CN113076494A - Sacrifice method and sacrifice system based on two-dimensional code - Google Patents

Sacrifice method and sacrifice system based on two-dimensional code Download PDF

Info

Publication number
CN113076494A
CN113076494A CN202110419936.8A CN202110419936A CN113076494A CN 113076494 A CN113076494 A CN 113076494A CN 202110419936 A CN202110419936 A CN 202110419936A CN 113076494 A CN113076494 A CN 113076494A
Authority
CN
China
Prior art keywords
information
personal information
dimensional code
sacrifice
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110419936.8A
Other languages
Chinese (zh)
Inventor
李科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110419936.8A priority Critical patent/CN113076494A/en
Publication of CN113076494A publication Critical patent/CN113076494A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a sacrifice method and a sacrifice system based on two-dimensional codes, and relates to the fields of internet and sacrifice. A sacrifice method based on two-dimensional codes comprises the following steps: acquiring personal information, analyzing the acquired personal information to determine the information length of the personal information, and determining the format of the personal information according to the information length; converting input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words; generating a corresponding key for the data code word, encrypting the key according to an encryption algorithm, and opening a modification authority according to a preset rule; uploading the encrypted personal information to a server side, and generating a two-dimensional code; the scanning device can enable a user to carry out commemoration and remote sacrifice and sweep activities through scanning of the two-dimensional code. In addition, the invention also provides a sacrifice system based on the two-dimensional code, which comprises the following components: the device comprises an acquisition module, a conversion module, an encryption module and a generation module.

