Publication number
CN110298421A
CN110298421A CN201910563025.5A CN201910563025A CN110298421A CN 110298421 A CN110298421 A CN 110298421A CN 201910563025 A CN201910563025 A CN 201910563025A CN 110298421 A CN110298421 A CN 110298421A
Authority
CN
China
Prior art keywords
dimensional code
user
information
channel
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910563025.5A
Other languages
Chinese (zh)
Other versions
CN110298421B (en
Inventor
刘红霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunbao Big Data Industry Development Co Ltd
Original Assignee
Yunbao Big Data Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunbao Big Data Industry Development Co Ltd filed Critical Yunbao Big Data Industry Development Co Ltd
Priority to CN201910563025.5A priority Critical patent/CN110298421B/en
Publication of CN110298421A publication Critical patent/CN110298421A/en
Application granted granted Critical
Publication of CN110298421B publication Critical patent/CN110298421B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1443Methods for optical code recognition including a method step for retrieval of the optical code locating of the code in an image

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a kind of online generation of two dimensional code, offline generates and verification method and device, which comprises receives two dimensional code and generates request, it includes customer identification information and platform identification information in request that two dimensional code, which generates,;The corresponding information for having opened channel of customer identification information is obtained to the corresponding management platform of land identification information;Two dimensional code is generated according to the information for having opened channel, and two dimensional code is back to user terminal.By the technical solution of the application, user can improve user's operation efficiency in the multiple support channels scene that the user has access authority through verification certification without switching application program.

