CN110858863A - System for providing predefined functions using encrypted images and method for implementing same - Google Patents

System for providing predefined functions using encrypted images and method for implementing same Download PDF

Info

Publication number
CN110858863A
CN110858863A CN201810971040.9A CN201810971040A CN110858863A CN 110858863 A CN110858863 A CN 110858863A CN 201810971040 A CN201810971040 A CN 201810971040A CN 110858863 A CN110858863 A CN 110858863A
Authority
CN
China
Prior art keywords
information
verification
mobile device
encrypted image
totem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810971040.9A
Other languages
Chinese (zh)
Inventor
庄连豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810971040.9A priority Critical patent/CN110858863A/en
Publication of CN110858863A publication Critical patent/CN110858863A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention provides a system for providing predefined functions by using encrypted images and an implementation method thereof, wherein the system comprises a management server, a mobile device acquires an encrypted image (such as a face photo, a household appliance photo, an equipment photo, a switch photo, a dining photo, a vehicle photo and the like) through App, and the encrypted image is decoded to obtain an embedded digital information totem, so that the encrypted image can be verified by the management server, and a function execution instruction (such as executing a telephone App and being connected with a contact person in parallel) related to trigger event information (such as a contact event) is sent to the mobile device and executed; the system can be applied to the application levels of ordering, contacting relatives/dependents/medical units/merchants, emergency rescue calling, patrolling and checking cards, license plate identification, starting equipment, switching on and off and the like.