Description

Sacrifice method and sacrifice system based on two-dimensional code
Technical Field
The invention relates to the field of internet and sacrifice, in particular to a sacrifice method and a sacrifice system based on two-dimensional codes.
Background
In the prior art, the gravestone records the information of the dead by engraving characters on the gravestone, so that a lot of information cannot be recorded comprehensively and is inconvenient for later reference. The traditional gravestone only has a grave name plate, and the information is not comprehensive.
And the existing funeral industry does not have a uniform platform for recording the life of people, and the existing part of websites support login, registration and biography creation, but the user cannot find the website after a period of time. Meanwhile, after the biography is created by the existing website, services in the field of funeral service are not involved, the function is single, the use rate of the biography is too low, the biography significance is lost, and the development of the modern funeral industry cannot be adapted.
The two-dimensional code is a digital matrix formed by 0/1, which is a black and white pattern distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific set pattern, records data symbol information, and skillfully utilizes the concept of '0' and '1' ratio forming the internal logic foundation of a computer in code making. A number of geometric shapes corresponding to binary values are used to represent alphanumeric information. The automatic identification is realized through an image input device or a photoelectric scanning device to realize the automatic information processing, the common characteristics of a bar code technology are provided, each code system has a specific character set, each character occupies a certain width, and the automatic identification device has a certain checking function and the like, and simultaneously has the characteristics of automatic information identification function on different rows, rotary reset of processing graphs and the like. The two-dimensional code can express information in both the horizontal and vertical directions, and therefore, a large amount of information can be expressed in a small area.
The red education is the symbolism and the pragmatic placement of the spirit connotation of the times in red, and is education, and advocated high spirit of the youth, such as the apprehension of the national worries, the challenge of self, the exceeding of self, the challenge of limit and the contribution to the society is called for. Establishing a ancestor database, recording ancestor trails, developing the spirit of the ancestors, and nourishing green life on the land stained red by the fresh blood of the blast;
the family culture is used as a component of the traditional culture and is an important basis for family inheritance; the family relation network is the continuation of blood vessel situation relatives, family tracing can be carried out only by a family database, and the foundation of family searching is realized; under the social environment that the relative consciousness of people is gradually indifferent, the family members can know the detailed conditions and information of the family members in detail no matter how far or near the family members are; the current descendants are all the year round and lack of knowledge of the information of ancestors; the communication fault among family members is serious, so that the vanishing ancestors are much less informed, and most of the future generations are basically 'blind-swept' for tomb in the clear; and (3) establishing an ancestral information network, constructing a family database, and facilitating the detailed understanding of family culture, family members and ancestral information of descendants and the inheritance of blood vessels through continuance generations.
How to combine the two-dimensional code with sacrifice is a problem that needs to be solved urgently by technical personnel in the field.
Disclosure of Invention
The invention aims to provide a sacrifice method based on two-dimensional codes, which can integrate character biography, cemetery service and human worship sacrifice into a server with the character biography by adopting a two-dimensional code technology, so that a user can perform commemoration and sacrifice remotely by scanning the two-dimensional codes.
Another object of the present invention is to provide a sacrifice system based on two-dimensional code, which can operate a sacrifice method based on two-dimensional code.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides a sacrifice method based on a two-dimensional code, which includes obtaining personal information, performing information analysis on the obtained personal information, determining an information length of the personal information, and determining a format of the personal information according to the information length; converting input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words; generating a corresponding key for the data code word, encrypting the key according to an encryption algorithm, and opening a modification authority according to a preset rule; and uploading the encrypted personal information to a server side, and generating the two-dimensional code.
In some embodiments of the present invention, the obtaining of the personal information and performing information analysis on the obtained personal information to determine the information length thereof, and determining the format thereof according to the information length includes: the user uploads personal information which comprises characters, pictures, audio and video.
In some embodiments of the present invention, the generating a corresponding key from the data codeword, and encrypting the key according to an encryption algorithm, and opening the modification right according to a preset rule includes: the method comprises the steps of classifying personal information, setting different authorities for a plurality of pieces of personal information in each classified information, and setting authorities for a plurality of pieces of personal information in each information respectively.
In some embodiments of the present invention, the above further includes: and setting the information to be visible or visible after authorization, counting partial visible personal information in each piece of information, and sending the partial visible personal information in each piece of information to the two-dimensional code generation module.
In some embodiments of the present invention, the uploading the encrypted personal information to a server, and generating the two-dimensional code includes: the two-dimension code information is preset with at least one cemetery service item, a service request is generated according to the cemetery service item selected by a user and the corresponding two-dimension code, and the service request is sent to a cemetery service end.
In some embodiments of the present invention, the above further includes: and connecting the service requests, recording each service request, receiving and recording the service progress of each service request fed back by the cemetery service terminal, and transmitting the service progress to the user terminal in real time.