Description

A kind of online generation, offline generation and the verification method and device of two dimensional code
Technical field
This application involves network technique fields, and in particular to a kind of online generation of two dimensional code, offline generation and authentication Method and device.
Background technique
Two dimensional code is also known as two-dimensional bar code, is with certain specific integrated images according to certain rules at plane (on two-dimensional directional) The chequered with black and white figure of distribution records data symbol information, for one-dimension code, it is big with information storage, at The advantages that this low and fault-tolerant ability is strong exists in terms of commodity tracing, payment consumption, Internet resources and is widely applied.
However, two dimensional code in the related technology only supports the authentication in single channel scene, this makes user exist It is necessarily required to find and open the corresponding two dimensional code of channel scene under different channel scenes, excessively cumbersome operation will lead to use Inconvenience in the use of family, especially in the scene environment that flow of the people is big, group is complicated, cumbersome operation is unfavorable for going out for user Row safety.
Summary of the invention
In view of this, the application provides online generation, offline generation and the verification method and device of a kind of two dimensional code, realize Different application scenarios can share same set of two dimensional code, this makes user can be multiple and different without switching application program Application scenarios under access purview certification, and then obtain corresponding scene service, eliminate a set of two dimension in the related technology Code only supports the constraint sense of single application scene, improves the operating efficiency of user.
To achieve the above object, it is as follows to provide technical solution by the application:
According to a first aspect of the present application, a kind of online generation method of two dimensional code is proposed, signaling center, institute are applied to The method of stating includes:
It receives two dimensional code and generates request, the two dimensional code generates in request to be believed comprising customer identification information and land identification Breath;
Channel has been opened to the land identification information corresponding management platform acquisition customer identification information is corresponding Information;
Two dimensional code is generated according to the information for having opened channel, and the two dimensional code is back to the user terminal.
According to a second aspect of the present application, a kind of online generation method of two dimensional code is proposed, user terminal, institute are applied to The method of stating includes:
It sends two dimensional code and generates request, the two dimensional code generates the customer identification information and target that request includes local terminal user The land identification information of the corresponding management platform of channel equipment;
The two dimensional code that the signaling center returns is received, the two dimensional code is identified by the signaling center according to the user The corresponding information for having opened channel of information generates, and the information for having opened channel is corresponding from the land identification information Manage platform.
According to the third aspect of the application, a kind of offline generation method of two dimensional code is proposed, is applied to signaling center, institute The method of stating includes:
Offline encoded information is generated for target user, the offline encoded information includes that the target user is flat in management What is be recorded at platform has opened the information of channel, and the offline encoded information does not include the corresponding user's label of the target user Name;
The offline encoded information is sent to the target user, with private by corresponding user by the target user After key generates user's signature, offline two dimensional code is generated according to the user's signature and the offline encoded information.
According to the fourth aspect of the application, a kind of offline generation method of two dimensional code is proposed, is applied to user terminal, institute The method of stating includes:
Receive signaling center send offline encoded information, wherein the offline encoded information include target user The information of channel is opened, and the offline encoded information does not include the corresponding user's signature of the target user;
User's signature processing is carried out to the offline encoded information, to obtain user's signature information;
Offline two dimensional code is generated according to the user's signature information and the offline encoded information.
According to the 5th of the application the aspect, a kind of two dimensional code verifying generation method is proposed, channel equipment is applied to, it is described Method includes:
Obtain the two dimensional code that user to be verified provides;
The two dimensional code is parsed, it is described to have opened channel to obtain the information for having opened channel that the two dimensional code includes Information be used for show the user to be verified have access authority channel;
When channel access conditions is satisfied, determine that the user to be verified passes through verifying;Otherwise, it is determined that described to be verified User is unverified;Wherein, the channel access conditions includes: the user to be verified to the corresponding canal of the channel equipment Road has access authority.
According to the 6th of the application the aspect, a kind of online generating means of two dimensional code are proposed, are applied to signaling center, institute Stating device includes:
Receiving unit receives two dimensional code and generates request, and the two dimensional code generates in request comprising customer identification information peace Platform identification information;
Acquiring unit, it is corresponding that the corresponding management platform of Xiang Suoshu land identification information obtains the customer identification information Open the information of channel;
Generation unit generates two dimensional code according to the information for having opened channel;
The two dimensional code is back to the user terminal by transmission unit.
According to the 7th of the application the aspect, a kind of online generating means of two dimensional code are proposed, are applied to user terminal, institute Stating device includes:
Transmission unit sends two dimensional code and generates request, and the two dimensional code generates request and identifies comprising the user of local terminal user The land identification information of information and the corresponding management platform of target channel equipment;
Receiving unit receives the two dimensional code that the signaling center returns, and the two dimensional code is by the signaling center according to institute It states the corresponding information for having opened channel of customer identification information to generate, the information for having opened channel comes from the land identification The corresponding management platform of information.
According to the eighth aspect of the application, a kind of offline generating means of two dimensional code are proposed, are applied to signaling center, institute Stating device includes:
Generation unit generates offline encoded information for target user, and the offline encoded information is used comprising the target The information for having opened channel that family is recorded at management platform, and the offline encoded information does not include the target user couple The user's signature answered;
The offline encoded information is sent to the target user, to be led to by the target user by the first transmission unit After crossing corresponding private key for user generation user's signature, offline two dimension is generated according to the user's signature and the offline encoded information Code.
According to the 9th of the application the aspect, a kind of offline generating means of two dimensional code are proposed, are applied to user terminal, institute Stating device includes:
First receiving unit receives the offline encoded information that signaling center is sent, wherein the offline encoded information includes The information for having opened channel of target user, and the offline encoded information does not include the corresponding user's label of the target user Name;
Signature unit carries out user's signature processing to the offline encoded information, to obtain user's signature information;
First generation unit generates offline two dimensional code according to the user's signature information and the offline encoded information.
According to the tenth of the application the aspect, a kind of two dimensional code verifying device is proposed, channel equipment, described device are applied to Include:
First acquisition unit obtains the two dimensional code that user to be verified provides;
First resolution unit parses the two dimensional code, to obtain the information for having opened channel that the two dimensional code includes, institute The information for having opened channel is stated for showing that the user to be verified has the channel of access authority;
First judging unit determines that the user to be verified passes through verifying when channel access conditions is satisfied;Otherwise, Determine that the user to be verified is unverified;Wherein, the channel access conditions includes: the user to be verified to the canal Equipment corresponding channel in road has access authority.
By above technical scheme as it can be seen that by the improvement to two dimensional code generating mode, so that different channels can pass through Same set of two dimensional code is verified, and under the application scenarios for carrying out multiple support channels verification using two dimensional code, user answers without switching Purview certification can be carried out based on same set of two dimensional code with program, and then obtains the corresponding scene service of channel, improve user Operating efficiency.
Detailed description of the invention
Fig. 1 is to be generated online according to one of one exemplary embodiment of the application two dimensional code, generate and verify offline Application scenario diagram;
Fig. 2 is the flow chart according to the online generation method of one of one exemplary embodiment of the application two dimensional code;
Fig. 3 is the flow chart according to the online generation method of another two dimensional code in one exemplary embodiment of the application;
Fig. 4 is the interaction figure according to the online generation method of one of one exemplary embodiment of the application two dimensional code;
Fig. 5 is the flow chart according to the offline generation method of one of one exemplary embodiment of the application two dimensional code;
Fig. 6 is the flow chart according to the offline generation method of another two dimensional code in one exemplary embodiment of the application;
Fig. 7 is the interaction figure according to the offline generation method of one of one exemplary embodiment of the application two dimensional code;
Fig. 8 is the interaction figure according to one of one exemplary embodiment of the application channel opening process;
Fig. 9 is the flow chart according to one of one exemplary embodiment of the application 2 D code verification method;
Figure 10 is the interaction figure according to one of one exemplary embodiment of the application 2 D code verification method;
Figure 11 is the interaction figure according to another 2 D code verification method in one exemplary embodiment of the application;
Figure 12 is the schematic configuration diagram according to one of one exemplary embodiment of the application electronic equipment;
Figure 13 is the block diagram according to the online generating means of one of one exemplary embodiment of the application two dimensional code;
Figure 14 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application;
Figure 15 is the block diagram according to the online generating means of another two dimensional code in one exemplary embodiment of the application;
Figure 16 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application;
Figure 17 is the block diagram according to the offline generating means of one of one exemplary embodiment of the application two dimensional code;
Figure 18 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application;
Figure 19 is the block diagram according to the offline generating means of another two dimensional code in one exemplary embodiment of the application;
Figure 20 is the schematic configuration diagram according to the also a kind of electronic equipment in one exemplary embodiment of the application;
Figure 21 is the block diagram that device is verified according to one of one exemplary embodiment of the application two dimensional code.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
Fig. 1 is to be generated online according to one of one exemplary embodiment of the application two dimensional code, generate and verify offline Application scenario diagram, as shown in Figure 1, signaling center 101, channel server 102 involved in the application scenarios, management platform 103, canal Road equipment and user terminal 105, wherein channel equipment may include channel server 102 and channel terminal 104.
Signaling center and management platform, signaling center and channel equipment, management platform and channel equipment and channel equipment In channel server and channel terminal between can be communicated by network implementations information, and then complete interactive and data places Reason.The network may include wired or wireless telecommunication installation, such as the network may include local area network (" LAN "), wide area Net (" WAN "), intranet, internet, mobile telephone network, Virtual Private Network (VPN), honeycomb fashion or other mobile radio communications Network, bluetooth, NFC or any combination thereof, in specific opposite joining relation, channel server, management platform, channel terminal are not limited solely to One, as shown in Figure 1, signaling center can dock multiple user terminals, signaling center can also be associated with multiple management platforms, such as Management platform 103a, management platform 103b in Fig. 1, signaling center can be associated with multiple support channels server, the canal of example as shown in figure 1 Road server 102a and channel server 102b, signaling center can be associated with multiple support channels terminal, the channel terminal of example as shown in figure 1 104a and channel terminal 104b, managing platform can be responsible for safeguarding the information of multiple support channels equipment and multiple user terminals, Channel equipment can obtain and execute the authorization check processing of multiple users, the user terminal 105a and user terminal of example as shown in figure 1 105b。
Management platform framework can be related to front-end interface and rear end, and front-end interface shows on user terminal, can be Web page, cell phone software or application program suitable for portable terminal etc., specific installation form can be user terminal Pre-installed software or the third party software etc. installed by user.Rear end carries out the friendship with database according to service logic Mutually, it executes corresponding with operation of the user in front-end interface information and the treatment processes such as transfers, feeds back, and processing result is fed back In front-end interface.For convenient for statement, management platform server hereinafter referred to as manages platform, the front-end interface letter of subscriber terminal side Referred to as user terminal.
It include user and the identification information for managing platform, the identification information for generating the related encoded information of two dimensional code It is obtained from management platform by signaling center, signaling center can be docked with multiple management platforms, can be between multiple management platforms Classifying and dividing is carried out according to the user information that the mode classification of different dimensions treats maintenance, can such as be carried out according to administrative region Divide, for example, an administrative city resident relevant information by same management platform safeguard or an administrative area in The relevant information of inhabitant is safeguarded etc. by the same management platform;It can also be divided according to group, social organization, Such as the relevant information of the member of same company, factory, school by it is same management platform safeguard or same political party at The same management platform of relevant information of member is safeguarded;Position that can also be current according to user terminal between multiple management platforms Information determines the management platform that current location information is belonged to.The application treats stroke of the member of maintenance to multiple management platforms The mode of dividing is without limitation.
The relevant service-specifics such as encoded information needed for signaling center undertakes and generates two dimensional code, offer generates two dimensional code, The service can be set to independent physical equipment according to specific volume of services, it is also possible by means virtual machine operation, or In the form of the software that any operating system can be compatible with, the application is not limited this.Based on transmitted by acquisition user terminal Solicited message communication connection, signaling center can send two dimensional code generated to user terminal or generate needed for two dimensional code Encoded information so that when user by the two dimensional code that goes out shown on user terminal the case where passing through the verification of channel equipment Under, the service of channel offer is provided.
Application scenarios under channel equipment and line are associated setting, may include channel server and channel terminal, canal Road terminal can be the channel management equipment of gate, the equipment for supporting two dimensional code detection function etc.;Application scenarios can relate to And dining room, park, library etc..Further, channel equipment can be completed according to preset processor to acquired two dimension The verification of code, which may include central processing unit (Central Processing Unit, CPU), graphics processor (Graphics Processing Unit, GPU), network processing unit (Network Processor, NP), Digital Signal Processing Device (DSP), specific integrated circuit (ASIC), any combination in field programmable gate array (FPGA).
For the application is further described, the following example is provided.It is specifically answered below by embodiment and combination It is described in detail with specific embodiment of the scene to the application.