Description

System for providing predefined functions using encrypted images and method for implementing same
Technical Field
The invention relates to the technical field of image recognition, steganographic (steganographic) coding technology, database access and predefined triggering functions, in particular to a system for providing predefined functions by using encrypted images and an implementation method thereof, wherein the system can enable a mobile device to execute a predefined execution instruction related to the encrypted images through the verification and analysis of a management server after the mobile device collects an encrypted image embedded with a digital information totem.
Background
Generally, when a user wants to browse a specific website through a mobile device, he or she must input a network address (URL, uniform resource locator) to obtain information provided by the network address, in order to reduce the error rate and inconvenience of user input, it is proposed that a two-dimensional bar code (such as a QR code) can be used to describe the network address, thereby improving the efficiency of linking websites and viewing information and serving as a medium for sharing a specific link, it can also be used to turn on apps installed on the mobile device, to perform specific functions provided by a server, namely, the invention of taiwan patent No. TW201619881, "information processing system, information processing system method and non-transitory computer readable recording medium", and the invention of china patent No. CN102663601B, "method for providing service using barcode image, mobile terminal and device" are disclosed; however, the service end must follow the encoding format defined by the two-dimensional barcode, and the conventional two-dimensional barcode can only embed elements such as graphic, background, and color, so that for users with relatively poor visual identification (especially elders, patients, handicapped people, children, etc. who are not good at mobile phone operation), it is still difficult to quickly recognize the corresponding website or service from the two-dimensional barcode, and it is impossible to efficiently determine which two-dimensional barcode to scan to connect to the corresponding website or function; therefore, a technical solution to be provided is to provide a method for providing security, simplifying the operation procedure of the user in a time-saving and fast manner, and improving the efficiency of executing the connection to the specific function/service.
Disclosure of Invention
In view of the above problems, the present invention provides a system for providing predefined functions by using encrypted images, which can simplify the user process and improve the efficiency of executing the connection to specific functions/services, and a method for implementing the same, that is, by collecting an encrypted image embedded with a digital information totem, the mobile device (user end) and the management server (service end) can be integrated, and the execution of the corresponding predefined functions can be completed.
To achieve the above object, the system of the present invention is a system for a mobile device to capture an encrypted image (which can be decoded to capture a digital information totem therefrom), the system comprising: the management server is provided with a verification module and a transmission module; the verification module is used for carrying out a verification program on the digital information totem, acquiring additional information from a data structure stored in the digital information totem when the verification program passes, comparing to obtain trigger event information related to the additional information, and then driving the transmission module by the verification module to send a function execution instruction related to the trigger event information to the mobile device, so that the mobile device can execute a predefined function after analyzing the function execution instruction.
The invention provides a system for providing predefined functions by utilizing encrypted images, which is used for sending a function execution instruction to a mobile device, wherein the mobile device can collect an encrypted image, and the encrypted image can collect a digital information totem which is steganographically from the encrypted image after executing a decoding program, and the system comprises:
the management server is used for the mobile device to communicate through a communication network, and comprises a verification module, a verification database, a trigger event database and a transmission module, wherein the verification database, the trigger event database and the transmission module are respectively in information connection with the verification module;
the verification module is used for performing a verification program on the digital information totem to determine whether the verification database has the digital information totem which is stored and matched and at least one piece of additional information stored in a data structure of the digital information totem, acquiring the additional information from the verification database when the verification program passes, and comparing the additional information with the trigger event database to obtain trigger event information related to the additional information; and
the transmission module is driven by the verification module to send the function execution instruction related to the trigger event information to the mobile device, and the mobile device can execute a predefined function after analyzing the function execution instruction.
Wherein the decoding process is executed in the authentication module of the management server or by an application installed in the mobile device.
The encrypted image is a face photo or a business icon embedded with the digital information totem, when the verification program passes, the additional information acquired by the verification module is contact information, and the function execution instruction is a contact instruction.
The encrypted image is embedded with a patrol icon of the digital information totem, when the verification program passes, the additional information acquired by the verification module is patrol point information, and the function execution instruction is a patrol instruction for the mobile device to perform patrol operation according to the patrol instruction.
The encrypted image is a meal icon, a dining room icon or a dining table icon embedded with the digital information totem, when the verification program passes, the additional information acquired by the verification module is meal information, dining room information or dining table information, and the function execution instruction is a meal ordering instruction.
The encrypted image is an application icon embedded with the digital information totem, when the verification program passes, the additional information acquired by the verification module is an application link address, and the function execution instruction is an application jump instruction.
The invention also provides an implementation method of the system for providing the predefined function by using the encrypted image, and after a mobile device collects the encrypted image embedded with a digital information totem, the following steps are executed:
(A) a step of verifying the digital information totem: a management server carries out a verification procedure on the digital information totem in a verification database so as to determine whether the verification database has at least one piece of additional information stored in a data structure of the digital information totem and the digital information totem which are stored and matched, and obtains the additional information from the verification database when the verification procedure passes; and
(B) a step of generating function execution instructions: the management server compares the additional information with a trigger event database to determine whether the trigger event database stores trigger event information associated with the additional information and a function execution instruction associated with the trigger event information; and
if the trigger event database is stored, the function execution instruction can be sent to the mobile device through the management server, so that the mobile device executes a predefined function after analyzing a link address structure in the function execution instruction.
Before the step (a), the mobile device or the management server executes a decoding program on the encrypted image to compare and analyze the encrypted image with an original image stored in the verification database, and collects the steganographic digital information totem from the encrypted image.
Wherein, the encrypted image is a face photo or a business icon, and when the verification procedure in step (a) passes, the additional information obtained by the management server is a contact information, and after the comparison of the contact information in step (B), the generated function execution instruction is a contact instruction.
The encrypted image is a patrol icon, when the verification program in the step (A) passes, the additional information acquired by the management server is patrol point information, the patrol point information is compared in the step (B), the generated function execution instruction is a patrol instruction, and the patrol instruction can be used for the mobile device to perform patrol operation according to the patrol point information, patrol personnel information and timestamp information.
And (c) the encrypted image is a meal icon, a dining room icon or a dining table icon, when the verification program in the step (a) passes, the additional information acquired by the management server is meal order information, dining room information or dining table information, and after the additional information is compared in the step (B), the generated function execution instruction is a meal ordering instruction.
Wherein, the encrypted image is an application icon, and when the verification program in step (a) passes, the additional information obtained by the management server is an application link address, and after the comparison in step (B), the generated function execution instruction is an application jump instruction.
The invention has the beneficial effects that:
after the implementation of the invention, the mobile device (user end) and the management server (service end) can be effectively integrated, and the execution of the corresponding predefined function can be completed, thereby simplifying the user process and improving the efficiency of connecting to the specific function/service execution.
Drawings
FIG. 1 is a system architecture diagram of the present invention.
Fig. 2 is a system architecture diagram of the present invention.
FIG. 3 is a flow chart of a system implementation of the present invention.
FIG. 4 is a diagram illustrating an application scenario of the first embodiment of the present invention.
FIG. 5 is a diagram illustrating an application scenario of the second embodiment of the present invention.
FIG. 6 is a diagram illustrating an application scenario of the third embodiment of the present invention.
Fig. 7 is a system architecture diagram of a fourth embodiment of the present invention.
Fig. 8 is a system architecture diagram of a fifth embodiment of the present invention.
Description of the reference numerals
10 System for providing predefined functionality Using encrypted images
101 moving device
1011 scanning module
1012 function trigger module
APP application
102 management server
1021 authentication module
1022 verification database
1023 database of trigger events
1024 transmission module
103 application service server
I encrypted image
D digital information totem
P APP network data packet
F function execution instruction
N1 communication network
N2 second communication network
S1 acquiring encrypted image
S2 decoding the encrypted image to obtain the digital information totem
S3 verification digital information totem
S4 obtaining trigger event information
S5 generates a function execution instruction based on the trigger event information.
Detailed Description
In order to make the examiner clearly understand the objects, technical features and technical effects of the present invention, the following description will be made with reference to the accompanying drawings.
Referring to the system architecture diagram of fig. 1, the system 10 for providing a predefined function by using an encrypted image according to the present invention is configured to enable a mobile device 101(mobile device) to acquire an image signal of an encrypted image I by using a scanning module 1011, execute a decoding procedure to acquire a steganographic digital information totem D from the image signal, and send the digital information totem D to a management server 102 through a communication network N1, and after the management server 102 completes verification/comparison, send a function execution instruction F to the mobile device 101 to enable the mobile device 101 to execute a predefined function, wherein:
digital information totem D: the data structure (data structure) can store information of various data types such as integers, floating point numbers, characters, Boolean numbers, and bits (e.g., video bit data, symbols, etc.).
Encryption of image I: the physical images may be a facial photograph, a business icon, a tour inspection icon, a meal icon, a dining hall icon, a dining table icon, an application icon, etc., but not limited thereto.
The mobile device 101: the scanning module 1011 can be a smart phone, a tablet computer or a wearable device with networking function, and can have a camera lens and a CMOS/CCD image sensor.
Referring to the system architecture diagram of fig. 2 and with reference to fig. 1, the mobile device 101 of the system 10 for providing predefined functions by using encrypted images may be installed with an application program (APP), a scanning module 1011 and a function triggering module 1012 respectively connected to the application program (APP), wherein the application program (APP) may be built with a decoding program capable of decoding an image signal of the encrypted image I to acquire a digital information totem D therefrom; the management server 102 may include an authentication module 1021, and further includes an authentication database 1022, a trigger event database 1023 and a transmission module 1024 respectively in communication with the authentication module 1021; the management server 102 has a Central Processing Unit (CPU), and the management server 102 can drive the modules and access the data of the databases, and has the functions of logic operation, temporary storage of operation results, and storage of execution instruction locations, wherein:
a verification module 1021: the digital information totem D may be subjected to a verification procedure in the verification database 1022 to determine whether the verification database 1022 has the stored matching digital information totem D and at least one additional information stored in the data structure of the digital information totem D, and when the verification procedure passes, an additional information is obtained from the verification database 1022, and then at least one trigger event information associated with the additional information is compared in the trigger event database 1023.
The verification database 1022: the digital image encryption method can store a digital information totem D, a digitalized encrypted image I subjected to imaging synthesis, at least one additional information stored in a data structure of the digital information totem D and an original image subjected to imaging synthesis with the digital information totem D.
Trigger event database 1023: in communication with the verification database 1022, at least one trigger event message associated with the additional message and a function execution instruction F associated with the trigger event message may be stored.
In summary, the additional information stored in the verification database 1022 may be, but is not limited to, a contact information, a patrol point information, a dining room information, a dining table information, an application link address, a license plate number information, etc.; the trigger event information stored in the trigger event database 1023 can be a contact event, a meal ordering event, an APP skip event, a label patrol event, a license plate identification event, etc., but not limited thereto; the function executing instruction F stored in the trigger event database 1023 may be a contact instruction, a meal ordering instruction, a label walking instruction, an application jump instruction, etc., but not limited thereto.
The transmission module 1024: the transmission module 1024 is adapted to communicate with the mobile device 101 and may be one of Wi-Fi, bluetooth, Zigbee, NFC, 3G/4G, ethernet, or a combination thereof.
The function triggering module 1012: the mobile device 101 can execute a predefined function according to the linked address structure by parsing the linked address structure of the function executing instruction F sent by the management server 102.
In this embodiment, the function executing command F may be a URL Scheme command, and the link address structure may include a service type name (< Scheme >), a host domain name (< host > or < host >), a resource path name (< path >), a command parameter name (< query >), or a customized combination of the above parameters.
As mentioned above, the service type names can be shown as, but not limited to, http(s), tel (set phone call), sms, mailto, itms-Apps, fb, whatsApp, etc.; the host domain name may be www.host.com; php or a Package Name of a third party application (hereinafter referred to as third party APP) or an APP ID (identity identifier) of the third party APP; the command parameter name may be, but not limited to, a phone number, a Web site (e.g., Web-ordering interface), a send-text (send-text) or an openURL for connecting to the third party APP.
Please refer to the flowchart of fig. 3, which shows the following steps of the system implementation of the present invention, with reference to fig. 1 and fig. 2:
acquiring an encrypted image (step S1): a mobile device 101 acquires an encrypted image I embedded with a digital information totem D, and the digital information totem D is hidden in an original image for decoding in the step S2 by using, for example, but not limited to, one of a Quantization Index Modulation (QIM), a Vector Quantization coding (VQ), a Quantization Index remainder Modulation (QIMM), a Least Significant Bit coding (LSB), or a combination thereof through a management server 102.
Decoding the encrypted image to obtain a digital information totem (step S2): the mobile device 101 executes a decoding program on the encrypted image I to collect the steganographic digital information totem D from the encrypted image I and send the steganographic digital information totem D to the management server 102; the decoding procedure can be defined as the following procedures, but is not limited to the following procedures:
(A) comparing and analyzing the encrypted image I with the original image to find out the pixel difference between the encrypted image I and the original image, wherein the original image may be stored in a verification database 1022 of the management server 102 or stored in the mobile device 101 in advance; or
(B) Performing multi-channel (such as RGB color space) scanning on the encrypted image I by using a decoding software package (such as StegSolve) to confirm whether the digital information totem D in the encrypted image I is steganographically written in a lowest bit of a certain color; or
(C) The attribute information of the encrypted image I is examined to determine whether a Key (Key) and/or a Flag (Flag) string included in the digital information totem D is embedded in the encrypted image I.
Verification digital information totem (step S3): the management server 102 performs a verification procedure on the digital information totem D in a verification database 1022 to determine whether the verification database 1022 has at least one piece of additional information stored in the data structure of the digital information totem D and the digital information totem D stored therein, and when the verification procedure passes, the additional information is obtained from the verification database 1022, and the form of the additional information is not described herein again.
Acquiring trigger event information (step S4): the management server 102 compares the additional information obtained in step S3 with a trigger event database 1023 to determine whether the trigger event database 1023 stores a trigger event information associated with the additional information, and the form of the trigger event information is not described herein.
Generating a function execution instruction according to the trigger event information (step S5): the management server 102 compares the trigger event information obtained in step S4 with the trigger event database 1023 to determine whether the trigger event database 1023 stores a function execution instruction F associated with the trigger event information, and if so, sends the function execution instruction F to the mobile device 101 to enable the mobile device 101 to execute a predefined function corresponding to the function execution instruction F.
With reference to step S5, in some embodiments, the present invention can be applied to application layers such as face recognition, merchant recognition, patrol check card, restaurant ordering, execution of other APPs, license plate recognition, home appliance start, emergency call, etc.:
face recognition: referring to the application scenario diagram of the first embodiment of fig. 4, when the encrypted image I collected in step S1 is a face photograph (e.g., son photograph), and when the verification process in step S3 passes, the additional information obtained in step S4 may be a contact information, the trigger event information obtained by comparing the contact information in step S4 is a contact event, the function execution instruction F obtained by comparing the contact event in step S5 is a contact instruction, so that the mobile device 101 can drive a phone APP (which may be native or Web edition) to contact a contact (e.g., wangming shown in fig. 4) corresponding to the contact information, and the phone APP may be a network phone application (e.g., WeChat).
Identifying a merchant: referring to the application scenario diagram of the second embodiment of fig. 5 and the embodiment of face recognition, when the encrypted image I collected in step S1 is a merchant icon (e.g., a hospital icon or a hydropower house icon shown in fig. 5), and the function executing instruction F obtained by comparing in step S5 is also the contact instruction, the mobile device 101 may drive the phone APP to contact the merchant corresponding to the contact information (e.g., a hydropower house or an ABC hospital shown in fig. 5 for emergency call).
Ordering in a restaurant: referring to the application scenario diagram of the third embodiment of fig. 6, when the encrypted image I collected in step S1 is a meal icon (e.g., yuzi shao, salmon miso soup shown in fig. 6), a dining room icon, or a dining table icon, and when the verification procedure of step S3 passes, the additional information obtained in step S4 may be one or a combination of one or more of meal information, dining room information, and dining table information corresponding to the encrypted image I, and the additional information is compared in step S4 to obtain a trigger event information as a meal ordering event, and the meal ordering event is compared in step S5 to obtain a function execution instruction F as a meal ordering instruction, so that the mobile device 101 can guide the mobile device 101 to a meal ordering interface for meal ordering by scanning the meal icon of MENU, the dining room icon, or the icon of dining table in the dining room.
And (3) label patrol and card punching: when the encrypted image I collected in step S1 is a patrol icon and the verification process in step S3 passes, the additional information obtained in step S4 is patrol point information, the trigger event information obtained by comparing the patrol point information in step S4 is a patrol event, and the function execution instruction F obtained by comparing the patrol event in step S5 is a patrol instruction, so that the mobile device 101 can upload to a patrol server according to the patrol point information, patrol personnel information, and a timestamp information to perform a patrol operation (i.e., patrol card-punching operation).
Execution of other APPs: referring to the system architecture diagram of the fourth embodiment in fig. 7, when the encrypted image I collected in step S1 is an application icon (e.g., WhatsApp icon shown in fig. 7), and when the verification process of step S3 passes, the additional information obtained in step S4 may be an application link address corresponding to the encrypted image I, the application link address is compared with the trigger event information obtained in step S4 to obtain an APP jump event, and the APP jump event is compared with the function execution instruction F obtained in step S5 to obtain an application jump instruction, so that if the encrypted image I scanned by the mobile device 101 corresponds to other APPs that need to be networked, after the mobile device 101 parses the APP jump instruction, the mobile device 101 may send an APP network packet p (packet) including a Header (Header) and a function execution instruction F to an application service provider (provider) via a second communication network N2 An application service server 103 (e.g., a messenger server from WhatsApp).
In light of the above, since the encrypted image I is difficult for the user of the mobile device 101 to visually perceive the difference between the encrypted image I and the original image, and the digital information totem D hidden in the encrypted image I is also difficult to be seen, moreover, the encrypted image I can be presented differently according to various predefined functions, rather than a bar code (such as a QR code) which is difficult to identify, so that the system of the present invention can be implemented to allow users with relatively poor visual identification, the mobile device 101 is used to quickly execute a predefined function corresponding to the encrypted image I, and in addition to the above application level, the predefined function may be, but not limited to, text viewing, multimedia image/movie playing, device switch turning on/off a device (e.g., a home appliance), digital coupon presentation, digital advertisement viewing, and payment by connecting payment modules in series.
Referring to the system architecture diagram of fig. 8 in a fifth embodiment of the present invention, and referring to fig. 1 and fig. 3, in this embodiment, compared to the above embodiments, step S2 can be executed in the management server 102 instead of the mobile device 101, and in more detail, after the mobile device 101 of this embodiment collects the encrypted image I through the scanning module 1011, an image signal of the encrypted image I can be sent to the management server 1011, and the verification module 1021 receives the image signal, so as to continue to execute the decoding procedure of step S2; this reduces the arithmetic processing load of the mobile device 101 in executing the decoding program.
To sum up, the system provided by the present invention is capable of enabling a mobile device to collect an encrypted image, and the encrypted image can collect a digital information totem after passing through a decoding program, so that a management server can perform a verification program on the digital information totem, and when the verification program passes, obtain an additional information from a data structure stored in the digital information totem, compare the additional information with a trigger event information associated with the additional information, and then the management server sends a function execution instruction associated with the trigger event information to the mobile device, so that the mobile device executes a predefined function after analyzing a link address structure in the function execution instruction; therefore, the present invention can effectively integrate the mobile device (client) and the management server (server) and complete the execution of the corresponding predefined function, thereby simplifying the user process and improving the efficiency of connecting to the specific function/service execution.
However, the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention; those skilled in the art should also realize that such equivalent changes and modifications can be made without departing from the spirit and scope of the present invention.

Claims (12)

1. A system for providing predefined functions using encrypted images for sending a function execution command to a mobile device, the mobile device capable of capturing an encrypted image from which a steganographically represented digital information totem can be captured after performing a decoding process, the system comprising:
the management server is used for the mobile device to communicate through a communication network, and comprises a verification module, a verification database, a trigger event database and a transmission module, wherein the verification database, the trigger event database and the transmission module are respectively in information connection with the verification module;
the verification module is used for performing a verification program on the digital information totem to determine whether the verification database has the digital information totem which is stored and matched and at least one piece of additional information stored in a data structure of the digital information totem, acquiring the additional information from the verification database when the verification program passes, and comparing the additional information with the trigger event database to obtain trigger event information related to the additional information; and
the transmission module is driven by the verification module to send the function execution instruction related to the trigger event information to the mobile device, and the mobile device can execute a predefined function after analyzing the function execution instruction.
2. The system for providing predefined functions using encrypted images according to claim 1, wherein the decoding process is executed in the authentication module of the management server or through an application installed in the mobile device.
3. The system for providing predefined functions using encrypted images according to claim 1, wherein the encrypted image is a facial photo or a business icon embedded with the digital information totem, and when the verification process is passed, the additional information obtained by the verification module is a contact information, and the function execution instruction is a contact instruction.
4. The system according to claim 1, wherein the encrypted image is a patrol icon embedded with the digital information totem, and when the verification process passes, the additional information obtained by the verification module is patrol point information, and the function execution instruction is a patrol command for the mobile device to perform a patrol operation according to the patrol command.
5. The system for providing predefined functions using encrypted images according to claim 1, wherein the encrypted image is a meal icon, a dining room icon or a dining table icon embedded with the digital information totem, and when the verification program passes, the additional information obtained by the verification module is meal point information, dining room information or dining table information, and the function execution instruction is a meal ordering instruction.
6. The system for providing predefined functions using encrypted images according to claim 1, wherein the encrypted image is an application icon embedded with the digital information totem, and when the verification program passes, the additional information obtained by the verification module is an application link address, and the function execution instruction is an application jump instruction.
7. An implementation method of a system for providing predefined functions by using encrypted images is characterized in that after a mobile device collects an encrypted image embedded with a digital information totem, the following steps are executed:
(A) a step of verifying the digital information totem: a management server carries out a verification procedure on the digital information totem in a verification database so as to determine whether the verification database has at least one piece of additional information stored in a data structure of the digital information totem and the digital information totem which are stored and matched, and obtains the additional information from the verification database when the verification procedure passes; and
(B) a step of generating function execution instructions: the management server compares the additional information with a trigger event database to determine whether the trigger event database stores trigger event information associated with the additional information and a function execution instruction associated with the trigger event information; and
if the trigger event database is stored, the function execution instruction can be sent to the mobile device through the management server, so that the mobile device executes a predefined function after analyzing a link address structure in the function execution instruction.
8. The method of claim 7, wherein before step (A), the mobile device or the management server performs a decoding process on the encrypted image to compare the encrypted image with an original image stored in the verification database, and collects the digital information from the encrypted image.
9. The method as claimed in claim 7, wherein the encrypted image is a face photograph or a business icon, and when the verification procedure in step (a) is passed, the additional information obtained by the management server is a contact information, and the function execution command generated after the comparison in step (B) is a contact command.
10. The method of claim 7, wherein the encrypted image is a patrol icon, and when the verification procedure of step (A) is passed, the additional information obtained by the management server is patrol point information, and the function execution command generated after the comparison of step (B) is a patrol command, and the patrol command is used for the mobile device to perform a patrol operation according to the patrol point information, a patrol person information and a timestamp information.
11. The method as claimed in claim 7, wherein the encrypted image is a meal icon, a dining room icon or a dining table icon, and when the verification procedure in step (a) is passed, the additional information obtained by the management server is meal information, dining room information or dining table information, and the additional information is compared in step (B), and the function execution instruction is a meal instruction.
12. The method as claimed in claim 7, wherein the encrypted image is an application icon, and when the verification procedure in step (a) is passed, the additional information obtained by the management server is an application link address, and the application link address is compared in step (B), and the function executing instruction is an application jump instruction.
CN201810971040.9A 2018-08-24 2018-08-24 System for providing predefined functions using encrypted images and method for implementing same Pending CN110858863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810971040.9A CN110858863A (en) 2018-08-24 2018-08-24 System for providing predefined functions using encrypted images and method for implementing same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810971040.9A CN110858863A (en) 2018-08-24 2018-08-24 System for providing predefined functions using encrypted images and method for implementing same

Publications (1)

Publication Number Publication Date
CN110858863A true CN110858863A (en) 2020-03-03

Family

ID=69635471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810971040.9A Pending CN110858863A (en) 2018-08-24 2018-08-24 System for providing predefined functions using encrypted images and method for implementing same

Country Status (1)

Country Link
CN (1) CN110858863A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117540067A (en) * 2024-01-10 2024-02-09 四川三思德科技有限公司 Social governance-oriented big data visualization method, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050254714A1 (en) * 2004-05-13 2005-11-17 Ramakrishna Anne Systems and methods for data transfer with camera-enabled devices
CN102375752A (en) * 2010-08-09 2012-03-14 株式会社泛泰 Apparatus and method for sharing application with a portable terminal
CN102663601A (en) * 2012-04-11 2012-09-12 唐诗宇 Method, mobile terminal and device for offering service by means of barcode images
CN106327185A (en) * 2016-08-26 2017-01-11 维沃移动通信有限公司 Starting method for payment application and mobile terminal
CN108133129A (en) * 2017-06-22 2018-06-08 广东网金云计算有限公司 A kind of unlocking method of application program, device and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050254714A1 (en) * 2004-05-13 2005-11-17 Ramakrishna Anne Systems and methods for data transfer with camera-enabled devices
CN102375752A (en) * 2010-08-09 2012-03-14 株式会社泛泰 Apparatus and method for sharing application with a portable terminal
CN102663601A (en) * 2012-04-11 2012-09-12 唐诗宇 Method, mobile terminal and device for offering service by means of barcode images
CN106327185A (en) * 2016-08-26 2017-01-11 维沃移动通信有限公司 Starting method for payment application and mobile terminal
CN108133129A (en) * 2017-06-22 2018-06-08 广东网金云计算有限公司 A kind of unlocking method of application program, device and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117540067A (en) * 2024-01-10 2024-02-09 四川三思德科技有限公司 Social governance-oriented big data visualization method, device and medium

Similar Documents

Publication Publication Date Title
KR101541263B1 (en) Method and apparatus for executing user action commands
JP6402144B2 (en) Method and system for finding a guardian based on a two-dimensional code
KR101993239B1 (en) Method and apparatus for managing user device and contents using QR code
CN102103669B (en) Automatic safe control system and computer implemented method
US8668144B2 (en) Method and process for symbolic mark decoding
JP3153720B2 (en) Video presentation system
JP5312701B1 (en) Business card management server, business card image acquisition device, business card management method, business card image acquisition method, and program
US20100191728A1 (en) Method, System Computer Program, and Apparatus for Augmenting Media Based on Proximity Detection
US10867143B2 (en) Systems and methods for age-restricted product registration
JP2007128230A (en) Visitor automatic acceptance system using portable terminal and method and its program
JP2005174317A5 (en)
CN103563346A (en) System and method for establishing a communication session
KR101574241B1 (en) Qr code recognition processing system
US20120244891A1 (en) System and method for enabling a mobile chat session
JP2013026848A (en) Digital watermark advertisement content service system
CN105515887B (en) application testing method, server and system
CN110858863A (en) System for providing predefined functions using encrypted images and method for implementing same
JP2004179783A (en) Mobile client apparatus, mobile client support system, id interpreting method, and id interpreting program
TWM573480U (en) System using encrypted images to provide predefined functions
CA3115293A1 (en) Systems and methods for age-restricted product activation
TWI680420B (en) System and implementation method for providing predefined function based on encrypted image
KR20120109265A (en) Food information provision system and method thereof using qr code limked with broadcasting program
JP2010056894A (en) Video information management system
JP3221969U (en) Encryption Gallery Management System
CN112911003A (en) Electronic data extraction method, computer device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200303