In some embodiments of the present invention, the uploading the encrypted personal information to a server, and generating the two-dimensional code includes: and adding the personal image information in the personal information into the generated two-dimensional code and displaying the personal image information together.
In a second aspect, an embodiment of the present application provides a sacrifice system based on a two-dimensional code, which includes an obtaining module, configured to obtain personal information, perform information analysis on the obtained personal information, determine an information length of the personal information, and determine a format of the personal information according to the information length;
the conversion module is used for converting the input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words;
the encryption module is used for generating a corresponding key from the data code word, encrypting the key according to an encryption algorithm and opening a modification authority according to a preset rule;
and the generating module is used for uploading the encrypted personal information to the server side and generating the two-dimensional code.
In some embodiments of the invention, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises an acquisition module, a conversion module, an encryption module and a generation module.
In a third aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method such as any one of sacrifice methods based on two-dimensional codes.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the method can integrate character biography, cemetery service and humanistic sacrifice in a server with the character biography by adopting a two-dimensional code technology, so that a user can commemorate and remotely perform sacrifice activities by scanning two-dimensional codes. Through analyzing the personal electronic files, classifying the files simultaneously, setting different permissions for a plurality of personal information in each classified information block, generating tracing two-dimensional codes corresponding to partial visible personal information, and checking partial personal information through the tracing two-dimensional codes.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating steps of a sacrifice method based on a two-dimensional code according to an embodiment of the present invention;
fig. 2 is a detailed step diagram of a sacrifice method based on two-dimensional codes according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a sacrifice system module based on a two-dimensional code according to an embodiment of the present invention;
fig. 4 is an electronic device according to an embodiment of the present invention.
Icon: 10-an acquisition module; 20-a conversion module; 30-an encryption module; 40-generating module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic view illustrating steps of a sacrifice method based on two-dimensional codes according to an embodiment of the present invention, which is shown as follows:
step S100, acquiring personal information, analyzing the acquired personal information to determine the information length of the personal information, and determining the format of the personal information according to the information length;
in some embodiments, the personal information may include recorded biographical resumes, genealogies, photographs, videos, poems, sensuals, and academic presentations, as well as words intended to talk to family and friends, words intended to talk to people who have not waited.
In some embodiments, the biographical resume may include material written by oneself that narrates the self-propagation nature of experiences, family conditions, social relationships, and sends several personal information of the categorized pieces of information to the rights setting module and the archive storage database.
In some embodiments, a person who comes to visit or comes to visit can see the data such as the life-style resume, the photo, the video, the poem, the expression, the academic introduction and the like by scanning the two-dimensional code at the two-dimensional code, and the sacrifice and the red-color educational history are promoted to enter the network information era for the reference and recall of the later; the method realizes green sacrifice, can widely publicize the traditional culture of China, inherits the excellent tradition of the predecessors, has very high popularization value and has the function of sacrifice.
In some embodiments, each person may apply for and establish an account number before birth, and the related person may apply for and establish an account number for a parent that has died away. When the user applies for and establishes the account, the user can modify all information. The relevant person applies for and establishes an account number for the relatives of the person who have died away, and only allows the relevant person to modify the authority of the modifiable information.
Step S110, converting input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words;
in some embodiments, the input personal information is analyzed to determine its information length, its format and version are determined according to the information length, and the input information is converted into a bit stream by data encoding, and a codeword of error correction channel encoded data is generated by performing finite field conversion using an error correction channel encoding algorithm.
Step S120, generating a corresponding key for the data code word, encrypting the key according to an encryption algorithm, and opening a modification authority according to a preset rule;
in some embodiments, the data code word is generated into a corresponding key, the key is encrypted according to an encryption algorithm, and the encrypted key is converted into an encrypted code word according to a preset encoding algorithm; acquiring the data code length and the error correction grade of the data code word through the encrypted code word, and searching the number of error correction code word blocks in a preset error correction characteristic table entry; and generating two-dimensional code information by the data code words and the encrypted code words according to a construction mode corresponding to the number of the error correction code word blocks, wherein the two-dimensional code information is used for receiving partial visible personal information in each information version block sent by permission setting.
In some embodiments, according to a preset rule, for example, only the direct relatives may open the modification authority for the personal information, or only the direct relatives are administrators of the personal information, and when the remaining users want to refer to the personal information, the users need to pass through the consent of the direct relatives.
And step S130, uploading the encrypted personal information to a server side, and generating a two-dimensional code.