Fig. 2 is according to the flow chart of the online generation method of one of one exemplary embodiment of the application two dimensional code, such as Shown in Fig. 2, this method can be applied to signaling center, and this method may comprise steps of:
Step 201, it receives two dimensional code and generates request, it includes customer identification information and platform in request that the two dimensional code, which generates, Identification information.
Step 202, it is corresponding to obtain the customer identification information for the corresponding management platform of Xiang Suoshu land identification information Open the information of channel.
Step 203, two dimensional code is generated according to the information for having opened channel, and the two dimensional code is back to the use Family terminal.
In one embodiment, it can be signed by the corresponding platform private key generating platform of management platform, and then according to containing The encoded information of the information and platform signature of having opened channel generates two dimensional code, and by signaling center that the platform private key is corresponding Platform public key is sent to each channel equipment associated by management platform, allows channel equipment corresponding based on the management platform The platform public key platform signature that includes to the two dimensional code that user terminal is shown verify.
Further, signaling center can be chosen in the corresponding multiple groups key of management platform according to preset rules one group it is close Key includes by a kind of platform public key that algorithm obtains in the platform key to as the platform key signed for generating platform With platform private key so that signaling center is signed based on selected platform private key generating platform, and the platform key is corresponding Platform key number is added in the encoded information for generating two dimensional code, so that channel equipment is parsed from the two dimensional code After the platform key number, the platform public key determined for verifying platform signature is numbered according to the platform key, and use The platform public key carries out signature check.
It further, further include key validity period in the encoded information for generating two dimensional code, for indicating the key It is authorized to the available time, which includes platform key, user key.In detailed process, signaling center is to identified Corresponding key validity period is arranged in key information, and key validity period corresponding field is added to the corresponding coding of corresponding secret key In information, so that channel equipment after parsing key validity period in two dimensional code, is signed according to the key validity verification platform Whether corresponding platform code key is in validity period.
In another embodiment, user's signature can be generated by the corresponding private key for user of customer identification information, and then made Signaling center according to the encoded information generation two dimensional code for including user's signature, client public key corresponding to private key for user, make Channel equipment is obtained after getting two dimensional code, user's label can be carried out to user's signature according to the client public key that two dimensional code parses Name verification.
In another embodiment, signaling center can be according to including two dimensional code effective time and the coding of code timestamp out Information generates two dimensional code so that channel equipment according to two dimensional code effective time and code timestamp out and be greater than channel equipment verification Determine that two dimensional code is examined by two dimensional code validity period at the time of two dimensional code, otherwise, it determines two dimensional code is invalid.
Fig. 3 be according to the flow chart of the online generation method of another two dimensional code in one exemplary embodiment of the application, As shown in figure 3, this method can be applied to user terminal, this method be may comprise steps of:
Step 301, it sends two dimensional code and generates request, the two dimensional code generates request and identifies letter comprising the user of local terminal user Cease the land identification information of management platform corresponding with target channel equipment.
Step 302, the two dimensional code that the signaling center returns is received, the two dimensional code is as the signaling center according to The corresponding information for having opened channel of customer identification information generates, and the information for having opened channel is believed from the land identification Cease corresponding management platform.
As can be seen from the above embodiments, in user terminal in the two dimensional code that is returned of received signaling center, include this User terminal currently logged on user has all channel mark information of access authority, so that user can be received by showing Two dimensional code has the purview certification of the channel of access authority by any one user, in the process without switching application Program improves operating efficiency.
Fig. 4 is according to the interaction figure of the online generation method of one of one exemplary embodiment of the application two dimensional code, such as Shown in Fig. 4, signaling center is related in the interactive process, user terminal manages platform, which may include following step It is rapid:
Step 401, the two dimensional code that management platform receives user terminal transmission generates request.
When trigger action of the user in user terminal execution generation two dimensional code, formed accordingly in response to the trigger action Two dimensional code generates the request instruction of request.User terminal can obtain the customer identification information of target user automatically and target is used The land identification information of management platform belonging to family, and then the two dimensional code generation request that may include customer identification information is generated, and By user terminal by the two dimensional code generate request be sent to the corresponding management platform of platform identification information.
Step 402, management platform determines the corresponding information for having opened channel of customer identification information.
Customer identification information is used to identify the characteristic information of active user's terminal institute login user, can believe for user account Breath, user's pet name, or to user account information carry out compression processing breviary information, with improve request generate, send and The treatment effeciency of parsing, it is readily appreciated that all information that can uniquely characterize user terminal currently logged on user belongs to this Shen Please in protection scope about user identity information, the application to the specific manifestation form of user identity information without limitation.
Land identification information can be used for identifying the characteristic information of management platform, and user terminal manages platform by determining, And then obtain the corresponding platform identification information of management platform.
For manage platform method of determination can there are many, management platform can for active user's terminal log in user The management platform that is belonged to or it can be based on LBS by user terminal (Location Based Service is based on position Service) the management platform that is belonged to of target application scene, determine corresponding management platform of acquisition request to be sent etc., this Shen Please without limitation to the method for determination of management platform.
Step 403, signaling center receives transmitted by management platform containing information, the user's identification letter for having opened channel The two dimensional code of breath generates request.
In one embodiment, management platform receives the solicited message that user terminal generates request about two dimensional code, and management is flat Stylobate determines the corresponding customer identification information of the user terminal and platform identification information in received request information, and then obtains The corresponding information for having opened channel of the user identity information, and hair will be sent to comprising the solicited message for having opened channel information Code center, with by signaling center based on institute it is received opened channel information generation two dimensional code.
In another embodiment, signaling center can directly receive containing customer identification information, putting down for user terminal transmission The two dimensional code of platform identification information generates request, and then is generated based on the received two dimensional code of institute and request to determine that customer identification information is corresponding The information for having opened channel.In the specific determination process to the information for having opened channel, signaling center can be inquired pre-stored The information list for having opened channel or signaling center can be sent to management platform and open the acquisition of information of channel and ask It asks, and then the corresponding information for having opened channel of customer identification information, this Shen is determined according to the response message that management platform returns It please not limit this.
Step 404, determine that two dimensional code generates the information for having opened channel, customer identification information and the platform identification in request Information.
Step 405, information related with key is determined.Information related with key may include that key information, platform are close Key number information and key validity period.
The key information includes platform key and user key, and platform key passes through to the corresponding platform of multi units tube platform According to determined by preset rules in key, user key is and key information corresponding to customer identification information, user key It can be determined according to preset rules.
In the specific implementation process, determine whether platform key can be in pre- for identification current time according to preset rules If in the period, if it is not, then determining a group platform key, Huo Zhesui at random in the multiple groups key according to corresponding to management platform Machine generates a group platform key;Otherwise, then platform key determined by the last time is obtained.
Similar, it can be according to the recognition result currently whether being in preset time period, it is determined whether random to generate User key, even current time are not in preset time period, then generate one group of user key at random, or mark according to user Know in the corresponding multiple groups user key of information, randomly chooses one group of user key;Otherwise, then it obtains and is used determined by the last time Family key.
Certain preset rules may be just to generate a group platform key and one group of user key at random without any condition, To promote the formation efficiency of key information, the application determines the mode of key information without limitation to triggering.
For platform key determined by signaling center, corresponding platform key number is generated, so that will by signaling center Platform key number is also added in encoded information, thus when channel equipment carries out platform signature check, it can be according to platform Cipher key number quickly determines the platform public key for being used for signature check.
After signaling center determines key information, correspondingly, key validity period is arranged for identified key information, institute is really Fixed key validity period is longer than the update cycle to key, preferential true during channel equipment verifies two dimensional code Whether settled preceding checking time was in key validity period, was more than the feelings of key validity period in the time that channel equipment is verified Under condition, verified two dimensional code can be quickly determined and be in invalid state, improve the breakneck acceleration to invalid two dimensional code.
Step 406, it determines and expands domain information.
It is needed based on the application in different scenes, can correspondingly increase the access authority that active user has in expanding domain Channel involved in scene domain information or custom zone information, such as can enjoy different services in the different member of grade Application scenarios under, the corresponding membership grade information of active user can be increased in expanding domain, thus when channel equipment can basis Two dimensional code shown by user terminal obtains the corresponding membership grade information of the user, and then provides accordingly according to the class information Service;Or when user has opened public transport access right, it can add workable for active user and have in expanding domain Body public transport type also or in user has opened park visit permission, can further clarify visit by extension field Specific range, or whether there is situations such as right to use to some articles in park, so that channel equipment being capable of foundation Extension domain information in two dimensional code further determines that special access right situation of the user under current channel.
Step 407, two dimensional code version and code mark, and the effective time of specified two dimensional code are determined.
The two dimensional code that code mark is the two dimensional code generated offline or generates online for indicating two dimensional code generated, example Such as it can indicate that the two dimensional code is the two dimensional code generated online by signaling center with 00,01 indicates that the two dimensional code is existed by user terminal The two dimensional code generated under off-line case;And it can indicate that two dimensional code loses since going out code to two dimensional code by two dimensional code effective time Time interval between effect.
Step 408, platform signing messages is determined.The first field information for integrating pending platform signature processing, uses institute Determining platform public key carries out the processing of platform signature, to obtain platform signing messages.
First field information of pending platform signature processing is integrated, the first word for needing to embody in two dimensional code Segment information can be combined according to the needs of actual conditions, in one exemplary embodiment, pending platform signature processing First field information may include: two dimensional code version, two-dimentional code length, code mark, management plateau coding, platform key number, Customer identification information, key expiration time, two dimensional code effective time, client public key, the information for having opened channel, extension field letter Breath.
Step 409, user's signature information is determined.User's signature processing is carried out to the second field information.
In one embodiment, code timestamp can be requested out when generating yard before the processing of pending user's signature Between stab, by this go out code timestamp record two dimensional code go out the code time.It is effective plus two dimensional code on the basis of code timestamp out The expired time of the two dimensional code can be obtained after duration, so that channel equipment can judge that channel executes verification behaviour by the expired time Whether the time of work is overdue.
Second field information of pending user's signature processing can be combined according to actual needs, exemplary one In embodiment, the second field information may include the first field information, platform signing messages and code timestamp out so that by pair Second field information carries out user's signature processing and obtains user's signature information.
Step 410, two dimensional code is generated based on identified encoded information.
Step 411, two dimensional code generated is back to management platform by signaling center.
Step 412, received two dimensional code is sent in user terminal by management platform, to be shown by user terminal Show.
In one embodiment, the field information in the encoded information for generating two dimensional code can be classified as user's signature letter Breath and the second field information in addition to user's signature information, field information may include two dimensional code version, two-dimentional code length, code Mark, management plateau coding, platform key number, customer identification information, key expiration time, two dimensional code effective time, user Public key, extension domain information, platform signing messages, goes out code timestamp, user's signature information at the information for having opened channel, certainly, to The content generated in the encoded information of two dimensional code can be adjusted according to the actual situation, and the application does not limit this.
In another embodiment, compression processing can selectively be carried out to the field involved in encoded information, to reduce Data volume involved in operation improves corresponding operation efficiency.It in one embodiment, can be to two dimensional code version, related Other information except the information of time, the information in relation to effective time carries out compression processing.
It as can be seen from the above embodiments, include the use in the two dimensional code that the received signaling center of user terminal is returned Family terminal currently logged on user has all channel mark information (the i.e. above-mentioned information for having opened channel) of access authority, so that User shows the received two dimensional code of institute, has the purview certification of the channel of access authority by any one user, herein mistake Without switching application program in journey, operating efficiency is improved.
The offline generation method of two dimensional code is illustrated below, in the offline generating process of two dimensional code, related coding Recorded in the particular content of information and the method for determination of information and the online generation method of two dimensional code it is similar, illustrate two dimensional code Offline generating process in do not do repetition elaboration to this, relevant information can refer to the online generation method of two dimensional code.
Fig. 5 is according to the flow chart of the offline generation method of one of one exemplary embodiment of the application two dimensional code, such as Shown in Fig. 5, the method is applied to signaling center, and this method may comprise steps of:
Step 501, offline encoded information is generated for target user, the offline encoded information includes the target user The information for having opened channel being recorded at management platform, and the offline encoded information does not include that the target user is corresponding User's signature.