In some embodiments, the received personal information partially visible in each information layout block is recorded into a two-dimensional code generator, and the two-dimensional code generator encodes the personal information according to a specific encoding method to obtain a tracing two-dimensional code corresponding to the personal information partially visible to the login person.
In some embodiments, red education and traditional culture education can be known through two-dimension code scanning, and the traditional culture of China can be widely publicized and the excellent tradition of the elder people is inherited.
In some embodiments, the photoronous trails of heroic roasters can be known by scanning the two-dimensional code, a memorial gate is opened for roasters who do not have subsequent roasters due to war, and teenagers can know more red cultures through the function, so that the purpose of red education is achieved.
In some embodiments, a user may enter the system by WeChat authorized login or mobile phone authenticated login; system users are divided into common users and platform members, and the common users can view home page and platform advertisements; adding a platform member, and searching and viewing family information; the member can purchase family service, can choose different service deadlines to purchase according to the demand, enjoy the family service after purchasing, can improve family information, establish the family name, add family member, including member in the world, have passed the elder, add member basic information, name, birth time, time of birth, identity, detailed introduction, upload member's photo, video, associate member's identity, show in the relation chart after associating; the added member information can generate a member two-dimensional code with parameters, and the basic conditions of the members can be known by scanning the code; the family member two-dimensional code can be stored and shared, the family member can be shared, the family information can be checked after the member clicks the link, the family relationship graph is known, the family members can participate in the family information, a long-term effective family system is established, and the family member two-dimensional code is reserved for the electronic family tree of which the offspring is precious. Creating the knight information: name, birth time, time of deceiving, identity, its detailed introduction hero incident, upload photo, video etc. generates exclusive two-dimensional code, sweeps the code and can look over the detail, lets red education more deep, lets red biography more extensive.
Example 2
Referring to fig. 2, fig. 2 is a detailed schematic diagram of a sacrifice method based on two-dimensional codes according to an embodiment of the present invention, which is shown as follows:
step S200, the user uploads personal information, wherein the personal information comprises characters, pictures, audios and videos.
Step S210, classifying the personal information, setting different authorities for a plurality of pieces of personal information in each piece of classified information, and setting authorities for a plurality of pieces of personal information in each piece of information respectively.
And S220, setting the information to be visible or visible after authorization, counting partial visible personal information in each piece of information, and sending the partial visible personal information in each piece of information to a two-dimensional code generation module.
Step S230, presetting at least one cemetery service item in the two-dimension code information, generating a service request according to the cemetery service item selected by the user and the corresponding two-dimension code, and sending the service request to a cemetery service end.
Step S240, connecting the service requests and recording each service request, receiving and recording the service progress of each service request fed back by the cemetery service end, and transmitting to the user end in real time.
And step S250, adding the personal image information in the personal information into the generated two-dimensional code and displaying the personal image information together.
In some embodiments, biographical information uploaded by the user is stored as material of biographical user-set characters; adopting a basic template in the biography template as a basis for loading biographies of people, loading biographical information into the basic template by a user through the biography template, and further splicing and combining the basic template loaded with the biographical information to obtain the biographical template; in the process of editing the biography of the character, a user can adopt the biography template prestored in the biography template to carry out one-key quick editing and can also carry out self-defined editing through the biography template. The user creates a biography of the person through a biographical template through biographical settings.
The user can store the life data of the deceased in the character biography in the modes of pictures, texts, audio and video, and the character biography is linked to the server through the Internet, so that the code sweeping and recalling at any time and any place are realized, the resources are saved, and the environment is protected. The character biography comprises a personal brief introduction, a tomb nameplate, a photo set, a life journey, a work set and a video set, and can be added or deleted in addition to the personal brief introduction according to the selection of a user.
In some embodiments, the two-dimensional code may be engraved on the gravestone corresponding to the grave by using a copper process. The copper two-dimensional code arranged on the tombstone is used for connection between an online and offline connecting line and between a user and a cemetery, and the copper two-dimensional code can also be used as a novel acupuncture point number.
In some embodiments, the two-dimensional code is engraved on a plurality of monuments, the monuments being used to carry mementos with the user and to scan the two-dimensional code to log in to the server. The memorial object engraved with the two-dimensional code is used as a two-dimensional code carrier carried by a user, and the user can scan the two-dimensional code at any time through the carried memorial object to log in the server to perform commemoration and sacrifice activities. The memorial is used as a carrier, so that the contact between the user and cemetery services and biography of characters is realized, and the phenomenon that the biography of the characters is invalid due to the fact that the user forgets a website is avoided.
Example 3
Referring to fig. 3, fig. 3 is a schematic view of a sacrifice system module based on two-dimensional code according to an embodiment of the present invention, which is shown as follows:
the acquisition module 10 is used for acquiring personal information, analyzing the acquired personal information, determining the information length of the personal information, and determining the format of the personal information according to the information length;
a conversion module 20, configured to convert input information into a bit stream through data coding, perform finite field conversion according to a preset algorithm, and generate a data codeword;
the encryption module 30 is configured to generate a corresponding key from the data codeword, encrypt the key according to an encryption algorithm, and open a modification permission according to a preset rule;
and the generating module 40 is used for uploading the encrypted personal information to a server side and generating a two-dimensional code.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, and the memory 101, processor 102 and communication interface 103 are electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system and method can be implemented in other ways. The method and system embodiments described above are merely illustrative, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, the sacrifice method and system based on the two-dimensional code provided by the embodiment of the application can integrate the character biography, the cemetery service and the human worship in the server with the character biography by adopting the two-dimensional code technology, so that the user can commemorate and remotely perform the worship activities by scanning the two-dimensional code. Through analyzing the personal electronic files, classifying the files simultaneously, setting different permissions for a plurality of personal information in each classified information block, generating tracing two-dimensional codes corresponding to partial visible personal information, and checking partial personal information through the tracing two-dimensional codes. Through the intelligent family tree, a family-prosperous family can be formed; red culture, generation inheritance; the red education is visible everywhere, and the red culture is inherited by generations; understanding ancestors, faring to 'blind scan', tracing roots and continuing blood vessels; the family database is easily constructed, the manufacture is simple, and the storage is carefree; the family member information is accurately and detailedly known, and communication is barrier-free; integrating family resources, and enabling a family-vigorous family; family member information is retrieved mutually at any time, and the relationship is tighter; the method is not limited by time and environment, and the uploading and the modification are more convenient.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A sacrifice method based on two-dimensional codes is characterized by comprising the following steps:
acquiring personal information, analyzing the acquired personal information to determine the information length of the personal information, and determining the format of the personal information according to the information length;
converting input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words;
generating a corresponding key for the data code word, encrypting the key according to an encryption algorithm, and opening a modification authority according to a preset rule;
and uploading the encrypted personal information to a server side, and generating the two-dimensional code.
2. The sacrifice method based on two-dimensional code as claimed in claim 1, wherein the obtaining of the personal information and the information analysis of the obtained personal information determine the information length thereof, and the determining of the format thereof according to the information length comprises:
the user uploads personal information which comprises characters, pictures, audio and video.
3. The sacrifice method based on two-dimensional code as claimed in claim 1, wherein the generating of the corresponding key from the data code word and the encryption of the key according to the encryption algorithm, the opening of the modification right according to the preset rule includes:
the method comprises the steps of classifying personal information, setting different authorities for a plurality of pieces of personal information in each classified information, and setting authorities for a plurality of pieces of personal information in each information respectively.
4. The sacrifice method based on the two-dimensional code as recited in claim 3, further comprising:
and setting the information to be visible or visible after authorization, counting partial visible personal information in each piece of information, and sending the partial visible personal information in each piece of information to the two-dimensional code generation module.
5. The sacrifice method based on the two-dimensional code as recited in claim 1, wherein the uploading the encrypted personal information to the server side and generating the two-dimensional code comprises:
the two-dimension code information is preset with at least one cemetery service item, a service request is generated according to the cemetery service item selected by a user and the corresponding two-dimension code, and the service request is sent to a cemetery service end.
6. The sacrifice method based on the two-dimensional code as recited in claim 5, further comprising:
and connecting the service requests, recording each service request, receiving and recording the service progress of each service request fed back by the cemetery service terminal, and transmitting the service progress to the user terminal in real time.
7. The sacrifice method based on the two-dimensional code as recited in claim 1, wherein the uploading the encrypted personal information to the server side and generating the two-dimensional code comprises:
and adding the personal image information in the personal information into the generated two-dimensional code and displaying the personal image information together.
8. The utility model provides a sacrificial rites system based on two-dimensional code which characterized in that includes:
the acquisition module is used for acquiring personal information, analyzing the acquired personal information, determining the information length of the personal information and determining the format of the personal information according to the information length;
the conversion module is used for converting the input information into bit streams through data coding, and performing finite field conversion according to a preset algorithm to generate data code words;
the encryption module is used for generating a corresponding key from the data code word, encrypting the key according to an encryption algorithm and opening a modification authority according to a preset rule;
and the generating module is used for uploading the encrypted personal information to the server side and generating the two-dimensional code.
9. The sacrifice system based on two-dimensional code as recited in claim 8, comprising:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises an acquisition module, a conversion module, an encryption module and a generation module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202110419936.8A 2021-04-19 2021-04-19 Sacrifice method and sacrifice system based on two-dimensional code Pending CN113076494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110419936.8A CN113076494A (en) 2021-04-19 2021-04-19 Sacrifice method and sacrifice system based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110419936.8A CN113076494A (en) 2021-04-19 2021-04-19 Sacrifice method and sacrifice system based on two-dimensional code