It in one embodiment, further include platform signing messages in offline encoded information, platform signing messages can be by signaling The corresponding platform private key of the platform key that center determines generates;Signaling center can number the corresponding platform key of platform key It is added in offline encoded information, determines so that channel equipment is numbered according to platform key for carrying out the flat of platform signature check Platform public key.
Step 502, the offline encoded information is sent to the target user, it is corresponding to be passed through by the target user Private key for user generate user's signature after, offline two dimensional code is generated according to the user's signature and the offline encoded information.
In one embodiment, the offline encoded information of preset quantity can be sent to the user terminal, wherein each offline Different two dimensional code effective times is separately included in encoded information.
As can be seen from the above embodiments, the offline encoded information containing the information for having opened channel can be sent to by signaling center The user terminal of target user, to carry out user's signature processing by corresponding private key for user by user terminal, and then based on use Family signing messages and offline encoded information generate offline two dimensional code.As it can be seen that determining at signaling center containing the letter for having opened channel Breath offline encoded information in the case where, the generating process of two dimensional code is executed by user terminal, thus, when user terminal be in from Linear state and in the case where normal communication interaction can not being carried out with signaling center, user terminal can according to obtain in advance from Line coding info completes user's signature processing, and then generates offline two dimensional code based on user's signature information and offline encoded information.
Fig. 6 be according to the flow chart of the offline generation method of another two dimensional code in one exemplary embodiment of the application, As shown in fig. 6, the method is applied to user terminal, this method be may comprise steps of:
Step 601, the offline encoded information that signaling center is sent is received, wherein the offline encoded information includes target The information for having opened channel of user, and the offline encoded information does not include the corresponding user's signature of the target user.
In one embodiment, it can receive the offline encoded information of the preset quantity of signaling center transmission, wherein offline to compile It further include two dimensional code effective time in code information, and the corresponding two dimensional code effective time of offline encoded information of preset quantity is not Together, user equipment can generate two dimensional code based on the shortest offline encoded information of two dimensional code effective time.
In another embodiment, the default checking time that available user inputs in user terminal, presets school according to this Testing the time determines that two dimensional code effective time is greater than the offline encoded information of default checking time, is being greater than the two of default checking time It ties up and determines a two dimensional code effective time in code effective time, and then make user terminal based on the two dimension for being greater than prediction checking time The corresponding offline encoded information of code effective time generates two dimensional code.
Step 602, user's signature processing is carried out to the offline encoded information, to obtain user's signature information.
Step 603, offline two dimensional code is generated according to the user's signature information and the offline encoded information.
In one embodiment, processing can be stabbed with request time to generate a yard timestamp, so that offline for generating Comprising going out code timestamp, user's signature in the offline encoded information of two dimensional code.Further, it can also be wrapped in offline encoded information Include two dimensional code effective time so that channel equipment according to the two dimensional code effective time and it is described go out code timestamp and be greater than institute At the time of stating two dimensional code described in channel equipment verification, determine that the two dimensional code is examined by two dimensional code validity period, otherwise, it determines institute It is invalid to state two dimensional code.
As can be seen from the above embodiments, user terminal can receive the offline encoded information that signaling center issues in advance, so that When user terminal is in off-line state and can not carry out normal communication interaction with signaling center, user terminal can be based on institute The offline encoded information obtained completes user's signature processing, and then is used for based on user's signature information and the generation of offline encoded information The offline two dimensional code that channel equipment is verified.
Fig. 7 is according to the interaction figure of the offline generation method of one of one exemplary embodiment of the application two dimensional code, such as May include that signaling center, user terminal and management platform, this method may comprise steps of shown in Fig. 7:
Step 701, management platform receives the acquisition request for the offline encoded information that user terminal is sent.
Step 702, management platform determines the corresponding information for having opened channel of the customer identification information in the acquisition request, And the solicited message containing the information for having opened channel is sent to signaling center.
Step 703, signaling center determines the customer identification information managed in solicited message transmitted by platform, land identification Information and the corresponding information for having opened channel of the user identity information.
In one embodiment, user terminal is interacted by management platform with signaling center, when meeting preset condition, User terminal is sent to management platform to by the offline encoded information acquisition request containing customer identification information, by management platform Call signaling center, based on acquired customer identification information and platform identification information, determine customer identification information it is corresponding from Line coding info.
Preset condition can be to receive user terminal about acquisition two dimensional code under the good environment of network communication status Triggering command.When user terminal is received about between the triggering command and user terminal that obtain two dimensional code and management platform In the good situation of communications status, user terminal produces the solicited message for obtaining the offline encoded information of two dimensional code, and by institute The solicited message about the offline encoded information for obtaining two dimensional code generated is sent to management platform, is sent out with being called by management platform Code center, and then the determination to offline encoded information is completed by signaling center, and identified offline encoded information is passed through into pipe Platform is back to user terminal.
Preset condition may be the triggering command for the offline encoded information that user terminal is received about acquisition two dimensional code, I.e. user can in the good situation of network communication state, actively by user terminal triggering generate about obtain two dimensional code from The triggering command of line coding info,
In the specific embodiment of instruction for generating the acquisition request about offline encoded information, user can pass through user Physical button in terminal implements triggering command, or the virtual key by presetting in interface implements triggering command, to extend The protection service life of physical button.
In another embodiment, signaling center can be in the case where meeting preset condition, and Xiang Guanli platform sends channel letter The acquisition request of breath, and then obtain the pre-stored corresponding information for having opened channel of user identity information.In specific embodiment party In formula, when reaching preset condition, traversal pre-stored customer identification information in signaling center determines each customer identification information point Not corresponding management platform, and then it is corresponding complete with access authority that the customer identification information being pre-stored is obtained to management platform The case where channel information is opened in portion.
In the mode for determining management platform, signaling center can be pre-stored according to having between user and management platform Corresponding relationship is determined, or is determined according to user's real-time condition, user terminal such as currently used based on user Real-time position information, determine management platform belonging to real-time position information, and then the identified management platform user is known The corresponding management platform of other information, the application do not limit this.
Step 704, signaling center determines platform key and user key.
The determination method of platform key and user key determines that platform is close when carrying out online generation two dimensional code with signaling center Key is similar with the method for user key, and the application repeats no more this.
Step 705, signaling central integration includes to have opened the corresponding offline encoded information of information of channel, the offline volume It further include the platform signature and client public key of platform signature processing being completed, and the offline encoded information is not used in code information Family signature.
In one embodiment, it is not carried out at user's signature in the field for the offline encoded information that signaling center is integrated Reason, in signaling by private key for user and offline encoded information be sent to user equipment with by with equipment according to private key for user obtained Carry out user's signature processing.
In another embodiment, signaling center can integrate the offline encoded information of preset quantity, in offline encoded information There are certain variations for attribute information related with time, timeliness, so that working as two dimensional code shown by user equipment because of attribute Information expired and in the case where failing, user equipment can be had based on the operating time identified still in each attribute information Encoded information in the effect phase generates two-dimensional barcode information.
Such as each offline volume when the attribute information with term of validity is two dimensional code effective time, in preset quantity Code information may include identical two dimensional code effective time, so that working as two dimensional code shown by user terminal due to validity period expires In the case where invalid, user terminal can regenerate two dimensional code and to verify two dimensional code generated when channel equipment When, the time of verification operation is executed still in the effective time of two dimensional code.
In another embodiment, the effective time of the corresponding two dimensional code of offline encoded information of preset quantity can be different. Such as: the effective time of two dimensional code included in encoded information offline for identified 5 can be respectively 5 minutes, 10 Minute, 20 minutes, 30 minutes, 50 minutes, hence it is evident that the application is not construed as limiting the effective time value of two dimensional code.
User can be obtained and be verified the time interval (letter below of two dimensional code by user terminal transmission range channel equipment Referred to as predict checking time), about input mode can there are many, such as user can in terminal interface input prediction when It is long, or select one in the time interval numerical value that terminal interface has been displayed, the application to input mode without limitation;User The prediction that user is inputted can be obtained with terminal and verifies duration, and then two dimensional code effective time is selected to be greater than prediction verification duration Offline encoded information generates two dimensional code.
In the case where being greater than prediction verification duration there are multiple two dimensional code effective times, user terminal can be chosen at more A two dimensional code effective time be greater than prediction verification it is long in two dimensional code effective time it is shortest, based on including the shortest two dimension The offline encoded information of code effective time generates two dimensional code, to improve the anti-tamper safety of two dimensional code.
Step 706, the offline encoded information and private key for user are back to management platform, to be back to use by management platform The corresponding target user of family identification information, target user is based on the private key for user to the offline encoded information containing code timestamp out User's signature processing is carried out, and is based on user's signature information, goes out code timestamp and the offline two dimensional code of offline encoded information generation.
In one embodiment, the offline encoded information and private key for user of preset quantity are passed through management platform by signaling center It is sent to the user terminal, in the command information about generation two dimensional code for receiving user's triggering, to be used by user terminal Private key for user carries out user's signature processing to wherein one group offline encoded information.
Step 707, it generates and goes out code timestamp about received offline encoded information.
When receiving the triggering command about generation two dimensional code of user's transmission, user terminal is for received offline Encoded information and private key for user, the processing of request time stamp go out code timestamp about received offline encoded information to generate.
Step 708, user's signature information is determined.
User terminal is based on private key for user, and code timestamp carries out user's signature processing to offline encoded information and out, with acquisition User's signature.
Step 709, offline two dimensional code is generated.
Based on user's signature, go out code timestamp and offline encoded information and generate offline two dimensional code, with by channel equipment according to Offline two dimensional code shown by user terminal is verified.
As can be seen from the above embodiments, the offline encoded information that user terminal can be issued based on preparatory received signaling center Complete user's signature processing, and then based on user's signature information, offline encoded information and out code timestamp generation set for channel The standby offline two dimensional code verified, so that user terminal can also be realized for canal in the case where network communication status exception The image in 2 D code of road progress Authority Verification.
Whether in the online generating process of two dimensional code or the offline generating process of two dimensional code, user identity information pair The information for having opened channel answered can be set corresponding user's channel and open identification field, to realize to the letter for having opened channel Breath is transmitted and is identified.
In an exemplary embodiment, user's channel, which opens mark, can be used 5 Byte storages, wherein each Byte It is divided into 8 Bit, so that the mark of user's current grant situation of 40 scenes can be provided in total.
In specific identification means, 0 can be specifically used by being indicated on Bit each using 0,1 Indicate: the corresponding channel of marker where Bit current is that the corresponding user of user identifier does not have access or access right Scene, can be indicated with 1: the corresponding channel of marker where current Bit is that the corresponding user of user identifier has visit Ask the scene of permission or access right, wherein channel corresponding to marker is the standard of preparatory unified setting, such as the following table 1 institute Show, in the unified standard, can specify that the corresponding channel of marker 0 number is 00, and the corresponding channel of channel number 00 Entitled * * rail traffic (subway), similar, the corresponding channel of marker 1 number can be 01, and 01 pair of the channel number Entitled * * public transport of the channel answered etc., the standard of mentioned unified setting is only as an example, it is understood that all belong to phase here Identification means with design belong in the application technical proposal scope to be protected.
Marker Channel number Channel title
0 00 * rail traffic (subway)
1 01 * public transport
2 02 The dining room *
3 03 The zoo *
4 04 The scenic spot *
5 05 The library *
Table 1
User can carry out the channel for not having access authority or access right by user terminal open-minded, and manage There is the channel information of access authority or access right to be updated login user in platform, such as
Fig. 8 is the interaction figure according to one of one exemplary embodiment of the application channel opening process.As shown in figure 8, The channel opening process is related to user terminal, channel server, the interactive process between management platform, which can wrap Include following steps:
Step 801, channel is opened request and is sent to channel server by user terminal.
In one embodiment, channel opens the use that the request body portion in solicited message may include channel permission to be opened Family identification information, the channel mark information of permission to be opened and corresponding timestamp information.
Step 802, channel server determines that the received channel of institute opens the corresponding user identity information of request.
In one embodiment, user identity information can be that user mobile phone number, user's pet name, ID users etc. can be unique The mark of identity user identity information.
Step 803, user account information acquisition request is sent.
Channel server sends user account information acquisition request to management platform based on identified user identity information To obtain corresponding user account information.
Step 804, the corresponding channel permission of the user account information is opened.
Channel server executes the operation that corresponding permission is opened based on the user account information, to open the user account The corresponding channel permission of information.
In one embodiment, channel server execute permission open operation may include account fusion, exempt from it is close processing etc. Operation, difference according to actual needs can be opened in operation in permission and increase different processing mode and respective handling side Formula executes sequence, and account fusion therein can make channel equipment during verifying to the two dimensional code of acquisition, quasi- The different virtual identities mark for really identifying same user, reduces the identification error rate in channel equipment two dimensional code checking procedure.
Step 805, the prompt information that permission is opened is returned to user terminal, and sends updated user to management platform The corresponding channel permission of identification information, to be updated by management platform to the corresponding channel permission of user identity information.
In one embodiment, the identification information whether result can successfully be opened for the function of channel permission is opened, such as The identification information can be status code, so that user terminal is by identifying that the status code can be to the open-minded of the function of channel permission State is determined, in one embodiment, when status code is 10000, it is believed that requested channel permission is Success is open-minded, and when status code is 90000, it may be considered that requested channel permission opens failure, so that user can be with Execute corresponding operation.
As can be seen from the above embodiments, in response to the demand of opening of the channel permission of user side, phase is can be performed in channel server That answers channel permission opens operation, so that user terminal can still obtain the access right of the channel newly authorized based on same user account Limit or access right switch application program without user, even without switching two-dimensional barcode information, improve operating efficiency.
Fig. 9 is according to the flow chart of one of one exemplary embodiment of the application 2 D code verification method, such as Fig. 9 institute Show, can be applied to channel equipment, this method may comprise steps of:
Step 901, the two dimensional code that user to be verified provides is obtained.
Step 902, parse the two dimensional code, to obtain the information for having opened channel that the two dimensional code includes, it is described The information for opening channel is used to show the channel that the user to be verified has access authority.
In one embodiment, two dimensional code effective time and out code timestamp can be parsed according to the two dimensional code, then Determine user to be verified by verify channel access conditions may include: the two dimensional code effective time and it is described go out the code time Stamp and be greater than the channel equipment verification described in two dimensional code at the time of.
In another embodiment, further include the key expiration moment in the parsing information of two dimensional code, and then determine use to be verified Family may include: to be greater than two dimension described in the channel equipment verification at the key expiration moment by the channel access conditions verified At the time of code.
In one embodiment, channel equipment may include channel terminal or channel server.
Step 903, when channel access conditions is satisfied, determine that the user to be verified passes through verifying;Otherwise, it is determined that institute It is unverified to state user to be verified;Wherein, the channel access conditions includes: the user to be verified to the channel equipment Corresponding channel has access authority.
In another embodiment, the customer identification information for including in the two dimensional code can be obtained, and then is traversed pre-stored Blacklist list in whether there is the customer identification information, then determine user to be verified by verifying channel access conditions It may include: that the user to be verified is not in the blacklist list.
It in another embodiment, can be according to the platform public key of management platform to the platform label parsed in the two dimensional code Name verified, then determine user to be verified by verifying channel access conditions may include: to be obtained according to the platform public key To platform signature verification and the two dimensional code in the platform signature that parses it is consistent.
In another embodiment, the client public key for including in the two dimensional code can be obtained, and then public according to the user Key verifies the user's signature parsed in the two dimensional code, then determines that user to be verified accesses item by the channel of verifying Part may include: user's signature verification for being obtained according to the client public key and the user's signature one that parses in the two dimensional code It causes.
As can be seen from the above embodiments, channel equipment can pass through acquisition, the parsing to two dimensional code shown by user terminal Information included by the two dimensional code is obtained, is determined by the information for having opened channel included in the parsing information to two dimensional code Channel equipment corresponding channel state in which when so that the channel identified in the two dimensional code being in opening state, determines aobvious Show that the user of the user terminal of the two dimensional code has access authority.
Figure 10 is according to the interaction figure of one of one exemplary embodiment of the application 2 D code verification method, such as Figure 10 institute Show, can be applied to channel equipment, channel equipment can be channel server, channel terminal, and this method may include following step It is rapid:
Step 1001, channel terminal obtains the two dimensional code that user terminal is shown.
Step 1002, acquired two dimensional code is sent to channel server by channel terminal.
Step 1003, the parsing information of two dimensional code is determined.
Channel server parses received two dimensional code, determines the corresponding parsing information of the two dimensional code.
Step 1004, judge the corresponding opening state of channel mark.
Whether the current corresponding channel mark of channel is in opening state in analysis parsing information, if so, entering step 1005;Otherwise, it determines two-dimentional code check failure, can return to the prompt of the access authority without current channel to user terminal Information.
Step 1005, judge in blacklist list with the presence or absence of customer identification information.
The pre-stored blacklist list of traversal judges in blacklist list with the presence or absence of in the corresponding parsing information of two dimensional code Customer identification information then carry out step 1006 if it does not exist, otherwise determine two-dimentional code check failure, can be to user terminal Return to the prompt information about the user logged under current channel scene for blacklist state.
Step 1006, the key validity period verification of information is parsed.
The key validity period in parsing information is read, judges whether current time was in key validity period, if it is not, then It determines two dimension code check failure, the prompt information that two dimensional code fails can be returned to user terminal, otherwise enter step 1007.
Step 1007, two dimensional code effective time verifies.
It reads in parsing information and goes out code timestamp and two dimensional code effective time, determine two dimensional code effective time, judgement is worked as Whether the preceding time was in two dimensional code effective time, if not, it is determined that two-dimentional code check failure can be returned to user terminal Otherwise the prompt information of two dimensional code failure enters step 1008.
Step 1008, the platform signing messages verification in information is parsed.
The platform key number in parsing information is read, is numbered based on read platform key and determines platform public key, made Signature processing is carried out to obtain platform signature verification to the first field information in parsing information with platform public key;Judge described flat Whether platform signature verification and the platform signing messages in parsing information are consistent, if unanimously, it is determined that the two dimensional code passes through platform Signature check enters step 1009;Otherwise, it determines two-dimentional code check failure, can be invalid to user terminal return two dimensional code Prompt information.
Step 1009, the user's signature information checking in information is parsed.
The client public key information in parsing information is read, based on read client public key to the second word in parsing information Duan Jinhang signature processing, to obtain user's signature verification;Judge the user in user's signature verification and the parsing information Whether signing messages is consistent, if inconsistent, it is determined that two-dimentional code check failure, can be invalid to user terminal return two dimensional code Prompt information;If consistent, it is determined that the two dimensional code is verified by user's signature, enters step 1010.
Step 1010, the prompt information that back-checking passes through.
Channel server determines that the information that verification passes through by verification, is back to canal by two dimensional code shown by user terminal Road terminal, to carry out subsequent relevant operation by channel terminal.
It in one embodiment, also can be to after channel server determines two dimensional code shown by user terminal by verification It verifies the prompt information passed through to return and show to subscriber terminal equipment, so that user can be by prompt shown in user terminal Passage voucher of the information as access right.
In another embodiment, above-mentioned steps 1004 to step 1009 can be suitable according to the front and back of field in actual resolved information Sequence does the adjustment of corresponding action step;Such as when the field in parsing information about key validity period is in the canal for indicating to have opened Before the field of road identification information, then it can preferentially execute and read key validity period, it is effective to judge whether current time is in key (i.e. step 1006) then executes the channel mark information for reading and having opened, judges user for current channel for interim operation Whether there is verification (i.e. step 1004), sequencing of the application to the verification of step 1004 to step 1009 of access authority It does not do and clearly limits.
Figure 11 is according to the interaction figure of another 2 D code verification method in one exemplary embodiment of the application, such as Figure 11 It is shown, it can be applied to channel terminal, this method may comprise steps of:
Step 1101, the two dimensional code that user terminal is shown is obtained.
Step 1102, channel terminal determines the parsing information of two dimensional code.
Channel terminal parses received two dimensional code, determines the corresponding parsing information of the two dimensional code.
Step 1103, channel terminal judges the corresponding opening state of channel mark.
Whether the current corresponding channel mark of channel is in opening state in channel terminal analysis parsing information, if so, Enter step 1104;Otherwise, it determines two-dimentional code check failure, can issue verification and unsuccessfully alert.
Step 1104, channel terminal judges in blacklist list with the presence or absence of customer identification information.
The pre-stored blacklist list of traversal judges in blacklist list with the presence or absence of in the corresponding parsing information of two dimensional code Customer identification information then carry out step 1105 if it does not exist;Otherwise, it determines two-dimentional code check failure, can issue verification and lose Lose alarm.
Step 1105, the key validity period verification of channel terminal parsing information.
The key validity period in parsing information is read, judges whether current time was in key validity period, if it is not, then It determines two dimension code check failure, verification can be issued and unsuccessfully alerted;Otherwise, 1106 are entered step.
Step 1106, channel terminal carries out the verification of two dimensional code effective time.
It reads in parsing information and goes out code timestamp and two dimensional code effective time, determine two dimensional code effective time, judgement is worked as Whether the preceding time was in two dimensional code effective time, if not, it is determined that two-dimentional code check failure can issue verification and unsuccessfully accuse It is alert;Otherwise, 1107 are entered step.
Step 1107, the platform signing messages verification in channel terminal parsing information.
The platform key number in parsing information is read, is numbered based on read platform key and determines platform public key, made Signature processing is carried out to obtain platform signature verification to the first field information in parsing information with platform public key;Judge described flat Whether platform signature verification and the platform signing messages in parsing information are consistent, if unanimously, it is determined that the two dimensional code passes through platform Signature check enters step 1108;Otherwise, it determines two-dimentional code check failure, can issue verification and unsuccessfully alert.
In one embodiment, the first field information can be for except platform signing messages, user's signature information, out code timestamp Except other information.For example, if the field in parsing information successively are as follows: two dimensional code version, two-dimentional code length, code mark, pipe Platform coding, platform key number, customer identification information, key expiration time, two dimensional code effective time, client public key, It opens the information of channel, extension domain information, platform signing messages, go out code timestamp, private key for user signing messages, then the first field Information can be with are as follows: two dimensional code version, two-dimentional code length, code mark, management plateau coding, platform key number, user identify letter Breath, key expiration time, two dimensional code effective time, client public key, the information for having opened channel, the information for extending domain information.
Step 1108, the user's signature information checking in channel terminal parsing information.
The client public key information in parsing information is read, based on read client public key to the second word in parsing information Duan Jinhang signature processing, to obtain user's signature verification;Judge the user in user's signature verification and the parsing information Whether signing messages is consistent, if inconsistent, it is determined that two-dimentional code check failure can issue verification and unsuccessfully alert;If consistent, It determines that the two dimensional code is verified by user's signature, enters step 1109.
In one embodiment, the second field information can be the other information in addition to user's signature information, specific one Implementation process in, when the field in parsing information successively are as follows: two dimensional code version, two-dimentional code length, code mark, management platform are compiled Code, the key expiration time, two dimensional code effective time, client public key, has opened channel at platform key number, customer identification information Information, extension domain information, platform signing messages, go out code timestamp, private key for user signing messages, then the second field information can be with Are as follows: two dimensional code version, two-dimentional code length, code mark, management plateau coding, platform key number, customer identification information, key mistake Time phase, two dimensional code effective time, client public key, the information for having opened channel, the information for extending domain information, platform A.L.S. Breath goes out code timestamp.
Step 1109, the prompt information whether verification passes through is back to user terminal by channel terminal.
Two dimensional code shown by user terminal is determined by verification, channel terminal carries out subsequent relevant operation, herein mistake The prompt information whether verification passes through can be back to user terminal by Cheng Zhong, channel terminal.
In one embodiment, channel terminal directly executes subsequent operation to the two dimensional code that verification passes through, or can also incite somebody to action The prompt information whether two-dimentional code check passes through is back to user terminal.
In one embodiment, above-mentioned steps 1103 to step 1108 can be according to the tandem of field in actual resolved information Do the adjustment of corresponding action step;Such as when the field in parsing information about key validity period is in the channel for indicating to have opened Before the field of identification information, then it can preferentially execute and read key validity period, judge whether current time is in key validity period In operation (i.e. step 1105) then executes and reads the channel mark information opened, judges that user is for current channel It is no with access authority verification (i.e. step 1103), the application to the sequencing of the verification of step 1103 to step 1108 not It does and clearly limits.
During carrying out on-line testing to two dimensional code, blacklist list be can store in channel server, by canal Road server judges whether the user identity information in parsing information is in blacklist list, in another embodiment In;During verify offline to two dimensional code, blacklist list is issued to channel terminal by channel server in advance, under Start can be set to periodically to trigger, may be set to be channel management person and trigger manually, the application does not limit this.
Behavior state is had recorded in blacklist list violates the customer identification information of treaty standard made an appointment, such as when After two-dimentional code check of the user by charge channel, it is not successfully completed corresponding payment operation within the designated time, then determines to use The behavior at family violates the treaty made an appointment, then the corresponding user of the user can be identified letter via the risk mechanism of channel side Blacklist list is added in breath, and each channel can safeguard the blacklist list of this channel, can choose by default Blacklist list is fed back into management platform after time, to be in blacklist state from management platform to user terminal feedback Channel information.
User behavior state judgement can be executed by management platform, in one embodiment, management platform can according to Family behavior state and the corresponding contract standard of behavior state, determine whether user behavior state violates corresponding contract standard. For judging that the contract standard of user behavior state can be formulated for management platform is unified, and it is associated to be suitable for the management platform The constraint of whole permission behavior involved in each channel can also be pre-stored the corresponding treaty mark of each channel by management platform Standard, so that determining the corresponding treaty standard of the channel according to channel information corresponding in log information, and then to user's Behavior state is judged.