Publications (1)

Publication Number Publication Date
CN113076494A true CN113076494A (en) 2021-07-06

Family

ID=76618086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110419936.8A Pending CN113076494A (en) 2021-04-19 2021-04-19 Sacrifice method and sacrifice system based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN113076494A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108347485A (en) * 2018-02-11 2018-07-31 上海久星网络科技有限公司 A kind of cemetery park service system based on Quick Response Code
CN112069543A (en) * 2020-09-15 2020-12-11 苏宇航 Archive intelligent analysis management system based on big data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108347485A (en) * 2018-02-11 2018-07-31 上海久星网络科技有限公司 A kind of cemetery park service system based on Quick Response Code
CN112069543A (en) * 2020-09-15 2020-12-11 苏宇航 Archive intelligent analysis management system based on big data

Similar Documents

Publication Publication Date Title
US11611553B2 (en) Online identity verification platform and process
US20200193111A1 (en) System for communication from a user to the publisher of a scannable label
Minkus et al. Children seen but not heard: When parents compromise children's online privacy
US9195843B2 (en) Systems and methods for permissioning remote file access via permissioned links
JP4859549B2 (en) Information management method using management symbol and information management server
TW200907754A (en) System and method for generating and displaying a keyboard comprising a random layout of keys
CN105426743B (en) Account authority authorization method, account login method, server and client
JPWO2015151155A1 (en) Safety confirmation system and concealed data similarity search method
US20120259635A1 (en) Document Certification and Security System
US20220021728A1 (en) System and method for providing a secure network
US20220014352A1 (en) Smart prompts, ai-based digital representative, and multi-object steganographic encryption
CN102609890A (en) Image digital watermark embedding and detecting system
Matheswaran et al. Image Privacy in Social Network Using Invisible Watermarking Techniques
Krishnan et al. Interplay of digital forensics in ediscovery
Eriş et al. Forensic analysis of popular social media applications on android smartphones
CN113076494A (en) Sacrifice method and sacrifice system based on two-dimensional code
Fatima et al. A novel fingerprinting technique for data storing and sharing through clouds
WO2020090165A1 (en) Information processing program, information processing device, and information processing method
CN110955635A (en) Image management device, image management method, program, and recording medium
CN103390121A (en) Digital work ownership authentication method and digital work ownership authentication system
FR3095874A1 (en) PROCESS FOR GENERATING AN ARCHIVING CODE TO CREATE A FOOTPRINT OF MULTIMEDIA CONTENT
TWI805438B (en) Management system and management method for access authorization of electronic document
Farrow Eyewitness to atrocities: verifying images with metadata
Chee Steganographic techniques on social media: Investigation guidelines
Rajeesh et al. Tree monitoring system using geotagging and steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210706