Management platform can will be present violations state user identity information and corresponding violations information, according to The corresponding channel information of the violations information carries out the book of final entry, and to form violations record, (hereinafter referred to as blacklist is arranged Table).The corresponding blacklist list of the channel is fed back to each channel when meeting preset condition, preset condition can be preset Time cycle is also possible to preset record strip number.It can be management platform actively by blacklist list in specific embodiment It is issued to channel server, the acquisition request about blacklist list can also be sent from channel server to management platform, this Application issues mode without limitation to blacklist list.
Management platform can monitor the promise breaking row that the user identity information in channel blacklist list is directed to the channel For state.In the case that behavior state exists and changes and promise breaking state is not present, modification is to the user identity information in the canal Violations record under road, so that modified violations record is issued to channel service when meeting preset condition Device, to be updated accordingly by channel server, and by channel server sync to channel terminal.
Similar, the corresponding modified blacklist list of the channel is fed back to each channel when meeting preset condition, Preset condition can be the preset time cycle, be also possible to preset record strip number.It can be management in specific embodiment Blacklist list is actively issued to channel server by platform, can also be sent from channel server to management platform about black name The acquisition request of single-row table, the application issue mode without limitation to blacklist list.
Figure 12 is the schematic configuration diagram according to one of one exemplary embodiment of the application electronic equipment.Please refer to figure 12, in hardware view, which includes processor, internal bus, network interface, memory and nonvolatile memory, Certainly it is also possible that hardware required for other business.Processor reads corresponding computer journey from nonvolatile memory Then sequence is run into memory, the online generating means of the two dimensional code of signaling central side are formed on logic level.Certainly, in addition to Except software realization mode, other implementations, such as the mode of logical device or software and hardware combining is not precluded in the application Etc., that is to say, that the executing subject of following process flow is not limited to each logic unit, is also possible to hardware or logic Device.
Figure 13 is please referred to, Figure 13 is the online generating means according to one of one exemplary embodiment of the application two dimensional code Block diagram, be applied to signaling center, in Software Implementation, the online generating means of two dimensional code may include:
Receiving unit 1301 receives two dimensional code and generates request, and it includes customer identification information in request that the two dimensional code, which generates, With platform identification information;
Acquiring unit 1302, it is corresponding that the corresponding management platform of Xiang Suoshu land identification information obtains the customer identification information The information for having opened channel;
Generation unit 1303 generates two dimensional code according to the information for having opened channel;
The two dimensional code is back to the user terminal by transmission unit 1304.
Optionally, further includes:
First signature generation unit 1305, is signed by the corresponding platform private key generating platform of the management platform;Wherein, Information for generating the two dimensional code further includes platform signature, described in the corresponding channel equipment of the management platform is held The corresponding platform public key of platform private key is verified with the platform signature for including to the two dimensional code.
Optionally, further includes:
Selection unit 1305 chooses a group platform key in the corresponding multiple groups platform key of the management platform;
Second signature generation unit 1306, based on the platform private key generating platform signature in selected platform key;Its In, the information for generating the two dimensional code further includes the corresponding platform key number of selected platform key, so that described Channel equipment determines according to platform key number after parsing the platform key number in the two dimensional code and is used for school Test the platform public key of the platform signature.
Optionally, the information for generating the two dimensional code further includes key validity period, so that the channel equipment is from institute It states after parsing the key validity period in two dimensional code, according to the corresponding platform of the signature of platform described in the key validity verification Whether key is in validity period.
Optionally, further includes:
Third signature generation unit 1307 passes through the corresponding private key for user of the customer identification information and generates user's signature; Wherein, the information for generating the two dimensional code further includes the user's signature and the corresponding client public key of the private key for user, So that channel equipment carries out user's signature verification to the user's signature according to the client public key.
Optionally, the information for generating the two dimensional code further includes two dimensional code effective time and code timestamp out, so that Channel equipment according to the two dimensional code effective time and it is described go out code timestamp and be greater than the channel equipment verification described in two At the time of tieing up code, determine that the two dimensional code is examined by two dimensional code validity period, otherwise, it determines the two dimensional code is invalid.
Figure 14 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application.Please refer to figure 14, in hardware view, which includes processor, internal bus, network interface, memory and nonvolatile memory, Certainly it is also possible that hardware required for other business.Processor reads corresponding computer journey from nonvolatile memory Then sequence is run into memory, the online generating means of the two dimensional code of subscriber terminal side are formed on logic level.Certainly, in addition to Except software realization mode, other implementations, such as the mode of logical device or software and hardware combining is not precluded in the application Etc., that is to say, that the executing subject of following process flow is not limited to each logic unit, is also possible to hardware or logic Device.
Figure 15 is please referred to, Figure 15 is filled according to the online generation of another two dimensional code in one exemplary embodiment of the application The block diagram set is applied to user terminal, and in Software Implementation, the online generating means of the two dimensional code may include:
Transmission unit 1501 sends two dimensional code and generates request, and the two dimensional code generates the user that request includes local terminal user The land identification information of identification information and the corresponding management platform of target channel equipment;
Receiving unit 1502 receives the two dimensional code that the signaling center returns, and the two dimensional code is by the signaling Central Radical It is generated according to the corresponding information for having opened channel of the customer identification information, the information for having opened channel comes from the platform The corresponding management platform of identification information.
Figure 16 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application.Please refer to figure 16, in hardware view, which includes processor, internal bus, network interface, memory and nonvolatile memory, Certainly it is also possible that hardware required for other business.Processor reads corresponding computer journey from nonvolatile memory Then sequence is run into memory, the offline generating means of the two dimensional code of signaling central side are formed on logic level.Certainly, in addition to Except software realization mode, other implementations, such as the mode of logical device or software and hardware combining is not precluded in the application Etc., that is to say, that the executing subject of following process flow is not limited to each logic unit, is also possible to hardware or logic Device.
Figure 17 is please referred to, Figure 17 is the offline generating means according to one of one exemplary embodiment of the application two dimensional code Block diagram, be applied to signaling center, in Software Implementation, the offline generating means of two dimensional code may include:
Generation unit 1701 generates offline encoded information for target user, and the offline encoded information includes the mesh The information for having opened channel that mark user is recorded at management platform, and the offline encoded information does not include that the target is used The corresponding user's signature in family;
The offline encoded information is sent to the target user, to be used by the target by the first transmission unit 1702 After family generates user's signature by corresponding private key for user, generated according to the user's signature and the offline encoded information offline Two dimensional code.
Optionally, the transmission unit is specifically used for:
The offline encoded information of preset quantity is sent to the user terminal by the second transmission unit 1703, wherein each offline Different two dimensional code effective times is separately included in encoded information.
It optionally, further include platform signing messages in the offline encoded information;The platform signing messages is by signaling The corresponding platform private key of the platform key that the heart determines generates;The corresponding platform key number of the platform key information is by the hair Code center is added in the offline encoded information, so that channel equipment is flat for carrying out according to platform key number determination The platform public key of platform signature check.
Figure 18 is the schematic configuration diagram according to another electronic equipment in one exemplary embodiment of the application.Please refer to figure 18, in hardware view, which includes processor, internal bus, network interface, memory and nonvolatile memory, Certainly it is also possible that hardware required for other business.Processor reads corresponding computer journey from nonvolatile memory Then sequence is run into memory, the offline generating means of two dimensional code are formed on logic level.Certainly, in addition to software realization mode Except, other implementations, such as logical device or the mode of software and hardware combining etc. is not precluded in the application, that is to say, that The executing subject of following process flow is not limited to each logic unit, is also possible to hardware or logical device.
Figure 19 is please referred to, Figure 19 is filled according to the offline generation of another two dimensional code in one exemplary embodiment of the application The block diagram set is applied to user terminal, and in Software Implementation, the offline generating means of two dimensional code may include:
First receiving unit 1901 receives the offline encoded information that signaling center is sent, wherein the offline encoded information The information for having opened channel including target user, and the offline encoded information does not include the corresponding user of the target user Signature;
Signature unit 1902 carries out user's signature processing to the offline encoded information, to obtain user's signature information;
First generation unit 1903 generates offline two dimension according to the user's signature information and the offline encoded information Code.
Optionally, further includes:
Timestamp generation unit 1904 generates a yard timestamp;
Second generation unit 1905, it is raw according to the code timestamp out, the user's signature and the offline encoded information At offline two dimensional code;It wherein, further include two dimensional code effective time in the offline encoded information, so that channel equipment is according to Two dimensional code effective time and it is described go out code timestamp and be greater than the channel equipment verification described in two dimensional code at the time of, determine institute It states two dimensional code to examine by two dimensional code validity period, otherwise, it determines the two dimensional code is invalid.
Optionally, first receiving unit is specifically used for:
Second receiving unit 1906, receive signaling center send preset quantity offline encoded information, wherein it is described from It further include two dimensional code effective time in line coding info, and the corresponding two dimensional code of offline encoded information of the preset quantity is effective Duration is different.
Third generation unit 1907 generates two dimensional code based on the shortest offline encoded information of two dimensional code effective time.
Optionally, further includes:
Acquiring unit 1908 obtains user in the prediction that user terminal inputs and verifies duration;
4th generation unit 1909, according to the offline volume of the two dimensional code effective time comprising being greater than the prediction verification duration Code information generates two dimensional code.
Figure 20 is the schematic configuration diagram according to the also a kind of electronic equipment in one exemplary embodiment of the application.Please refer to figure 20, in hardware view, which includes processor, internal bus, network interface, memory and nonvolatile memory, Certainly it is also possible that hardware required for other business.Processor reads corresponding computer journey from nonvolatile memory Then sequence is run into memory, form two dimensional code on logic level and verify device.Certainly, other than software realization mode, Other implementations, such as logical device or the mode of software and hardware combining etc. is not precluded in the application, that is to say, that following The executing subject of process flow is not limited to each logic unit, is also possible to hardware or logical device.
Figure 21 is please referred to, Figure 21 is the frame that device is verified according to one of one exemplary embodiment of the application two dimensional code Figure is applied to channel equipment, and in Software Implementation, two dimensional code verifying device may include:
First acquisition unit 2101 obtains the two dimensional code that user to be verified provides;
First resolution unit 2102, parses the two dimensional code, to obtain the letter for having opened channel that the two dimensional code includes Breath, the information for having opened channel are used to show the channel that the user to be verified has access authority;
First judging unit 2103 determines that the user to be verified passes through verifying when channel access conditions is satisfied;It is no Then, determine that the user to be verified is unverified;Wherein, the channel access conditions includes: the user to be verified to institute The corresponding channel of channel equipment is stated with access authority.
Optionally, further includes:
Second acquisition unit 2104 obtains the customer identification information for including in the two dimensional code;
Traversal Unit 2105 traverses in pre-stored blacklist list with the presence or absence of the customer identification information;
Second judgment unit 2106, the channel access conditions further include: the user to be verified is not in the black name In single-row table.
Optionally, further includes:
First verification unit 2107 signs to the platform parsed in the two dimensional code according to the platform public key of management platform It is verified;
Third judging unit 2108, the channel access conditions further include: the platform school obtained according to the platform public key The platform signature parsed in sign test name and the two dimensional code is consistent.
Optionally, further includes:
Third acquiring unit 2109 obtains the client public key for including in the two dimensional code;
Second verification unit 2110 carries out school to the user's signature parsed in the two dimensional code according to the client public key It tests;
4th judging unit 2111, the channel access conditions further include: the user school obtained according to the client public key The user's signature parsed in sign test name and the two dimensional code is consistent.
Optionally, further includes:
Second resolution unit 2112 parses two dimensional code effective time and out code timestamp according to the two dimensional code;
5th judging unit 2113, the channel access conditions further include: the two dimensional code effective time and the code out Timestamp and be greater than the channel equipment verification described in two dimensional code at the time of.
It optionally, further include the key expiration moment in the parsing information of the two dimensional code, wherein the channel access conditions Further include: at the time of the key expiration moment is greater than two dimensional code described in the channel equipment verification.
Optionally, the channel equipment includes channel terminal or channel server.
Described device corresponds to the above method, and more identical details no longer repeat one by one.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
Although this specification includes many specific implementation details, these are not necessarily to be construed as the model for limiting any invention It encloses or range claimed, and is primarily used for describing the feature of the specific embodiment of specific invention.In this specification Certain features described in multiple embodiments can also be combined implementation in a single embodiment.On the other hand, individually implementing Various features described in example can also be performed separately in various embodiments or be implemented with any suitable sub-portfolio.This Outside, although feature can work in certain combinations as described above and even initially so be claimed, institute is come from One or more features in claimed combination can be removed from the combination in some cases, and claimed Combination can be directed toward the modification of sub-portfolio or sub-portfolio.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (26)

1. a kind of online generation method of two dimensional code, which is characterized in that be applied to signaling center, which comprises
It receives two dimensional code and generates request, it includes customer identification information and platform identification information in request that the two dimensional code, which generates,;
The corresponding letter for having opened channel of the customer identification information is obtained to the corresponding management platform of the land identification information Breath;
Two dimensional code is generated according to the information for having opened channel, and the two dimensional code is back to the user terminal.
2. method according to claim 1, which is characterized in that further include:
Pass through the corresponding platform private key generating platform signature of the management platform;
Wherein, the information for generating the two dimensional code further includes platform signature, and the corresponding channel of the management platform is set It is standby to hold the corresponding platform public key of the platform private key, it is verified with the platform signature for including to the two dimensional code.
3. method according to claim 2, which is characterized in that described to be generated by the corresponding platform private key of the management platform Platform signature, comprising:
A group platform key is chosen in the corresponding multiple groups platform key of the management platform;
Based on the platform private key generating platform signature in selected platform key;
Wherein, the information for generating the two dimensional code further includes the corresponding platform key number of selected platform key, is made The channel equipment is obtained after parsing the platform key number in the two dimensional code, is numbered and is determined according to the platform key For verifying the platform public key of the platform signature.
4. method according to claim 2, which is characterized in that the information for generating the two dimensional code further includes that key is effective Phase, so that the channel equipment after parsing the key validity period in the two dimensional code, is tested according to the key validity period Demonstrate,prove whether the corresponding platform key of the platform signature is in validity period.
5. method according to claim 1, which is characterized in that further include:
User's signature is generated by the corresponding private key for user of the customer identification information;
Wherein, the information for generating the two dimensional code further includes that the user's signature and the corresponding user of the private key for user are public Key, so that channel equipment carries out user's signature verification to the user's signature according to the client public key.
6. method according to claim 1, which is characterized in that further include:
Information for generating the two dimensional code further includes two dimensional code effective time and code timestamp out so that channel equipment according to The two dimensional code effective time and it is described go out code timestamp and be greater than the channel equipment verification described in two dimensional code at the time of, really The fixed two dimensional code is examined by two dimensional code validity period, otherwise, it determines the two dimensional code is invalid.
7. a kind of online generation method of two dimensional code, which is characterized in that be applied to user terminal, which comprises
It sends two dimensional code and generates request, the two dimensional code generates the customer identification information and target channel that request includes local terminal user The land identification information of the corresponding management platform of equipment;
The two dimensional code that the signaling center returns is received, the two dimensional code is by the signaling center according to the customer identification information The corresponding information for having opened channel generates, and the information for having opened channel comes from the corresponding management of the land identification information Platform.
8. a kind of offline generation method of two dimensional code, which is characterized in that be applied to signaling center, which comprises
Offline encoded information is generated for target user, the offline encoded information includes the target user at management platform What is be recorded has opened the information of channel, and the offline encoded information does not include the corresponding user's signature of the target user;
The offline encoded information is sent to the target user, with raw by corresponding private key for user by the target user After user's signature, offline two dimensional code is generated according to the user's signature and the offline encoded information.
9. method according to claim 8, which is characterized in that described that the offline encoded information is sent to the target use Family, comprising:
The offline encoded information of preset quantity is sent to the user terminal, wherein separately including difference in each offline encoded information Two dimensional code effective time.
10. method according to claim 8, which is characterized in that further include platform signing messages in the offline encoded information;
The platform signing messages is generated by the corresponding platform private key of platform key that signaling center determines;
The corresponding platform key number of the platform key information is added in the offline encoded information by the signaling center, So that channel equipment determines the platform public key for carrying out platform signature check according to platform key number.
11. a kind of offline generation method of two dimensional code, which is characterized in that be applied to user terminal, which comprises
Receive the offline encoded information that signaling center is sent, wherein the offline encoded information includes the open-minded of target user The information of channel, and the offline encoded information does not include the corresponding user's signature of the target user;
User's signature processing is carried out to the offline encoded information, to obtain user's signature information;
Offline two dimensional code is generated according to the user's signature information and the offline encoded information.
12. method according to claim 11, which is characterized in that further include:
Generate a yard timestamp;
Offline two dimensional code is generated according to the code timestamp out, the user's signature and the offline encoded information;
It wherein, further include two dimensional code effective time in the offline encoded information, so that channel equipment has according to the two dimensional code Imitate duration and it is described go out code timestamp and be greater than the channel equipment verification described in two dimensional code at the time of, determine the two dimensional code It is examined by two dimensional code validity period, otherwise, it determines the two dimensional code is invalid.
13. method according to claim 11, which is characterized in that the offline encoded information for receiving signaling center and sending, Include:
Receive the offline encoded information for the preset quantity that signaling center is sent, wherein further include two in the offline encoded information Code effective time is tieed up, and the corresponding two dimensional code effective time of offline encoded information of the preset quantity is different;
Two dimensional code is generated based on the shortest offline encoded information of two dimensional code effective time.
14. 3 the method according to claim 1, which is characterized in that further include:
It obtains user and verifies duration in the prediction that user terminal inputs;
Two dimensional code is generated according to the offline encoded information of the two dimensional code effective time comprising being greater than the prediction verification duration.
15. a kind of 2 D code verification method, which is characterized in that be applied to channel equipment, which comprises
Obtain the two dimensional code that user to be verified provides;
The two dimensional code is parsed, to obtain the information for having opened channel that the two dimensional code includes, the letter for having opened channel It ceases for showing that the user to be verified has the channel of access authority;
When channel access conditions is satisfied, determine that the user to be verified passes through verifying;Otherwise, it is determined that the user to be verified It is unverified;Wherein, the channel access conditions includes: that the user to be verified has the corresponding channel of the channel equipment There is access authority.
16. method according to claim 15, which is characterized in that further include:
Obtain the customer identification information for including in the two dimensional code;
It whether there is the customer identification information in the pre-stored blacklist list of traversal;
Wherein, the channel access conditions further include: the user to be verified is not in the blacklist list.
17. method according to claim 15, which is characterized in that further include:
The platform signature parsed in the two dimensional code is verified according to the platform public key of management platform;
Wherein, the channel access conditions further include: the platform signature verification and the two dimension obtained according to the platform public key The platform signature parsed in code is consistent.
18. method according to claim 15, which is characterized in that further include:
Obtain the client public key for including in the two dimensional code;
The user's signature parsed in the two dimensional code is verified according to the client public key;
Wherein, the channel access conditions further include: the user's signature verification and the two dimension obtained according to the client public key The user's signature parsed in code is consistent.
19. method according to claim 15, which is characterized in that further include:
Two dimensional code effective time and out code timestamp are parsed according to the two dimensional code;
Wherein, the channel access conditions further include: the two dimensional code effective time and it is described go out code timestamp and be greater than institute At the time of stating two dimensional code described in channel equipment verification.
20. method according to claim 15, which is characterized in that further include key expiration in the parsing information of the two dimensional code Moment, wherein the channel access conditions further include: the key expiration moment is greater than two dimension described in the channel equipment verification At the time of code.
21. method according to claim 15, which is characterized in that the channel equipment includes channel terminal or channel service Device.
22. a kind of online generating means of two dimensional code, which is characterized in that be applied to signaling center, described device includes:
Receiving unit receives two dimensional code and generates request, and the two dimensional code generates in request to be known comprising customer identification information and platform Other information;
Acquiring unit, it is corresponding open-minded that the corresponding management platform of Xiang Suoshu land identification information obtains the customer identification information The information of channel;
Generation unit generates two dimensional code according to the information for having opened channel;
The two dimensional code is back to the user terminal by transmission unit.
23. a kind of online generating means of two dimensional code, which is characterized in that be applied to user terminal, described device includes:
Transmission unit sends two dimensional code and generates request, and the two dimensional code generates the customer identification information that request includes local terminal user The land identification information of management platform corresponding with target channel equipment;
Receiving unit receives the two dimensional code that the signaling center returns, and the two dimensional code is by the signaling center according to the use The identification information corresponding information for having opened channel in family generates, and the information for having opened channel comes from the land identification information Corresponding management platform.
24. a kind of offline generating means of two dimensional code, which is characterized in that be applied to signaling center, described device includes:
Generation unit generates offline encoded information for target user, and the offline encoded information includes that the target user exists The information for having opened channel being recorded at management platform, and the offline encoded information does not include that the target user is corresponding User's signature;
The offline encoded information is sent to the target user by transmission unit, corresponding to be passed through by the target user After private key for user generates user's signature, offline two dimensional code is generated according to the user's signature and the offline encoded information.
25. a kind of offline generating means of two dimensional code, which is characterized in that be applied to user terminal, described device includes:
Receiving unit receives the offline encoded information that signaling center is sent, wherein the offline encoded information includes target user The information for having opened channel, and the offline encoded information does not include the corresponding user's signature of the target user;
Signature unit carries out user's signature processing to the offline encoded information, to obtain user's signature information;
Generation unit generates offline two dimensional code according to the user's signature information and the offline encoded information.
26. a kind of two dimensional code verifies device, which is characterized in that be applied to channel equipment, described device includes:
Acquiring unit obtains the two dimensional code that user to be verified provides;
Resolution unit parses the two dimensional code, described open-minded to obtain the information for having opened channel that the two dimensional code includes The information of channel is used to show the channel that the user to be verified has access authority;
Judging unit determines that the user to be verified passes through verifying when channel access conditions is satisfied;Otherwise, it is determined that described User to be verified is unverified;Wherein, the channel access conditions includes: the user to be verified to the channel equipment pair The channel answered has access authority.
CN201910563025.5A 2019-06-26 2019-06-26 Online generation, offline generation and verification method and device for two-dimensional code Active CN110298421B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910563025.5A CN110298421B (en) 2019-06-26 2019-06-26 Online generation, offline generation and verification method and device for two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910563025.5A CN110298421B (en) 2019-06-26 2019-06-26 Online generation, offline generation and verification method and device for two-dimensional code

Publications (2)

Publication Number Publication Date
CN110298421A true CN110298421A (en) 2019-10-01
CN110298421B CN110298421B (en) 2023-11-03

Family

ID=68028923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910563025.5A Active CN110298421B (en) 2019-06-26 2019-06-26 Online generation, offline generation and verification method and device for two-dimensional code

Country Status (1)

Country Link
CN (1) CN110298421B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807131A (en) * 2019-11-01 2020-02-18 中国海洋石油集团有限公司 Drilling rod maintenance line with automatic identification function
CN111709506A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Customized label generation method and system
CN111833047A (en) * 2020-08-19 2020-10-27 深圳市富之富信息科技有限公司 Payment code generation method and device based on mobile payment and computer equipment
CN111967556A (en) * 2020-08-11 2020-11-20 福建博思数字科技有限公司 Two-dimensional code offline generation method and storage medium
CN112215322A (en) * 2020-12-14 2021-01-12 深圳市深圳通有限公司 Traffic two-dimensional code generation method and generation device, and verification method and verification device
CN112398923A (en) * 2020-11-03 2021-02-23 万达信息股份有限公司 Method and system for generating offline electronic health code
CN113011864A (en) * 2021-03-22 2021-06-22 支付宝(杭州)信息技术有限公司 Two-dimensional code generation and verification method, device, equipment and readable medium
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113255012A (en) * 2021-07-01 2021-08-13 深圳市深圳通有限公司 Method, device and equipment for managing riding codes and storage medium
CN114298258A (en) * 2021-12-21 2022-04-08 北京格灵深瞳信息技术股份有限公司 Offline two-dimensional code generation method
CN114444860A (en) * 2021-12-24 2022-05-06 长威信息科技发展股份有限公司 One-code passing method and terminal
CN115509360A (en) * 2022-10-11 2022-12-23 云宝宝大数据产业发展有限责任公司 Virtual reality VR interactive system based on metauniverse

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2759414A1 (en) * 2009-04-20 2010-10-28 Alter Core, S.L. System and method for personal certification using a mobile device
WO2014108005A1 (en) * 2013-01-11 2014-07-17 Tencent Technology (Shenzhen) Company Limited Co-verification method, two-dimensional code generation method, and device and system therefor
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
CN104618334A (en) * 2014-12-29 2015-05-13 通邮(中国)科技有限公司 Method and system for generating and verifying dynamic two-dimensional code
CN104715242A (en) * 2015-03-27 2015-06-17 刘学明 Identity authentication system and method based on two-dimensional iris codes
WO2015184800A1 (en) * 2014-06-05 2015-12-10 Tencent Technology (Shenzhen) Company Limited Method and system for processing resource exchange information
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
CN107368335A (en) * 2017-07-24 2017-11-21 奇酷互联网络科技(深圳)有限公司 A kind of method and apparatus and mobile terminal of Quick Response Code identification
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
CN107835160A (en) * 2017-10-20 2018-03-23 浙江工商大学 Third party's user authen method based on Quick Response Code
US20180121985A1 (en) * 2016-11-01 2018-05-03 Jeom-Doo Kim Origin-connected satellite information system for protection from climate change
CN108052663A (en) * 2017-01-17 2018-05-18 海南亚元防伪技术研究所(普通合伙) A kind of application process and device of shared Quick Response Code
CN108510022A (en) * 2018-03-19 2018-09-07 维沃移动通信有限公司 A kind of Quick Response Code generates, verification method and server
WO2019000126A1 (en) * 2017-06-25 2019-01-03 深圳市秀趣品牌文化传播有限公司 Method for securely processing product promotion information of e-commerce platform
CN109767207A (en) * 2018-12-28 2019-05-17 优城(宁波)地铁科技有限公司 One kind unifying signaling open platform system for urban track traffic
CN109872146A (en) * 2019-02-17 2019-06-11 北京意锐新创科技有限公司 Third party's interface call method and system based on two dimension code reading device

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2759414A1 (en) * 2009-04-20 2010-10-28 Alter Core, S.L. System and method for personal certification using a mobile device
WO2014108005A1 (en) * 2013-01-11 2014-07-17 Tencent Technology (Shenzhen) Company Limited Co-verification method, two-dimensional code generation method, and device and system therefor
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
WO2015184800A1 (en) * 2014-06-05 2015-12-10 Tencent Technology (Shenzhen) Company Limited Method and system for processing resource exchange information
CN104618334A (en) * 2014-12-29 2015-05-13 通邮(中国)科技有限公司 Method and system for generating and verifying dynamic two-dimensional code
CN104715242A (en) * 2015-03-27 2015-06-17 刘学明 Identity authentication system and method based on two-dimensional iris codes
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
US20180121985A1 (en) * 2016-11-01 2018-05-03 Jeom-Doo Kim Origin-connected satellite information system for protection from climate change
CN108052663A (en) * 2017-01-17 2018-05-18 海南亚元防伪技术研究所(普通合伙) A kind of application process and device of shared Quick Response Code
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
WO2019000126A1 (en) * 2017-06-25 2019-01-03 深圳市秀趣品牌文化传播有限公司 Method for securely processing product promotion information of e-commerce platform
CN107368335A (en) * 2017-07-24 2017-11-21 奇酷互联网络科技(深圳)有限公司 A kind of method and apparatus and mobile terminal of Quick Response Code identification
CN107835160A (en) * 2017-10-20 2018-03-23 浙江工商大学 Third party's user authen method based on Quick Response Code
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
CN108510022A (en) * 2018-03-19 2018-09-07 维沃移动通信有限公司 A kind of Quick Response Code generates, verification method and server
CN109767207A (en) * 2018-12-28 2019-05-17 优城(宁波)地铁科技有限公司 One kind unifying signaling open platform system for urban track traffic
CN109872146A (en) * 2019-02-17 2019-06-11 北京意锐新创科技有限公司 Third party's interface call method and system based on two dimension code reading device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
微观两岸: ""福州首创‘福码’支付 市民全城‘一码通行’"", pages 1, Retrieved from the Internet <URL:https://www.sohu.com/a/228493166_411853> *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807131A (en) * 2019-11-01 2020-02-18 中国海洋石油集团有限公司 Drilling rod maintenance line with automatic identification function
CN110807131B (en) * 2019-11-01 2023-06-02 中国海洋石油集团有限公司 Drill rod maintenance line with automatic identification function
CN111709506A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Customized label generation method and system
CN111967556A (en) * 2020-08-11 2020-11-20 福建博思数字科技有限公司 Two-dimensional code offline generation method and storage medium
CN111833047A (en) * 2020-08-19 2020-10-27 深圳市富之富信息科技有限公司 Payment code generation method and device based on mobile payment and computer equipment
CN112398923A (en) * 2020-11-03 2021-02-23 万达信息股份有限公司 Method and system for generating offline electronic health code
CN112215322A (en) * 2020-12-14 2021-01-12 深圳市深圳通有限公司 Traffic two-dimensional code generation method and generation device, and verification method and verification device
WO2022199293A1 (en) * 2021-03-22 2022-09-29 支付宝(杭州)信息技术有限公司 Generation and verification of two-dimensional code
CN113011864A (en) * 2021-03-22 2021-06-22 支付宝(杭州)信息技术有限公司 Two-dimensional code generation and verification method, device, equipment and readable medium
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113223224B (en) * 2021-05-12 2023-10-24 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113255012A (en) * 2021-07-01 2021-08-13 深圳市深圳通有限公司 Method, device and equipment for managing riding codes and storage medium
CN113255012B (en) * 2021-07-01 2021-10-19 深圳市深圳通有限公司 Method, device and equipment for managing riding codes and storage medium
CN114298258A (en) * 2021-12-21 2022-04-08 北京格灵深瞳信息技术股份有限公司 Offline two-dimensional code generation method
CN114444860A (en) * 2021-12-24 2022-05-06 长威信息科技发展股份有限公司 One-code passing method and terminal
CN115509360A (en) * 2022-10-11 2022-12-23 云宝宝大数据产业发展有限责任公司 Virtual reality VR interactive system based on metauniverse
CN115509360B (en) * 2022-10-11 2023-10-20 云宝宝大数据产业发展有限责任公司 Virtual reality VR interactive system based on meta-universe

Also Published As

Publication number Publication date
CN110298421B (en) 2023-11-03

Similar Documents

Publication Publication Date Title
CN110298421A (en) A kind of online generation, offline generation and the verification method and device of two dimensional code
CN110311899A (en) Multiservice system access method, device and server
CN103716326B (en) Resource access method and URG
CN103685311B (en) A kind of login validation method and equipment
CN103281340B (en) 2 D code verification method, system, client, issue and cloud server
CN109379369A (en) Single-point logging method, device, server and storage medium
CN106575327A (en) Analyzing facial recognition data and social network data for user authentication
CN105871867A (en) Identity authentication method, system and equipment
CN108881165A (en) A kind of multicenter Verification System with block issue mechanism
CN109299333B (en) Block chain network account book member management method, device, equipment and storage medium
CN105744555B (en) A kind of terminal maintenance method, maintenance device and NM server
CN112000744A (en) Signature method and related equipment
Shivers Toward a secure and decentralized blockchain-based ride-hailing platform for autonomous vehicles
CN108898440A (en) Flow exchanging method and device
CN109493224A (en) A kind of block chain picture social intercourse system
CN109561429A (en) A kind of method for authenticating and equipment
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN108123961A (en) Information processing method, apparatus and system
CN109636118A (en) Dispatching method, device, server and the system of electric vehicle using motor
CN108650223A (en) A kind of point-to-point authentic authentication method of the network equipment and system
CN107749854A (en) Client-based single-point logging method and system
CN113890739A (en) Cross-block-chain authentication method and device, electronic equipment and medium
CN110020514A (en) Account agency of trademark registration method and apparatus
Figueroa-Lorenzo et al. Alarm collector in smart train based on ethereum blockchain events-log
CN110601850B (en) Scenic spot information recording method, related equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant