CN118013495A - Two-dimensional code verification method and device, storage medium and electronic equipment - Google Patents

Two-dimensional code verification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN118013495A
CN118013495A CN202211407664.0A CN202211407664A CN118013495A CN 118013495 A CN118013495 A CN 118013495A CN 202211407664 A CN202211407664 A CN 202211407664A CN 118013495 A CN118013495 A CN 118013495A
Authority
CN
China
Prior art keywords
target
dimensional code
verification
identity
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211407664.0A
Other languages
Chinese (zh)
Inventor
黎志航
王巨宏
余斐
黄志斌
麦健豪
韦炳亿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202211407664.0A priority Critical patent/CN118013495A/en
Publication of CN118013495A publication Critical patent/CN118013495A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The application discloses a two-dimensional code verification method and device, a storage medium and electronic equipment. Wherein the method comprises the following steps: under the condition that the first target two-dimensional code is obtained, verifying the identity information corresponding to the first target two-dimensional code once; under the condition that the first verification passes and the second target two-dimensional code is obtained, carrying out secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, and the second time point is located behind the first time point; under the condition that the second verification passes, carrying out third verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the third verification passes, determining that the identity information associated with the target terminal is correct; the method can also be applied to scenes such as identity verification and the like, and can relate to technologies such as cloud computing and cloud storage. The method and the device solve the technical problem of low verification accuracy of the two-dimensional code.

Description

Two-dimensional code verification method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of computers, and in particular, to a two-dimensional code verification method and apparatus, a storage medium, and an electronic device.
Background
In a user identity verification scene, identity verification is usually performed by using a two-dimensional code associated with user identity information, but some holes exist in the mode, such as a user uses means of screen capturing, photographing and the like to share and send the two-dimensional code corresponding to own identity verification information to other people, so that the problem of low two-dimensional code verification accuracy is caused. Therefore, there is a problem that the two-dimensional code verification accuracy is low.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides a two-dimensional code verification method and device, a storage medium and electronic equipment, and aims to at least solve the technical problem of low two-dimensional code verification efficiency in the related technology.
According to an aspect of the embodiment of the application, there is provided a two-dimensional code verification method, including: under the condition that a first target two-dimensional code is obtained, verifying the identity information corresponding to the first target two-dimensional code once, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing the identity information associated with the target terminal; performing secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code when the primary verification passes and a second target two-dimensional code is acquired, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point; and under the condition that the second verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct.
According to an aspect of the embodiment of the present application, there is also provided a two-dimensional code verification method, including: displaying a first target two-dimensional code, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, the target two-dimensional code is used for representing identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and the one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code; displaying a second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used for completing secondary verification under the condition that the primary verification passes, the second target two-dimensional code is also used for completing three times of verification under the condition that the secondary verification passes, the secondary verification is used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the three times of verification are used for verifying identity information corresponding to the second target two-dimensional code; and under the condition that the three times of verification pass, determining the identity information associated with the target terminal.
According to another aspect of the embodiment of the present application, there is also provided a two-dimensional code verification apparatus, including: the first verification unit is used for verifying the identity information corresponding to the first target two-dimensional code once under the condition that the first target two-dimensional code is obtained, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing the identity information associated with the target terminal; a second verification unit, configured to perform a second verification on continuity of the first target two-dimensional code and the second target two-dimensional code when the first verification passes and a second target two-dimensional code is acquired, where the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point; and the third verification unit is used for carrying out three times of verification on the identity information corresponding to the second target two-dimensional code under the condition that the second verification passes, and determining that the identity information associated with the target terminal is correct under the condition that the third verification passes.
As an alternative, the second verification unit includes: and the verification module is used for carrying out the secondary verification on the continuity of the first sequence value and the second sequence value under the condition that the first sequence value corresponding to the first target two-dimensional code and the second sequence value corresponding to the second target two-dimensional code are obtained, wherein the first target two-dimensional code consists of the first sequence value and first identity characters, the first identity characters are used for representing the identity information corresponding to the first target two-dimensional code, the second target two-dimensional code consists of the second sequence value and second identity characters, the second identity characters are used for representing the identity information corresponding to the second target two-dimensional code, and the secondary verification is set to pass when the first sequence value and the second sequence value meet the target continuity condition.
As an alternative, the verification module includes: a first determining submodule, configured to determine that the second verification passes when the second sequence value is located after the first sequence value and when a sequence difference between the second sequence value and the first sequence value is less than or equal to a preset error value; or, a second determining submodule, configured to determine that the secondary verification fails when the second sequence value is before the first sequence value or when a sequence difference between the second sequence value and the first sequence value is greater than the preset error value.
As an alternative, the apparatus includes: the first acquisition module is used for acquiring an image for one time before the identity information corresponding to the first target two-dimensional code is verified for one time, so as to obtain a first target image, and acquiring the first target two-dimensional code based on the first target image, wherein the first target image is a display image corresponding to the first time point of the target terminal; the device comprises: and the second acquisition module is used for acquiring a second image before the second verification of the continuity of the first target two-dimensional code and the second target two-dimensional code to obtain a second target image, and acquiring the second target two-dimensional code based on the second target image, wherein the second target image is a display image corresponding to the second time point of the target terminal.
As an optional solution, the second collecting module includes: the first acquisition sub-module is used for acquiring the secondary image to obtain the second target image and acquiring the second target two-dimensional code based on the second target image when the time interval between the current time point and the first time point is larger than or equal to a first time interval, wherein the first time interval is a preset updating interval of the target two-dimensional code; or the second acquisition sub-module is used for carrying out at least one image acquisition to obtain at least one candidate image; a first determining sub-module, configured to determine a target candidate image from the at least one candidate image, where an image similarity between the target candidate image and the first target image is less than a preset similarity; and a second determining sub-module, configured to determine the target candidate image as the second target image when a time interval between a corresponding time point when the target candidate image is determined and the first time point is smaller than a second time interval, where the second time interval is greater than the preset update interval.
As an alternative, the first verification unit includes: the verification module is configured to perform the one-time verification on the first identity character when the first identity character is acquired, where the first identity character includes at least one of the following: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details.
As an alternative, the apparatus further includes: and the opening module is used for opening the passing authority of the target equipment for the user of the target terminal after the identity information associated with the target terminal is determined to be correct, wherein the target equipment is used for performing code scanning verification and opening the passing authority after the code scanning verification is passed.
According to another aspect of the embodiment of the present application, there is also provided a two-dimensional code verification apparatus, including: the first display unit is used for displaying a first target two-dimensional code, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, the target two-dimensional code is used for representing identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and the one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code; a second display unit, configured to display a second target two-dimensional code, where the second target two-dimensional code is a target two-dimensional code displayed at a second time point on the target terminal, the second time point is located after the first time point, the second target two-dimensional code is used to complete a second verification under the condition that the first verification passes, the second target two-dimensional code is also used to complete a third verification under the condition that the second verification passes, the second verification is used to verify continuity between the first target two-dimensional code and the second target two-dimensional code, and the third verification is used to verify identity information corresponding to the second target two-dimensional code; and the determining unit is used for determining that the identity information associated with the target terminal is correct under the condition that the three times of verification pass.
As an alternative, the second display unit includes: the display module is used for displaying the second target two-dimensional code under the condition that the time interval between the current time point and the first time point is larger than or equal to a first time interval, wherein the first time interval is a preset updating interval of the target two-dimensional code.
As an alternative, the apparatus further includes: the first acquisition module is used for acquiring a first identity character sent by a server before the first target two-dimensional code is displayed, wherein the server stores identity information associated with the target terminal, and the first identity character is generated by the server based on the identity information associated with the target terminal; the first distribution device is used for distributing a first sequence value for the first identity character before the first target two-dimensional code is displayed; the first composition module is used for composing the first target two-dimensional code based on the first identity character and the first sequence value before the first target two-dimensional code is displayed; the device further comprises: the second obtaining module is used for obtaining a second identity character sent by the server before the second target two-dimensional code is displayed, wherein the second identity character is generated by the server based on the identity information associated with the target terminal; the second allocation module is used for allocating a second sequence value to the second identity character before the second target two-dimensional code is displayed, wherein the first sequence value and the second sequence value are used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code; and the second composition module is used for composing the second target two-dimensional code based on the second identity character and the second sequence value before the second target two-dimensional code is displayed.
According to yet another aspect of embodiments of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the computer device performs the verification method of the two-dimensional code as above.
According to still another aspect of the embodiment of the present application, there is further provided an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the two-dimensional code verification method described above through the computer program.
In the embodiment of the application, under the condition that a first target two-dimensional code is acquired, verifying the identity information corresponding to the first target two-dimensional code once, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing the identity information associated with the target terminal; performing secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code when the primary verification passes and a second target two-dimensional code is acquired, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point; under the condition that the secondary verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct;
By means of the two-dimensional code verification method, firstly, the first target two-dimensional code is subjected to primary verification in response to the code scanning request to determine whether identity information corresponding to the first time point is correct, further under the condition that primary verification passes, the second target two-dimensional code is obtained, continuity of the first target two-dimensional code and the second target two-dimensional code is subjected to secondary verification to determine whether the second target two-dimensional code is continuous with the first target two-dimensional code, and further under the condition that secondary verification passes, the second target two-dimensional code is subjected to tertiary verification to determine whether identity information corresponding to the third time point is correct, so that under the condition that tertiary verification passes, the continuity verification of the first target two-dimensional code and the second target two-dimensional code passes, and the identity information corresponding to the second target two-dimensional code is verified, further the problem that a user sends two-dimensional code corresponding to own identity verification information to others by using a screen capturing method, photographing method and the like is solved, the authenticity of the two-dimensional code verification information of the user is guaranteed, and therefore the technical problem of low accuracy of verification of the two-dimensional code verification is achieved is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a schematic view of an application environment of an alternative two-dimensional code verification method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a flow of an alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 5 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 6 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 7 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 8 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 9 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 10 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 11 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 12 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 13 is a schematic diagram of another alternative two-dimensional code verification method according to an embodiment of the present application;
FIG. 14 is a schematic diagram of an alternate two-dimensional code verification device according to an embodiment of the present application;
FIG. 15 is a schematic diagram of an alternate two-dimensional code verification device according to an embodiment of the present application;
Fig. 16 is a schematic structural view of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Cloud technology (Cloud technology) refers to a hosting technology for integrating hardware, software, network and other series resources in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
Cloud technology (Cloud technology) is based on the general terms of network technology, information technology, integration technology, management platform technology, application technology and the like applied by Cloud computing business models, and can form a resource pool, so that the Cloud computing business model is flexible and convenient as required. Cloud computing technology will become an important support. Background services of technical networking systems require a large amount of computing, storage resources, such as video websites, picture-like websites, and more portals. Along with the high development and application of the internet industry, each article possibly has an own identification mark in the future, the identification mark needs to be transmitted to a background system for logic processing, data with different levels can be processed separately, and various industry data needs strong system rear shield support and can be realized only through cloud computing.
Cloud computing (clouding) is a computing model that distributes computing tasks across a large pool of computers, enabling various application systems to acquire computing power, storage space, and information services as needed. The network that provides the resources is referred to as the "cloud". Resources in the cloud are infinitely expandable in the sense of users, and can be acquired at any time, used as needed, expanded at any time and paid for use as needed.
As a basic capability provider of cloud computing, a cloud computing resource pool (abbreviated as a cloud platform, generally referred to as IaaS (Infrastructure AS A SERVICE) platform) is established, in which multiple types of virtual resources are deployed for external clients to select for use.
According to the logic function division, a PaaS (Platform AS A SERVICE, platform service) layer can be deployed on an IaaS (Infrastructure AS A SERVICE, infrastructure service) layer, and a SaaS (Software AS A SERVICE, service) layer can be deployed above the PaaS layer, or the SaaS can be directly deployed on the IaaS. PaaS is a platform on which software runs, such as a database, web container, etc. SaaS is a wide variety of business software such as web portals, sms mass senders, etc. Generally, saaS and PaaS are upper layers relative to IaaS.
According to an aspect of the embodiment of the present application, there is provided a two-dimensional code verification method, optionally, as an optional implementation manner, the two-dimensional code verification method may be applied, but not limited to, to the environment shown in fig. 1. Which may include, but is not limited to, a terminal device 102 and a server 112, which may include, but is not limited to, a display 104, a processor 106, and a memory 108, the server 112 including a database 114 and a processing engine 116.
The specific process comprises the following steps:
step S102, the terminal device 102 obtains a first target two-dimensional code 1002 and a second target two-dimensional code 1004 for identity verification, wherein the first target two-dimensional code 1002 and the second target two-dimensional code 1004 are displayed on a target terminal;
Step S104-S106, the first target two-dimensional code 1002 and the second target two-dimensional code 1004 are sent to the server 112 through the network 110;
step S108, the server 112 verifies the identity information corresponding to the first target two-dimensional code 1002 once through a processing engine;
Step S110, in the case of passing the first verification, the server 112 performs a second verification on the continuity of the first target two-dimensional code 1002 and the second target two-dimensional code 1004 through the processing engine;
Step S112, in the case of the passing of the secondary verification, the server 112 performs three times of verification on the identity information corresponding to the second target two-dimensional code 1004 through the processing engine, wherein in the case of the passing of the three times of verification, the identity information associated with the target terminal is determined to be correct;
It should be noted that, under the condition that one verification is not passed in the above primary verification, secondary verification and tertiary verification, the identity information associated with the target terminal is determined to be wrong; step S114-S116, the authentication information is sent to the terminal device 102 through the network 110, the terminal device 102 performs rights management by using the authentication information through the processor 106, and displays the authentication result on the display 108, and stores the authentication information in the memory 104, where the authentication information is used to indicate whether the identity information associated with the target terminal is incorrect.
In addition to the example shown in fig. 1, the above steps may be performed by the client or the server independently, or by the client and the server cooperatively, such as performing the above steps of performing multiple verifications based on the identity information of the continuous target two-dimensional code by the terminal device 102, so as to reduce the processing pressure of the server 112. The terminal device 102 includes, but is not limited to, a handheld device (e.g., a mobile phone), a notebook computer, a desktop computer, a vehicle-mounted device, etc., and the application is not limited to a specific implementation of the terminal device 102.
Optionally, as an optional embodiment, as shown in fig. 2, the two-dimensional code verification method includes:
s202, under the condition that a first target two-dimensional code is obtained, verifying the identity information corresponding to the first target two-dimensional code once, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing the identity information associated with the target terminal;
S204, under the condition that the first verification passes and the second target two-dimensional code is obtained, carrying out secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, and the second time point is located behind the first time point;
And S206, under the condition that the second verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct.
Alternatively, in this embodiment, the two-dimensional code verification method may be applied, but not limited to, in the context of payment consumption. In life, people pay in a form of a payment two-dimension code after shopping and consuming, and the payment two-dimension code related to self payment information is scanned by a code scanning machine provided by a merchant to pay for consumption, but the mode has the risk that the payment two-dimension code related to self payment information is intercepted by others, photographed or stolen in other modes, so that a larger potential safety hazard is caused to a scene of using the two-dimension code for consumption and payment by a user.
Optionally, in this embodiment, to improve the efficiency of acquiring the two-dimensional code, the two-dimensional code may be acquired, but not limited to, by performing operations such as acquiring, identifying and verifying the two-dimensional code in response to the two-dimensional code verification request when the two-dimensional code verification request is acquired; the triggering mode of the two-dimensional code verification request can be, but is not limited to, performing power-on operation on terminal equipment for acquiring the two-dimensional code, or automatically triggering the two-dimensional code verification request when the terminal equipment for acquiring the two-dimensional code identifies an image acquisition object with a distance smaller than or equal to a preset threshold value; or, in some scenes with larger data volume, a preset time interval may be set for, but not limited to, terminal equipment for acquiring the two-dimensional code, where the terminal equipment for acquiring the two-dimensional code performs real-time acquisition according to the preset time interval.
Alternatively, in this embodiment, the relationship between the two-dimensional code acquiring operation and the verification operation may, but is not limited to, include sequential execution, or simultaneous execution (i.e., no execution sequence), and by taking sequential execution as an example, the first target two-dimensional code may, but is not limited to, be acquired first, then verified once, after the first verification passes, then the second target two-dimensional code is acquired, and then verified twice, and so on; or, but not limited to, the first target two-dimensional code and the second target two-dimensional code may be acquired first, then the first target two-dimensional code is verified once, and after the first verification is passed, the acquired second target two-dimensional code is verified twice.
With the two-dimensional code verification method, as shown in fig. 3, the specific steps are as follows:
Step S1, one-time payment verification: the code scanning machine acquires a first target two-dimensional code for consumption payment, and verifies payment information corresponding to the first target two-dimensional code once;
Step S2, secondary payment verification: under the condition that the primary verification passes, a second target two-dimensional code corresponding to a second time point after a first time point corresponding to the first target two-dimensional code is obtained, and the continuity between the first target two-dimensional code and the second target two-dimensional code is verified for the second time;
Step S3, three payment verification: under the condition that the secondary verification passes, carrying out three times of verification on the payment information corresponding to the second target two-dimensional code;
Step S4, confirming payment deduction: and under the condition that the three times of verification pass, confirming that the payment information for the current consumption payment is correct, and completing the consumption payment deduction.
Alternatively, in this embodiment, the code scanning request may be, but not limited to, a request for acquiring a target two-dimensional code, and the target two-dimensional code may be, but not limited to, identity information indicating that the target terminal is associated. The target terminal may be, but not limited to, an application applet for generating, displaying and updating a target two-dimensional code, as shown in fig. 4, the target terminal 402 may be, but not limited to, an electronic student card for displaying the target two-dimensional code, as shown in fig. 5, or may be, but not limited to, a software and hardware device such as a mobile phone APP, etc., identity information associated with the target terminal may be, but not limited to, identity information corresponding to a user holding the target terminal, or may be, but not limited to, identity attribution location information, identity version information, identity verification time information, and identity identification detail information corresponding to the user.
Optionally, in this embodiment, the first target two-dimensional code may be obtained by, but not limited to, a terminal device, but the main body performing operations such as primary verification, secondary verification, and/or tertiary verification may be, but not limited to, the terminal device, or a server, if the first target two-dimensional code is obtained by the terminal device, the terminal device sends the first target two-dimensional code to the server, and the server performs operations such as primary verification, secondary verification, and tertiary verification, and in case that the tertiary verification passes, the server feeds back result information for determining identity information associated with the target terminal to the terminal device, where the server with higher calculation power can cope with various complex scenarios, and improves identity verification efficiency, but at the same time, also increases identity verification cost; if the first target two-dimensional code is obtained through the terminal equipment, the terminal equipment directly executes the operations of primary verification, secondary verification, tertiary verification and the like, and under the condition that the tertiary verification passes, the identity information associated with the target terminal is determined to be correct.
Alternatively, in this embodiment, the first target two-dimensional code may be, but not limited to, a target two-dimensional code displayed at the first time point on the target terminal.
Optionally, in this embodiment, after the first target two-dimensional code is obtained, the identity information corresponding to the first target two-dimensional code is verified once, where the once verification is used to verify whether the identity information associated with the target terminal corresponding to the first target two-dimensional code is wrong.
Optionally, in this embodiment, the second target two-dimensional code is acquired under the condition of one verification pass, where the second target two-dimensional code may be, but is not limited to, a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point.
Optionally, in this embodiment, after the first verification passes and the second target two-dimensional code is obtained, the continuity of the first target two-dimensional code and the second target two-dimensional code is verified for the second time, where the second verification is used to determine whether the first target two-dimensional code and the second target two-dimensional code meet the continuity condition of the target two-dimensional code.
Optionally, in this embodiment, in the case of passing the second verification, three times of verification are performed on the identity information corresponding to the second target two-dimension, and in the case of passing the three times of verification, the identity information associated with the target terminal is determined to be correct, where the three times of verification are used to determine whether the identity information associated with the target terminal corresponding to the target two-dimension code is correct.
It should be noted that under the condition that the three-time verification passes, the identity information verification corresponding to the first target two-dimensional code passes, the continuity verification of the first target two-dimensional code and the second target two-dimensional code passes, and the identity information verification corresponding to the second target two-dimensional code passes, so that the identity information which is associated with the target terminal and accords with the identity verification condition is guaranteed in the process of performing the primary verification, the secondary verification and the three-time verification, the authenticity of the two-dimensional code verification by the user is further guaranteed, the phenomenon that the user transmits the two-dimensional code associated with own identity verification information to other people in a photographing, screen capturing and other modes is effectively avoided, the technical effect of improving the verification accuracy of the two-dimensional code is achieved, and the technical problem that the verification accuracy of the two-dimensional code is lower is solved.
Further by way of example, as shown in fig. 6, the above two-dimensional code verification method is applied to a scenario of verifying a user identity based on a code scanner 602, and the specific steps are as follows:
Step S1, a code scanner 602 obtains a first target two-dimensional code 604 displayed by a target terminal at a first time point;
step S2, after the code scanner 602 obtains the first target two-dimensional code 604 corresponding to the first time point, the code scanner verifies the identity information corresponding to the first target two-dimensional code 604 once to determine the authenticity of the identity information corresponding to the first target two-dimensional code 604;
Step S3, under the condition of one-time verification passing, the code scanner 602 obtains a second target two-dimensional code 606 displayed by the target terminal at a second time point, wherein the second time point is positioned after the first time point;
It should be noted that, under the condition that one-time verification fails, determining that the identity information associated with the target terminal is wrong;
Step S4, after the code scanner 602 obtains the second target two-dimensional code 606 corresponding to the second time point, the code scanner 602 performs a second verification on the continuity of the first target two-dimensional code 604 and the second target two-dimensional code 606 to determine whether the continuity of the first target two-dimensional code 604 and the second target two-dimensional code 606 meets the continuity condition of the target two-dimensional code; ,
Step S5, under the condition that the second verification passes, the code scanner 602 performs three times of verification on the identity information corresponding to the second target two-dimensional code 606 to determine the authenticity of the identity information corresponding to the second target two-dimensional code 606;
It should be noted that, under the condition that the secondary verification fails, determining that the identity information associated with the target terminal is wrong;
step S6, under the condition that the verification passes for three times, the code scanner 602 determines that the identity information associated with the target terminal is correct;
in the case that one of the primary verification, the secondary verification, and the tertiary verification fails, the identity information associated with the target terminal is determined to be incorrect. It should be noted that the code scanner 602 may be, but is not limited to, an acquisition conversion device for recovering the target two-dimensional code displayed on the target terminal into data information, where the data information may include, but is not limited to, authentication information.
Further, as shown in fig. 7, the code scanner 702 may be, but not limited to, a device for responding to a code scanning request and performing multiple information verification, and may be, but not limited to, a power switch, a mechanical keyboard, an indicator light, a merchant display flat screen, a card swiping area, a code scanning window, a customer display screen, and other modules, where the power switch is used to turn on or off the use of the code scanner 702, the indicator light is used to indicate the use state of the code scanner 702, the merchant display flat screen is used to display merchant side transaction information, the card swiping area is used to make customer card swiping payment, the code scanning window is used to make customer code scanning payment, and the customer display screen is used to display customer side transaction information.
When a customer uses the two-dimensional code displayed on the target terminal to the code scanning machine 702 to consume, the code scanning machine 702 reads the first target two-dimensional code and the second target two-dimensional code, and under the condition that the target two-dimensional code passes three times of verification, the code scanning consumption is confirmed to be effective, and the consumption deduction is carried out on the user.
According to the embodiment provided by the application, under the condition that the first target two-dimensional code is obtained, the identity information corresponding to the first target two-dimensional code is verified once; under the condition that the first verification passes and the second target two-dimensional code is obtained, carrying out secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, and the second time point is located behind the first time point; under the condition that the second target two-dimensional code passes the second verification, three-time verification is carried out on the identity information corresponding to the second target two-dimensional code, and under the condition that the three-time verification passes, the identity information associated with the target terminal is determined to be correct, namely, the identity information corresponding to the first target two-dimensional code passes the first target two-dimensional code and the continuity verification of the second target two-dimensional code passes the second target two-dimensional code, so that the identity information which is associated with the target terminal and meets the identity verification condition is guaranteed in the processes of performing the first verification, the second verification and the third verification, the authenticity of the two-dimensional code verification of a user is guaranteed, the phenomenon that the two-dimensional code associated with own identity verification information is transmitted to other people for use by means of photographing, screen capturing and the like is effectively avoided, the technical effect of improving the verification accuracy of the two-dimensional code is achieved, and the technical problem that the verification accuracy of the two-dimensional code is lower is solved.
As an alternative solution, performing secondary verification on continuity of the first target two-dimensional code and the second target two-dimensional code includes:
S1, under the condition that a first sequence value corresponding to a first target two-dimensional code and a second sequence value corresponding to a second target two-dimensional code are obtained, carrying out secondary verification on continuity of the first sequence value and the second sequence value, wherein the first target two-dimensional code consists of the first sequence value and a first identity character, the first identity character is used for representing identity information corresponding to the first target two-dimensional code, the second target two-dimensional code consists of the second sequence value and a second identity character, the second identity character is used for representing identity information corresponding to the second target two-dimensional code, and the secondary verification is set to pass when the first sequence value and the second sequence value meet the target continuity condition.
Optionally, in this embodiment, the target two-dimensional code may be, but not limited to, composed of a sequence value and an identity character, where the sequence value may be, but not limited to, used to indicate an acquisition time corresponding to the target two-dimensional code, and the identity character may be, but not limited to, used to indicate identity information corresponding to the target two-dimensional code. Wherein the identity character comprises: the character used for representing the attribution position of the identity, the character used for representing the identity version information, the character used for representing the identity verification time and the character used for representing the identity identification detail.
Optionally, in this embodiment, the first target two-dimensional code may, but is not limited to, be composed of a first sequence value and a first identity character, where the first sequence value may, but is not limited to, be used to indicate an acquisition time corresponding to the first target two-dimensional code, and the first identity character may, but is not limited to, be used to indicate identity information corresponding to the first target two-dimensional code.
Optionally, in this embodiment, the second target two-dimensional code may, but is not limited to, be composed of a second sequence value and a second identity character, where the second sequence value may, but is not limited to, be used to indicate an acquisition time corresponding to the second target two-dimensional code, and the second identity character may, but is not limited to, be used to indicate identity information corresponding to the second target two-dimensional code.
Optionally, in this embodiment, when the first sequence value corresponding to the first target two-dimensional code and the second sequence value corresponding to the second target two-dimensional code are obtained, the continuity of the first sequence value and the second sequence value is verified secondarily.
Alternatively, in this embodiment, the secondary verification may be set, but not limited to, to pass when a target continuity condition is satisfied between the second sequence value and the second sequence value, the target continuity condition may be, but not limited to, a sequence difference value between the first sequence value and the second sequence value being used to indicate that an absolute continuity relationship or a relative continuity relationship is satisfied, wherein the absolute continuity relationship may be, but not limited to, used to indicate that the first sequence value and the second sequence value are tightly connected, and the relative continuity relationship between the sequence values may be, but not limited to, used to indicate that a sequence difference between the first sequence value and the second sequence value is less than a preset error value, the preset error value being a preset value.
It should be noted that, when the sequence values corresponding to the at least two target two-dimensional codes respectively meet the target continuity condition, the at least two target two-dimensional codes meet the secondary verification condition of continuity, where the secondary verification condition may be used, but not limited to, determining whether the sequence values corresponding to the at least two target two-dimensional codes respectively are continuous, or may be used, but not limited to, determining whether the at least two target two-dimensional codes are continuous.
Further by way of example, as shown in fig. 8, the first target two-dimensional code 802 is composed of a first identity character 804 and a first sequence value 806, and the first sequence value 806 corresponding to the first target two-dimensional code 802 is 101; the second target two-dimensional code 808 is composed of a second identity character 810 and a second sequence value 812, and the second sequence value 812 corresponding to the second target two-dimensional code 808 is 102; the third target two-dimensional code 814 is composed of a third identity character 816 and a third sequence value 818, and the third sequence value 818 corresponding to the third target two-dimensional code 814 is 105.
According to the embodiment of the application, under the condition that the first sequence value corresponding to the first target two-dimensional code and the second sequence value corresponding to the second target two-dimensional code are obtained, the continuity of the first sequence value and the second sequence value is verified for the second time, wherein the first target two-dimensional code consists of the first sequence value and the first identity character, the first identity character is used for representing the identity information corresponding to the first target two-dimensional code, the second target two-dimensional code consists of the second sequence value and the second identity character, and the second identity character is used for representing the identity information corresponding to the second target two-dimensional code. Whether the sequence values corresponding to the target two-dimensional code meet the continuity or not is determined, so that the aim of accurately judging whether the target two-dimensional code passes the secondary verification is fulfilled, and the effect of improving the verification accuracy of the two-dimensional code is achieved.
As an alternative, the second verification of the continuity of the first sequence value and the second sequence value includes:
s1, determining that the second verification passes under the condition that the second sequence value is located behind the first sequence value and the sequence difference between the second sequence value and the first sequence value is smaller than or equal to a preset error value; or alternatively, the first and second heat exchangers may be,
S2, determining that the secondary verification fails under the condition that the second sequence value is positioned before the first sequence value or the sequence difference between the second sequence value and the first sequence value is larger than a preset error value.
Optionally, in this embodiment, when the second sequence value is located after the first sequence value and the sequence difference between the second sequence value and the first sequence value is smaller than or equal to the preset error value, a target continuity condition is satisfied between the first sequence value and the second sequence value, and the continuity between the first sequence value and the second sequence value accords with the second verification, and the continuity between the first target two-dimensional code corresponding to the first sequence value and the second target two-dimensional code corresponding to the second sequence value accords with the second verification.
It should be noted that, in this embodiment, the preset error value may be, but is not limited to, n times the minimum sequence difference, where n is a real number that is greater than 1, that is, the target continuity condition of the first sequence value and the second sequence value may be, but is not limited to, an absolute continuous relationship between the sequence values may be, but is not limited to, indicated, or a relative continuous relationship between the sequence values may be, but is not limited to, indicated that the first sequence value and the second sequence value are tightly connected, the relative continuous relationship between the sequence values may be, but is not limited to, indicated that the sequence difference between the first sequence value and the second sequence value is less than the preset error value, and the preset error value is a preset value. Through the flexible setting of the continuity judging conditions between the sequence values, the flexibility of carrying out secondary verification on the continuity of the first sequence value and the second sequence value is improved, and the aim of improving the verification flexibility of the two-dimensional code is further achieved, so that the effect of improving the verification efficiency of the two-dimensional code is achieved.
Optionally, in this embodiment, when the second sequence value is located before the first sequence value or the sequence difference between the second sequence value and the first sequence value is greater than the preset error value, continuity between the first sequence value and the second sequence value does not conform to the second verification, and continuity between the first target two-dimensional code corresponding to the first sequence value and the second target two-dimensional code corresponding to the second sequence value does not conform to the second verification.
Further by way of example, as shown in fig. 8, the first target two-dimensional code 802 is composed of a first identity character 804 and a first sequence value 806, and the first sequence value 806 corresponding to the first target two-dimensional code 802 is 101; the second target two-dimensional code 808 is composed of a second identity character 810 and a second sequence value 812, and the second sequence value 812 corresponding to the second target two-dimensional code 808 is 102; the third target two-dimensional code 814 is composed of a third identity character 816 and a third sequence value 818, and the third sequence value 818 corresponding to the third target two-dimensional code 814 is 105.
Under the condition that the minimum sequence difference is 1 and the preset error value is the minimum sequence difference, namely the preset error value is 1, the second target two-dimensional code 808 is positioned behind the first target two-dimensional code 802, the sequence difference between the second target two-dimensional code 806 and the first target two-dimensional code 802 is 1 and is equal to the preset error value, and the secondary verification passing is determined; and the sequence difference between the third target two-dimensional code 814 and the first target two-dimensional code 802 is 2, which is greater than the preset error value, to confirm the failure of the secondary verification.
Under the condition that the minimum sequence difference is 1 and the preset error value is 2 times of the minimum sequence difference, namely the preset error value is 2, the second target two-dimensional code 808 is positioned behind the first target two-dimensional code 802, the sequence difference between the second target two-dimensional code 808 and the first target two-dimensional code 802 is 1 and is smaller than the preset error value, and the secondary verification is determined to pass; the sequence difference between the third target two-dimensional code 814 and the first target two-dimensional code 802 is 2, which is equal to the preset error value, and the second verification is confirmed to pass.
According to the embodiment provided by the application, when the second sequence value is positioned behind the first sequence value and the sequence difference between the second sequence value and the first sequence value is smaller than or equal to the preset error value, the secondary verification is determined to pass; or determining that the secondary verification fails when the second sequence value is positioned before the first sequence value or the sequence difference between the second sequence value and the first sequence value is larger than a preset error value. Through the sequence among the sequence values and the relation between the sequence differences among the sequence values and the preset error values, whether the sequence values meet the continuity condition of the secondary verification passing or not is determined, and whether the target two-dimensional codes corresponding to the sequence values meet the continuity condition of the secondary verification passing or not is further determined, so that the effect of improving the verification accuracy of the two-dimensional codes is achieved.
As an alternative solution, before verifying the identity information corresponding to the first target two-dimensional code once, the method further includes: acquiring an image for one time to obtain a first target image, and acquiring a first target two-dimensional code based on the first target image, wherein the first target image is a display image corresponding to a first time point of a target terminal;
As an alternative solution, before performing the second verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, the method further includes: and acquiring a second target image, and acquiring a second target two-dimensional code based on the second target image, wherein the second target image is a display image corresponding to the target terminal at a second time point.
Optionally, in this embodiment, the image capturing may be, but not limited to, capturing an image by using a camera configured by a code scanner, and acquiring the corresponding target two-dimensional code based on the target image may be, but not limited to, image denoising and image sharpening, image segmentation and edge extraction, and identifying the target two-dimensional code included in the image.
It should be noted that, the image acquisition mode and the target two-dimensional code acquisition mode are only possible modes provided by the embodiment of the present application, and the embodiment of the present application is not limited in any way.
As an alternative, performing secondary image acquisition to obtain a second target image, and acquiring a second target two-dimensional code based on the second target image, including:
s1, under the condition that the time interval between the current time point and the first time point is greater than or equal to the first time interval, performing secondary image acquisition to obtain a second target image, acquiring a second target two-dimensional code based on the second target image, wherein the first time interval is a preset updating interval of the target two-dimensional code; or alternatively, the first and second heat exchangers may be,
S2, at least one image acquisition is carried out to obtain at least one candidate image;
S3, determining a target candidate image in at least one candidate image, wherein the image similarity between the target candidate image and the first target image is smaller than a preset similarity;
and S4, determining the target candidate image as a second target image under the condition that the time interval between the corresponding time point and the first time point when the target candidate image is determined is smaller than a second time interval, wherein the second time interval is larger than a preset updating interval.
Alternatively, in this embodiment, the first time interval may be, but is not limited to, a preset update interval for the target two-dimensional code.
It should be noted that the first time interval may be, but is not limited to, a time interval for indicating that the second target image acquired by the secondary image is different from the second target image corresponding to the first time point
Optionally, in this embodiment, at least one image acquisition is performed to obtain at least one candidate image, and a target candidate image is determined in the at least one candidate image, where an image similarity between the target candidate image and the first target image is smaller than a preset similarity.
Optionally, in this embodiment, when it is determined that a time interval between a time point corresponding to the target candidate image and the first time point is smaller than a second time interval, the target candidate image is determined to be the second target image, where the second time interval is greater than a preset update interval, and the preset update interval is preset update time information.
It should be noted that, the second time interval may be, but not limited to, a secondary verification condition for indicating that the target two-dimensional code corresponding to the target candidate image and the target two-dimensional code corresponding to the first time point meet the continuity.
As an alternative, the verifying the identity information corresponding to the first target two-dimensional code once includes:
s1, under the condition that a first identity character is obtained, verifying the first identity character once, wherein the first identity character comprises at least one of the following: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details.
Further illustrated, in a campus passing verification scenario, as shown in fig. 9, the first target two-dimensional code 902 is composed of a first identity character 904 and a first sequence value 906, where the first identity character 904 is "http:// wx.url.cn 002/2022092 052011111/09541", including a first character 904-1 indicating an identity home position, a second character 904-2 indicating identity version information, a third character 904-3 indicating identity verification time, and a fourth character 904-4 indicating identity identification details, where the first character 904-1 is "http:// wx.url.cn" indicating identity position information corresponding to the first target two-dimensional code 904, the second character 904-2 is "v002" indicating that the identity verification version corresponding to the first target two-dimensional code 904 is 002 version, the third character 904-3 is "20220921-052011" indicating that the identity verification time corresponding to the first target two-dimensional code 904 is 20 seconds in 21 days 05 for 2 years and the fourth character 904-4 is "20209 seconds," and the fourth character 904-4 is "v002" indicating that the identity information corresponding to the first target two-dimensional code 904 is 09541.
It should be noted that, the third character 904 may be, but is not limited to, used for indicating whether the first target two-dimensional code 902 is valid, for example, assuming that the valid time of the target two-dimensional code is 10s, when 20 minutes and 33 seconds are 21 days of 2022, 09 months, and 21 days, the first target two-dimensional code 902 is overdue and invalid, and the corresponding authentication information is invalid and does not have the right of campus passing. And verifying the identity information corresponding to the first target two-dimensional code once, wherein the verification comprises the steps of sequentially verifying whether the identity attribution position represented by the first character corresponds to the current campus position information, whether the identity version information represented by the second character corresponds to the current campus passage verification version information, whether the identity verification time represented by the third character accords with the identity information to be verified, whether the identity identification detail represented by the fourth character is the identity identification allowed to pass by the current campus or not, and the identity information corresponding to the first target two-dimensional code passes the sequential verification under the condition that the verification passes sequentially.
Further by way of example, assume that the verification conditions for the target two-dimensional code for the current campus traffic are: the campus location information is 'http:// wx.url.cn', the current campus passing verification version information is v002, the maximum effective time of identity information to be verified is 10s, namely, the cached two-dimensional code information is unavailable after 10s, and the identity mark of the current campus allowed passing is 00000-99999.
As shown in fig. 9, in the identity information corresponding to the first target two-dimensional code 902, the identity attribution position represented by the first character 904-1 is consistent with the current campus location information, the identity version information represented by the second character 904-2 is consistent with the current campus traffic verification version information, the identity verification time represented by the third character 904-3 is effective, and the identity identification detail represented by the fourth character 904-4 is the identity identification allowed to pass by the current campus, so that the identity information corresponding to the first target two-dimensional code 902 passes verification.
As shown in fig. 9, in the identity information corresponding to the second target two-dimensional code 908, the identity attribution position represented in the second identity character 910 is consistent with the current campus location information, but the identity version information represented in the second identity character 910 is inconsistent with the current campus passage verification version information, so that the identity information corresponding to the second target two-dimensional code 908 is not verified.
According to the embodiment provided by the application, under the condition that the first identity character is obtained, the first identity character is verified once, wherein the first identity character comprises at least one of the following: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details. The authenticity of the identity information corresponding to the target two-dimensional code is verified through the multi-dimensional identity character information, the purpose of improving the verification accuracy of the two-dimensional code is achieved, and the effect of improving the verification accuracy of the identity information corresponding to the target two-dimensional code is achieved.
As an alternative scheme, the third verification of the identity information corresponding to the second target two-dimensional code includes:
S1, under the condition that a second identity character is obtained and the second verification passes, performing three times of verification on the second identity character, wherein the second identity character comprises at least one of the following: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details.
It should be noted that, the three-time verification of the identity information corresponding to the second target two-dimensional code and the one-time verification of the identity information corresponding to the first target two-dimensional code may be, but are not limited to, the same manner, and the specific embodiment may refer to the specific embodiment of the one-time verification of the identity information corresponding to the first target two-dimensional code.
As an alternative, after determining that the identity information associated with the target terminal is correct, the method further includes:
S1, opening the passing authority of target equipment for a user of the target terminal, wherein the target equipment is equipment for performing code scanning verification and opening the passing authority after the code scanning verification is passed.
Alternatively, in this embodiment, the target device may be, but is not limited to, a device that performs scan verification requested for the scan request, and opens a pass right after the verification passes, and the pass right may be, but is not limited to, a device for allowing the user of the target terminal to pass authentication of the identity information.
In the access right management scenario, the target terminal is a client terminal associated with user identity information, and the target device is a code scanner and access device for performing identity verification on a two-dimension code associated with the user identity information, wherein the two-dimension code associated with the user identity information is displayed on the target terminal. After the identity information associated with the target terminal is determined to be correct, the access right of the target device is opened for the corresponding user, and the user is allowed to pass through the access control.
In the case of consuming payment, the target terminal is a client terminal associated with user payment information, and the target device is a code scanner for performing payment verification on the payment two-dimensional code associated with user identity information, wherein the payment two-dimensional code associated with the user payment information is displayed on the target terminal. After confirming that the payment information associated with the target terminal is correct, the consumption payment amount is deducted for the corresponding user, and the user completes the corresponding consumption payment.
In the public transportation scene, the target terminal is a client of the bus taking information of the associated user, the target device is a code scanner for carrying out bus taking verification on the bus taking two-dimension code of the bus taking information of the associated user, and the bus taking two-dimension code of the bus taking information of the associated user is displayed on the target terminal. After confirming that the riding information associated with the target terminal is correct, the user is instructed to complete the trip registration. A step of
As an alternative scheme, as shown in fig. 10, the above two-dimensional code verification method is applied to a two-dimensional code verification system 1002, where the two-dimensional code verification system 1002 includes a two-dimensional code acquisition module 1004 and a two-dimensional code verification module 1006, the two-dimensional code acquisition module 1004 includes a two-dimensional code acquisition sub-module 1008 and a two-dimensional code binding sub-module 1010, and the two-dimensional code verification module 1006 includes a two-dimensional code verification sub-module 1012, a two-dimensional code analysis sub-module 1014 and a two-dimensional code verification sub-module 1016. Further illustrating, the specific contents of the above sub-modules are as follows when the target two-dimensional code verification system 1002 is applied to a campus passing right verification scenario through an applet target two-dimensional code:
first two-dimensional code acquisition sub-module 1008
The two-dimensional code acquisition submodule 1008 may be used for, but is not limited to, instructing the server to acquire the two-dimensional code bound with the user ID. After the user passes the identity authentication, opening an applet, and acquiring a two-dimensional code through a network interface, wherein the two-dimensional code is bound with the ID of the user, and the two-dimensional code comprises the following components: the two-dimensional code with version number v002 being v2 version is followed by the character string encrypted by the user id through encryption algorithm, such as: http:// wx.url.cn/v 002/xxxxxxxx.
It should be noted that the encrypted character string may be used, but not limited to, for indicating the identification details corresponding to the user, or may be used, but not limited to, for indicating the identification details corresponding to the user and the effective time of identity verification of the two-dimensional code.
Note that, the authentication valid time information may be, but not limited to, set in another character string formed by the two-dimensional code, which is not limited in this embodiment.
After one two-dimensional code is acquired, in order to relieve the pressure of the server, one two-dimensional code is acquired at regular intervals of 1 minute. The user can also click the two-dimensional code to refresh.
(Two) two-dimensional code binding sub-module 1010
The two-dimensional code binding sub-module 1010 may be used, but is not limited to, for concatenating strings onto two-dimensional codes. After the two-dimensional code is obtained, in order to realize quick flashing of the two-dimensional code, a character string with a certain check rule is generated through a certain algorithm, and then the character string is spliced to the back of the two-dimensional code. The following is a custom of various algorithms for generating "concatenation strings", and the following explanation of how to concatenate is explained using the manner of "incremental algorithm". For example, based on the incremental algorithm used, the user two-dimensional code obtained from the server is: http:// wx.url/v 002/xxxxxxxx, and if the character string generated by the first algorithm is 100, the two-dimensional code displayed at the terminal is spliced as follows: the character string generated by the next increment algorithm is 101, the two-dimensional code generated after splicing is http:// wx.url/v 002/xxxxxx-101, and the like, which is equivalent to the two-dimensional code displayed on the user equipment, and consists of a spliced character string generated by the algorithm and binding the two-dimensional code of the user id.
And on the time interval, refreshing the two-dimensional code on the applet once by generating a character string through an algorithm every 100ms and then splicing the character string to the two-dimensional code. The effect that the two-dimensional code always flashes is seen from the UI. Within one minute, the same original two-dimensional code obtained from the server is used, but a character string with a certain rule generated by an algorithm is spliced at the back, so that the character string becomes a new two-dimensional code. The algorithm rules are used in the subsequent two-dimensional code verification module 1006.
Further, as shown in fig. 11, the same character strings included in the character string area 1104 indicate the same original two-dimensional code 1102, and different character strings included in the character string area 1106 indicate different two-dimensional codes having different sequence values, respectively. For example, the string region 1108 indicates two different two-dimensional codes, and the strings within the string region 1104 corresponding to the different two-dimensional codes are the same, while the strings within the corresponding string region 1106 are different. The two different two-dimensional codes are used for identity verification by the code scanner 1110.
In the time interval, the two-dimensional code on the applet is refreshed once by generating a character string through an algorithm and then splicing the character string to the two-dimensional code every 100 ms. The two-dimension code is always in the flickering effect from the UI, and the same original two-dimension code obtained from the server is used within one minute, and the character string with a certain rule generated by the algorithm is spliced at the back, so that the original two-dimension code becomes a new two-dimension code. This algorithm rule is used in the subsequent two-dimensional code verification module 1006.
(III) two-dimensional code verification sub-module 1012
The two-dimensional code verification sub-module 1012 can be used for verifying whether the type corresponding to the two-dimensional code is correct, for example, if the two-dimensional code with the code data beginning of http:// wx.url.cn corresponding to the two-dimensional code correctly indicates the current campus code, the identity information corresponding to the two-dimensional code with the code data beginning of other codes cannot obtain the campus right.
The two-dimensional code verification sub-module 1012 may be used for verifying whether the two-dimensional code is complete, for example, if the code data starts with http:// wx.url.cn/V002 is a V2 version campus code, the integrity judgment code length is 126; the code data is http:// wx.url.cn/V003 is the campus code of V3 version, and the integrity judgment code length is 211.
It should be noted that, the versions of the two-dimensional codes are different, and the corresponding integrity judgment code lengths are different.
Two-dimensional code verification sub-module 1012 may be used to verify, but is not limited to, whether the first campus code of the cache is out of date. When campus code data are cached, time is also cached, when a second complete campus code is read, the time interval between the first code and the second code cannot be more than 450ms, the campus code is refreshed once at 200ms, the interval is 450ms, the two-dimensional code which is continuously read is ensured to be only one code to be missed, if two codes are continuously missed, the interval time exceeds 450ms, the cached first campus code is discarded, and the two-dimensional code is accumulated again.
(IV) two-dimensional code resolution sub-Module 1014
The two-dimensional code parsing sub-module 1014 may be used for parsing and checking two campus codes that are continuously read.
(Five) two-dimensional code verification sub-module 1016
The two-dimensional code verification sub-module 1016 may be used for, but is not limited to, determining whether the spliced data is incremental data or not according to the generation specification of the applet end. For example, if the splicing rule is an incremental algorithm, then the code scanner needs to check whether the spliced portion of the two-dimensional codes satisfies incremental management, for example, the spliced portion of the first two-dimensional code is 101, the spliced portion of the second two-dimensional code is 102, and the check result is that incremental management is satisfied.
The two-dimensional code verification sub-module 1016 may be used, but is not limited to, for data verification to verify whether the parsed user data is consistent. The two-dimension code consists of a two-dimension code (II) binding user id and a spliced character string generated according to an algorithm, wherein after the spliced character string is verified to meet a rule in the first step, the two-dimension code of the user is proved to be not in screen capturing, the second part is to analyze the two-dimension code binding the user id, the section (http:// wx.url.cn 002/xxxxxxxx) is calculated through an encryption algorithm, the step is to decode the id of the user through a secret key, acquire the detailed information identity of the user through the id, and judge whether the user is a valid user of the current campus.
The two-dimensional code verification sub-module 1016 may be used for, but is not limited to, wind-controlled verification: the time difference between the resolved code generation time and the code scanner time is less than 300 seconds, wherein the interval time validity background is controllable, and the code can be issued through configuration.
It should be noted that, on the target terminal, for example, on the applet, detection of a screen capturing event and a screen recording event is added, when the user captures a screen, the screen capturing event is reported to the background server through a network request, and wind control processing is performed on the user, so that the user can fail even if the user propagates and sends out the two-dimension code.
Further illustrating, based on the scenario shown in fig. 10, continuing to apply the target two-dimensional code verification system 1002 as shown in fig. 12 in a campus passing right verification scenario through the applet target two-dimensional code, the specific steps are as follows:
Step S1, establishing a wharf connection: the scanning terminal can be used for identifying the two-dimension code, analyzing the identity information corresponding to the two-dimension code and verifying the two-dimension code, the scanning terminal connection can be used for indicating the scanning terminal to be connected with the mobile phone, the tablet, the computer and other equipment, the scanning terminal connection mode can be used for establishing connection based on Bluetooth, connection based on a data line and connection based on WIFI, and the embodiment of the application is not limited in the way; step S2, powering up a scanning terminal: after the scanning terminal is connected with a power supply, the scanning terminal enters a to-be-operated state;
Step S3, creating a data stream connection with the scanning terminal: after the scanning terminal is connected with a power supply and under the condition that the scanning terminal is connected, the data flow connection between the scanning terminal and a background server is further established, wherein the background server can receive two-dimensional code data acquired by the scanning terminal and analyze identity information obtained by verification, and can analyze the identity information obtained by verification based on the two-dimensional code data transmitted by the scanning terminal;
it should be noted that, the steps S1 to S3 form the code scanning starting module 1202;
step S4, the user scans the code: the user inputs the target two-dimensional code displayed on the applet to the scanning terminal so as to obtain and identify data corresponding to the target two-dimensional code by the subsequent scanning terminal;
step S5, data flow detection: the scanning head reads the input stream periodically, which may be, but is not limited to, set to read the input stream once every 50 ms;
Step S6, reading code data: the scanning terminal further obtains code data corresponding to the two-dimensional code based on the read input stream data, wherein the code data can be used for indicating identity information corresponding to the two-dimensional code but is not limited to the code data;
Step S7, judging whether a code cache exists or not: judging whether code data read by a scanning terminal have code caches, wherein for the same applet (or a platform for displaying two-dimensional codes on other target terminal equipment), the code cache does not exist when the two-dimensional codes are acquired by the scanning terminal for the first time, the code cache exists when the two-dimensional codes are acquired by the scanning terminal for the nth time, and N is a positive integer;
It should be noted that, the steps S4 to S7 may be, but are not limited to, completed by the two-dimensional code obtaining submodule 1008 shown in fig. 10, where the two-dimensional code obtaining submodule 1008 may, but is not limited to, periodically read data through a scanning terminal to obtain the data of the two-dimensional code input by the user;
Step S8, under the condition that the code cache exists, splicing data;
it should be noted that, the step S8 may be completed by, but not limited to, the two-dimensional code binding sub-module 1010, where the two-dimensional code binding sub-module 1010 may be used, but not limited to, for splicing corresponding spliced strings generated according to an algorithm based on the same cached initial two-dimensional code under the condition that the code cache exists, so as to distinguish two-dimensional codes corresponding to different time points;
Step S9, judging whether the spliced target two-dimensional code is a campus code, wherein the campus code can be used for campus access control right verification, school consumption payment verification and the like;
Step S10, outputting an output result of 'please brush the campus code' when the target two-dimensional code is not the campus code;
Step S11, further judging whether the target two-dimensional code is complete or not under the condition that the target two-dimensional code is a campus code;
step S12, under the condition that the target two-dimensional code is incomplete, caching code data, and continuing to read an input stream;
Step S13, further judging whether the target two-dimensional code is a first campus code or not under the condition that the target two-dimensional code is complete;
step S14, caching the target two-dimensional code as the first campus code, recording the caching time and continuing to read the input stream under the condition that the target two-dimensional code is not the first campus code;
step S15, further judging whether the cached first campus code is out of date or not under the condition that the target two-dimensional code is the first campus code;
It should be noted that, the steps S9 to S15 may be completed by, but not limited to, the two-dimensional code verification sub-module 1012 shown in fig. 10, where the two-dimensional code verification sub-module 1012 may be used for, but not limited to, verifying whether the type corresponding to the two-dimensional code is correct, verifying whether the two-dimensional code is complete, verifying whether the two-dimensional code is the first two-dimensional code to be verified and verifying whether the cached two-dimensional code is out of date;
It should be noted that, checking whether the cached two-dimensional code is out of date may be used, but not limited to, for indicating whether a two-dimensional code continuity condition is satisfied between two-dimensional codes, and the two-dimensional code continuity condition may be used, but not limited to, for indicating whether a time interval between two-dimensional codes is not greater than a preset time interval;
step S16, further analyzing and checking the two continuously read campus codes under the condition that the first campus code is not expired;
it should be noted that, the step S16 may be, but is not limited to, completed by the two-dimensional code analysis submodule 1014 shown in fig. 10, where the two-dimensional code analysis submodule 1014 may, but is not limited to, analyze and verify the two-dimensional code continuously read by the scanning terminal;
It should be noted that, under the condition that the first campus code expires, the target two-dimensional code is cached as the first campus code, the caching time is recorded, and the input stream is continuously read;
step S17, under the condition that two continuous campus codes do not accord with the scenes of consumption, entrance guard and the like, outputting analysis and verification failure reasons;
step S18, under the condition that two continuous campus codes accord with consumption, entrance guard and other scenes, the associated user consumption, entrance guard and other authorities are granted, and the analyzed user data are used for verifying the validity of identity information;
It should be noted that, the steps S17 to S18 may be, but are not limited to, completed by the two-dimensional code verification sub-module 1016 shown in fig. 10, where the two-dimensional code verification sub-module 1016 may be, but is not limited to, used for data verification to verify whether the identity information corresponding to the two-dimensional code is the identity information corresponding to the valid user;
It should be noted that, when the verification result obtained by the two-dimensional code verification submodule 1016 indicates that the identity information corresponding to two continuous campus codes is the identity information corresponding to the valid user, the associated user is granted with rights such as consumption, access control and the like;
It should be noted that, the two-dimensional code verification submodule 1016 may be used for, but not limited to, wind control verification, and two-dimensional codes for verifying identity information need to satisfy two-dimensional code continuity conditions, and also need to ensure validity of each two-dimensional code, where when a time interval between a two-dimensional code obtained by the two-dimensional code verification submodule 1016 and a corresponding two-dimensional code obtained by the scanning terminal is less than 300 seconds, the two-dimensional code is considered to have validity, and the setting of the time interval may be, but is not limited to, determined by background configuration, which is not limited in any way.
According to another aspect of the embodiment of the present invention, there is further provided a two-dimensional code verification method, optionally, as shown in fig. 13, the two-dimensional code verification method includes:
S1302, displaying a first target two-dimensional code, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, the target two-dimensional code is used for representing identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and the one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code;
S1304, displaying a second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used for completing secondary verification under the condition that primary verification passes, the second target two-dimensional code is also used for completing tertiary verification under the condition that secondary verification passes, the secondary verification is used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the tertiary verification is used for verifying identity information corresponding to the second target two-dimensional code; under the condition that three times of verification pass, the identity information associated with the target terminal is determined to be correct.
Optionally, in this embodiment, the secondary verification may be used, but not limited to, verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the continuity of the first target two-dimensional code and the second target two-dimensional code may be used, but not limited to, indicating that a display time interval between the first target two-dimensional code and the second target two-dimensional code is smaller than a preset time threshold.
Optionally, in this embodiment, in the case that the second verification passes, the display time interval between the first target two-dimensional code and the second target two-dimensional code is smaller than the preset time threshold, so that the process of transitioning from the display state of the first target two-dimensional code corresponding to the first time point to the display state of the second target two-dimensional code corresponding to the second time point on the target terminal may be, but not limited to, a dynamic change (flickering) process of the two-dimensional code.
Optionally, in this embodiment, the target terminal may be, but not limited to, an application applet for generating, displaying and updating the target two-dimensional code, as shown in fig. 4, an electronic student card for displaying the target two-dimensional code, as shown in fig. 5, a software and hardware device such as a mobile APP, etc., and identity information associated with the target terminal may be, but not limited to, identity information corresponding to a user holding the target terminal, or may be, but not limited to, identity attribution location information, identity version information, identity verification time information, and identity identification detail information corresponding to the user.
Optionally, in this embodiment, the target terminal may be, but not limited to, configured to display a first target two-dimensional code, where the first target two-dimensional code is a target two-dimensional code displayed at a first time point, the target two-dimensional code is used to represent identity information associated with the target terminal, the first target two-dimensional code is used to complete one verification, and one verification is used to verify identity information corresponding to the first target two-dimensional code.
Optionally, in this embodiment, after the first target two-dimensional code is displayed on the target terminal and the first target two-dimensional code passes one verification, a second target two-dimensional code is displayed on the target terminal, where the second target two-dimensional code is a target two-dimensional code displayed at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used to complete a second verification under the condition that the first verification passes, the second target two-dimensional code is also used to complete a third verification under the condition that the second verification passes, the second verification is used to verify continuity of the first target two-dimensional code and the second target two-dimensional code, and the third verification is used to verify identity information corresponding to the second target two-dimensional code;
Alternatively, in this embodiment, in the case of three passes of verification, the identity information associated with the target terminal is determined to be correct.
Optionally, in this embodiment, the primary verification is used to verify whether the identity information associated with the target terminal corresponding to the first target two-dimensional code is wrong, the secondary verification is used to determine whether the first target two-dimensional code and the second target two-dimensional code meet the continuity condition of the target two-dimensional code, and the tertiary verification is used to determine whether the identity information associated with the target terminal corresponding to the target two-dimensional code is wrong.
It should be noted that under the condition that the three-time verification passes, the identity information verification corresponding to the first target two-dimensional code passes, the continuity verification of the first target two-dimensional code and the second target two-dimensional code passes, and the identity information verification corresponding to the second target two-dimensional code passes, so that the identity information which is associated with the target terminal and accords with the identity verification condition is guaranteed in the process of performing the primary verification, the secondary verification and the three-time verification, the authenticity of the two-dimensional code verification by the user is further guaranteed, the phenomenon that the user transmits the two-dimensional code associated with own identity verification information to other people in a photographing, screen capturing and other modes is effectively avoided, the technical effect of improving the verification accuracy of the two-dimensional code is achieved, and the technical problem that the verification accuracy of the two-dimensional code is lower is solved.
Specific embodiments may refer to examples shown in the two-dimensional code verification method, and in this example, details are not repeated here.
According to the embodiment of the application, the first target two-dimensional code is displayed, wherein the first target two-dimensional code is the target two-dimensional code displayed on the target terminal at the first time point, the target two-dimensional code is used for representing the identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code; displaying a second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used for completing secondary verification under the condition of once verification passing, the second target two-dimensional code is also used for completing three times of verification under the condition of twice verification passing, the two-dimensional code is used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the three times of verification are used for verifying identity information corresponding to the second target two-dimensional code; under the condition that three times of verification pass, the identity information associated with the target terminal is determined to be correct. By using the two-dimensional code verification method, under the condition that three times of verification pass, namely, the authentication of the identity information corresponding to the first target two-dimensional code displayed on the target terminal passes, the continuity of the first target two-dimensional code and the second target two-dimensional code displayed on the target terminal passes, and the authentication of the identity information corresponding to the second target two-dimensional code passes, the same identity information which is associated with the target terminal and accords with the authentication condition is ensured in the processes of performing primary verification, secondary verification and three times of verification, the authenticity of two-dimensional code verification by a user is further ensured, the phenomenon that the user transmits the two-dimensional code which is associated with own identity verification information to other people in a photographing, screen capturing and other modes is effectively avoided, the technical effect of improving the verification accuracy of the two-dimensional code is achieved, and the technical problem that the verification accuracy of the two-dimensional code is lower is solved.
As an alternative, displaying the second target two-dimensional code includes:
S1, displaying a second target two-dimensional code under the condition that the time interval between the current time point and the first time point is larger than or equal to the first time interval, wherein the first time interval is a preset updating interval of the target two-dimensional code.
Alternatively, in this embodiment, the first time interval may be, but is not limited to, a preset update interval for the target two-dimensional code. The first time interval may be, but is not limited to, used to indicate that the second target image acquired by the secondary image is different from the first target image corresponding to the first time point.
Optionally, in this embodiment, before the second target two-dimensional code is displayed, but not limited to, performing secondary image acquisition when the time interval between the current time point and the first time point is greater than or equal to the first time interval, to obtain a second target image, and acquiring the second target two-dimensional code based on the second target image, where the first time interval is a preset update interval of the target two-dimensional code.
Optionally, in this embodiment, before displaying the second target two-dimensional code, at least one image display may be performed, so as to obtain at least one candidate image, and a target candidate image is determined in the at least one candidate image, where an image similarity between the target candidate image and the first target image is less than a preset similarity; under the condition that the time interval between the corresponding time point and the first time point is smaller than a second time interval when the target candidate image is determined, determining the target candidate image as a second target image, wherein the second time interval is larger than a preset updating interval; and determining a second target two-dimensional code based on the second target image.
It should be noted that, the second time interval may be, but not limited to, a secondary verification condition for indicating that the target two-dimensional code corresponding to the target candidate image and the target two-dimensional code corresponding to the first time point meet the continuity.
As an alternative, before displaying the first target two-dimensional code, the method further includes:
s1, acquiring a first identity character sent by a server, wherein the server stores identity information associated with a target terminal, and the first identity character is generated by the server based on the identity information associated with the target terminal;
S2, distributing a first sequence value for the first identity character;
S3, forming a first target two-dimensional code based on the first identity character and the first sequence value;
before displaying the second target two-dimensional code, the method further comprises:
S4, acquiring a second identity character sent by the server, wherein the second identity character is generated by the server based on the identity information associated with the target terminal;
s5, a second sequence value is allocated for the second identity character, wherein the first sequence value and the second sequence value are used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code;
S6, forming a second target two-dimensional code based on the second identity character and the second sequence value.
Alternatively, in this embodiment, the first identity character may be, but not limited to, an identity character generated for the server based on the identity information associated with the target terminal, may be, but not limited to, a character for representing an identity home location, a character for representing identity version information, a character for representing an identity verification time, and a character for representing identity details, and the identity information associated with the target terminal may be, but not limited to, stored in the server.
Optionally, in this embodiment, the server assigns a second sequence value for the second identity character; and forming a second target two-dimensional code based on the second identity character and the second sequence value.
Alternatively, in this embodiment, the second identity character may be, but not limited to, an identity character generated for the server based on the identity information associated with the target terminal, may be, but not limited to, a character for representing an identity home location, a character for representing identity version information, a character for representing an identity verification time, and a character for representing identity details, and the identity information associated with the target terminal may be, but not limited to, stored in the server.
Optionally, in this embodiment, the server assigns a second sequence value for the second identity character; and forming a second target two-dimensional code based on the second identity character and the second sequence value.
By way of further illustration, as shown in FIG. 9, the server generates a first identity character 904"http:// wx.url.cn/v 002/20220923-052011111/09541" based on identity information associated with the target terminal, the first identity character 904 comprising a first character 904-1 representing the home location of the identity, a second character 904-2 representing the version information of the identity, a third character 904-3 representing the authentication time, a fourth character 904-4 representing the identity details; the server assigns a first sequence value 906 to the lower identity character 904 and composes a first target two-dimensional code 902 based on the first identity character 904 and the first sequence value 906.
According to the embodiment provided by the application, before the first target two-dimensional code is displayed, the method further comprises the following steps: acquiring a first identity character sent by a server, wherein the server stores identity information associated with a target terminal, and the first identity character is generated by the server based on the identity information associated with the target terminal; assigning a first sequence value to a first identity character; forming a first target two-dimensional code based on the first identity character and the first sequence value; before displaying the second target two-dimensional code, the method further comprises: acquiring a second identity character sent by a server, wherein the second identity character is generated by the server based on identity information associated with a target terminal; distributing a second sequence value for the second identity character, wherein the first sequence value and the second sequence value are used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code; and forming a second target two-dimensional code based on the second identity character and the second sequence value. The server generates corresponding identity characters based on the identity information associated with the target terminal, and distributes corresponding sequence values, and generates corresponding target two-dimensional codes based on the identity characters and the sequence values, so that the authenticity efficiency of the identity information corresponding to the target two-dimensional codes is improved, the purposes of improving the verification accuracy and efficiency of the two-dimensional codes are achieved, and the effect of improving the verification accuracy and efficiency of the identity information corresponding to the target two-dimensional codes is achieved.
It will be appreciated that in the specific embodiments of the present application, related data such as user information is involved, and when the above embodiments of the present application are applied to specific products or technologies, user permissions or consents need to be obtained, and the collection, use and processing of related data need to comply with related laws and regulations and standards of related countries and regions.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
According to another aspect of the embodiment of the application, a two-dimensional code verification device for implementing the two-dimensional code verification method is also provided. As shown in fig. 14, the apparatus includes:
A first obtaining unit 1402, configured to obtain a first target two-dimensional code, where the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used to represent identity information associated with the target terminal;
The first verification unit 1402 is configured to verify, once, identity information corresponding to a first target two-dimensional code when the first target two-dimensional code is obtained, where the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used to represent identity information associated with the target terminal;
The second verification unit 1404 is configured to perform a second verification on continuity of the first target two-dimensional code and the second target two-dimensional code when the first verification passes and the second target two-dimensional code is acquired, where the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point;
And the third verification unit 1406 is configured to perform three times of verification on the identity information corresponding to the second target two-dimensional code when the second verification passes, and determine that the identity information associated with the target terminal is correct when the third verification passes.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the second verification unit 1404 includes:
The verification module is used for carrying out secondary verification on the continuity of the first sequence value and the second sequence value under the condition that the first sequence value corresponding to the first target two-dimensional code and the second sequence value corresponding to the second target two-dimensional code are obtained, wherein the first target two-dimensional code consists of the first sequence value and a first identity character, the first identity character is used for representing identity information corresponding to the first target two-dimensional code, the second target two-dimensional code consists of the second sequence value and a second identity character, the second identity character is used for representing identity information corresponding to the second target two-dimensional code, and the secondary verification is set to pass when the first sequence value and the second sequence value meet the target continuity condition.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the verification module includes:
The first determining submodule is used for determining that the second verification passes under the condition that the second sequence value is located behind the first sequence value and the sequence difference between the second sequence value and the first sequence value is smaller than or equal to a preset error value; or alternatively, the first and second heat exchangers may be,
And the second determining submodule is used for determining that the secondary verification fails under the condition that the second sequence value is positioned before the first sequence value or the sequence difference between the second sequence value and the first sequence value is larger than a preset error value.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the apparatus further includes:
The first acquisition module is used for acquiring an image for one time before verifying the identity information corresponding to the first target two-dimensional code for one time to obtain a first target image, and acquiring the first target two-dimensional code based on the first target image, wherein the first target image is a display image corresponding to a first time point of the target terminal.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the apparatus includes:
The second acquisition module is used for carrying out secondary image acquisition before carrying out primary verification on the identity information corresponding to the first target two-dimensional code to obtain a second target image, and acquiring the second target two-dimensional code based on the second target image, wherein the second target image is a display image corresponding to a second time point of the target terminal.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an optional solution, the second collecting module includes:
The first acquisition sub-module is used for acquiring a second image to obtain a second target image when the time interval between the current time point and the first time point is greater than or equal to the first time interval, and acquiring a second target two-dimensional code based on the second target image, wherein the first time interval is a preset updating interval of the target two-dimensional code; or alternatively, the first and second heat exchangers may be,
The second acquisition sub-module is used for acquiring at least one image to obtain at least one candidate image;
The first determining sub-module is used for determining a target candidate image from at least one candidate image, wherein the image similarity between the target candidate image and the first target image is smaller than a preset similarity;
And the second determining sub-module is used for determining the target candidate image as a second target image under the condition that the time interval between the corresponding time point and the first time point when the target candidate image is determined is smaller than a second time interval, wherein the second time interval is larger than a preset updating interval.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the first verification unit 1402 includes:
The verification module is used for verifying the first identity character once under the condition that the first identity character is acquired, wherein the first identity character comprises at least one of the following components: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details.
Specific embodiments may refer to examples shown in the two-dimensional code verification device, and in this example, details are not repeated here.
As an alternative, the apparatus further includes:
and the opening module is used for opening the passing authority of the target equipment for the user of the target terminal after the identity information associated with the target terminal is determined, wherein the target equipment is used for performing code scanning verification and opening the passing authority after the code scanning verification is passed.
Specific embodiments may refer to examples shown in the two-dimensional code verification method, and in this example, details are not repeated here.
According to another aspect of the embodiment of the application, a two-dimensional code verification device for implementing the two-dimensional code verification method is also provided. As shown in fig. 15, the apparatus includes:
The first display unit 1502 is configured to display a first target two-dimensional code, where the first target two-dimensional code is a target two-dimensional code displayed on the target terminal at a first time point, the target two-dimensional code is used to represent identity information associated with the target terminal, the first target two-dimensional code is used to complete one-time verification, and one-time verification is used to verify the identity information corresponding to the first target two-dimensional code;
The second display unit 1504 is configured to display a second target two-dimensional code, where the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is configured to complete a second verification under a condition that a first verification passes, the second target two-dimensional code is also configured to complete a third verification under a condition that the second verification passes, the second verification is configured to verify continuity between the first target two-dimensional code and the second target two-dimensional code, and the third verification is configured to verify identity information corresponding to the second target two-dimensional code; and under the condition that the three times of verification pass, determining the identity information associated with the target terminal.
Specific embodiments may refer to examples shown in the two-dimensional code verification method, and in this example, details are not repeated here.
As an alternative, the second display unit 1504 includes:
The display module is used for displaying the second target two-dimensional code under the condition that the time interval between the current time point and the first time point is larger than or equal to the first time interval, wherein the first time interval is the preset updating interval of the target two-dimensional code.
As an alternative, the apparatus further includes:
the first acquisition module is used for acquiring a first identity character sent by the server before displaying the first target two-dimensional code, wherein the server stores identity information associated with the target terminal, and the first identity character is generated by the server based on the identity information associated with the target terminal;
The first distribution module is used for distributing a first sequence value for the first identity character before the first target two-dimensional code is displayed;
The first composition module is used for composing the first target two-dimensional code based on the first identity character and the first sequence value before the first target two-dimensional code is displayed.
Specific embodiments may refer to examples shown in the two-dimensional code verification method, and in this example, details are not repeated here.
As an alternative, the apparatus further includes:
the second acquisition module is used for acquiring a second identity character sent by the server before displaying the second target two-dimensional code, wherein the second identity character is generated by the server based on the identity information associated with the target terminal;
The second distribution module is used for distributing a second sequence value to the second identity character before the second target two-dimensional code is displayed, wherein the first sequence value and the second sequence value are used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code;
The second composition module is used for composing the second target two-dimensional code based on the second identity character and the second sequence value before displaying the second target two-dimensional code.
Specific embodiments may refer to examples shown in the two-dimensional code verification method, and in this example, details are not repeated here.
According to still another aspect of the embodiment of the present application, there is also provided an electronic device for implementing the above two-dimensional code verification method, as shown in fig. 16, the electronic device including a memory 1602 and a processor 1604, the memory 1602 storing a computer program, the processor 1604 being configured to execute the steps of any of the method embodiments described above by the computer program.
Alternatively, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of the computer network.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
S1, under the condition that a first target two-dimensional code is obtained, verifying the identity information corresponding to the first target two-dimensional code once;
S2, under the condition that the first target two-dimensional code passes the one-time verification and the second target two-dimensional code is obtained, carrying out the second verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, and the second time point is located behind the first time point;
and S3, under the condition that the second verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct.
Alternatively, it will be understood by those skilled in the art that the structure shown in fig. 16 is only schematic, and the electronic device may also be a terminal device such as a smart phone (e.g. an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile internet device (Mobile INTERNET DEVICES, MID), a PAD, etc. Fig. 16 is not limited to the structure of the above-described electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 16, or have a different configuration than shown in FIG. 16.
The memory 1602 may be used to store software programs and modules, such as program instructions/modules corresponding to the two-dimensional code verification method and apparatus in the embodiment of the present application, and the processor 1604 executes the software programs and modules stored in the memory 1602 to perform various functional applications and data processing, i.e., to implement the two-dimensional code verification method described above. Memory 1602 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1602 may further include memory located remotely from the processor 1604, which may be connected to the terminal by a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1602 may be, but is not limited to, used for storing information such as a scan request and identity information corresponding to a target two-dimensional code. As an example, as shown in fig. 16, the memory 1602 may include, but is not limited to, a first verification unit 1402, a second verification unit 1404, and a third verification unit 1406 in a verification device including the two-dimensional code. In addition, other module units in the two-dimensional code verification device may be included, but are not limited to, and are not described in detail in this example.
Optionally, the transmission device 1606 is used to receive or transmit data via a network. Specific examples of the network described above may include wired networks and wireless networks. In one example, the transmission means 1606 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices and routers via a network cable to communicate with the internet or a local area network. In one example, the transmission device 1606 is a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
In addition, the electronic device further includes: the display 1608 is used for displaying the code scanning request, the identity information corresponding to the target two-dimensional code and other information; and a connection bus 1610 for connecting the respective module parts in the above-described electronic device.
In other embodiments, the terminal device or the server may be a node in a distributed system, where the distributed system may be a blockchain system, and the blockchain system may be a distributed system formed by connecting the plurality of nodes through a network communication. Among them, the nodes may form a Peer-To-Peer (P2P) network, and any type of computing device, such as a server, a terminal, etc., may become a node in the blockchain system by joining the Peer-To-Peer network.
According to one aspect of the present application, there is provided a computer program product comprising a computer program/instruction containing program code for executing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via a communication portion, and/or installed from a removable medium. When executed by a central processing unit, performs various functions provided by embodiments of the present application.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
It should be noted that the computer system of the electronic device is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
The computer system includes a central processing unit (Central Processing Unit, CPU) that can perform various appropriate actions and processes according to a program stored in a Read-Only Memory (ROM) or a program loaded from a storage section into a random access Memory (Random Access Memory, RAM). In the random access memory, various programs and data required for the system operation are also stored. The CPU, the ROM and the RAM are connected to each other by bus. An Input/Output interface (i.e., I/O interface) is also connected to the bus.
The following components are connected to the input/output interface: an input section including a keyboard, a mouse, etc.; an output section including a Cathode Ray Tube (CRT), a Liquid crystal display (Liquid CRYSTAL DISPLAY, LCD), and a speaker; a storage section including a hard disk or the like; and a communication section including a network interface card such as a local area network card, a modem, and the like. The communication section performs communication processing via a network such as the internet. The drive is also connected to the input/output interface as needed. Removable media such as magnetic disks, optical disks, magneto-optical disks, semiconductor memories, and the like are mounted on the drive as needed so that a computer program read therefrom is mounted into the storage section as needed.
In particular, the processes described in the various method flowcharts may be implemented as computer software programs according to embodiments of the application. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such embodiments, the computer program may be downloaded and installed from a network via a communication portion, and/or installed from a removable medium. The computer program, when executed by a central processing unit, performs the various functions defined in the system of the application.
According to one aspect of the present application, there is provided a computer-readable storage medium, from which a processor of a computer device reads the computer instructions, the processor executing the computer instructions, causing the computer device to perform the methods provided in the various alternative implementations described above.
Alternatively, in the present embodiment, the above-described computer-readable storage medium may be configured to store a computer program for executing the steps of:
S1, under the condition that a first target two-dimensional code is obtained, verifying the identity information corresponding to the first target two-dimensional code once;
S2, under the condition that the first target two-dimensional code passes the one-time verification and the second target two-dimensional code is obtained, carrying out the second verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on a target terminal at a second time point, and the second time point is located behind the first time point;
and S3, under the condition that the second verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct.
Alternatively, in this embodiment, it will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be performed by a program for instructing a terminal device to execute the steps, where the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
The integrated units in the above embodiments may be stored in the above-described computer-readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing one or more computer devices (which may be personal computers, servers or network devices, etc.) to perform all or part of the steps of the method of the various embodiments of the present application.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In several embodiments provided by the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, such as the division of the units, is merely a logical function division, and may be implemented in another manner, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (15)

1. The two-dimensional code verification method is characterized by comprising the following steps of:
Under the condition that a first target two-dimensional code is obtained, verifying identity information corresponding to the first target two-dimensional code once, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing identity information associated with the target terminal;
Under the condition that the primary verification passes and a second target two-dimensional code is obtained, carrying out secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located behind the first time point;
And under the condition that the secondary verification passes, carrying out three times of verification on the identity information corresponding to the second target two-dimensional code, and under the condition that the three times of verification pass, determining that the identity information associated with the target terminal is correct.
2. The method of claim 1, wherein the performing the secondary verification of the continuity of the first target two-dimensional code and the second target two-dimensional code comprises:
Under the condition that a first sequence value corresponding to the first target two-dimensional code and a second sequence value corresponding to the second target two-dimensional code are obtained, carrying out the secondary verification on the continuity of the first sequence value and the second sequence value, wherein the first target two-dimensional code consists of the first sequence value and a first identity character, the first identity character is used for representing identity information corresponding to the first target two-dimensional code, the second target two-dimensional code consists of the second sequence value and a second identity character, the second identity character is used for representing the identity information corresponding to the second target two-dimensional code, and the secondary verification is set to pass when a target continuity condition is met between the first sequence value and the second sequence value.
3. The method of claim 2, wherein said performing said secondary verification of the continuity of said first sequence value with said second sequence value comprises:
Determining that the secondary verification passes when the second sequence value is located after the first sequence value and a sequence difference between the second sequence value and the first sequence value is less than or equal to a preset error value; or alternatively, the first and second heat exchangers may be,
And determining that the secondary verification fails when the second sequence value is positioned before the first sequence value or the sequence difference between the second sequence value and the first sequence value is larger than the preset error value.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
Before the identity information corresponding to the first target two-dimensional code is verified once, the method further comprises the following steps: acquiring a first target image, and acquiring the first target two-dimensional code based on the first target image, wherein the first target image is a display image corresponding to the first time point of the target terminal;
Before the secondary verification of the continuity of the first target two-dimensional code and the second target two-dimensional code, the method further comprises: and acquiring a second target image, and acquiring the second target two-dimensional code based on the second target image, wherein the second target image is a display image corresponding to the target terminal at the second time point.
5. The method of claim 4, wherein performing the secondary image acquisition to obtain a second target image and obtaining the second target two-dimensional code based on the second target image comprises:
When the time interval between the current time point and the first time point is greater than or equal to a first time interval, acquiring the secondary image to obtain the second target image, and acquiring the second target two-dimensional code based on the second target image, wherein the first time interval is a preset updating interval of the target two-dimensional code; or alternatively, the first and second heat exchangers may be,
At least one image acquisition is carried out to obtain at least one candidate image;
determining a target candidate image in the at least one candidate image, wherein the image similarity between the target candidate image and the first target image is smaller than a preset similarity;
and under the condition that the time interval between the corresponding time point and the first time point when the target candidate image is determined is smaller than a second time interval, determining the target candidate image as the second target image, wherein the second time interval is larger than the preset updating interval.
6. The method of claim 2, wherein verifying the identity information corresponding to the first target two-dimensional code once comprises:
And carrying out one-time verification on the first identity character under the condition that the first identity character is acquired, wherein the first identity character comprises at least one of the following components: a first character for representing the home location of the identity, a second character for representing the version information of the identity, a third character for representing the authentication time, and a fourth character for representing the identity details.
7. The method according to any one of claims 1 to 6, characterized in that after said determining that the identity information associated with the target terminal is error-free, the method further comprises:
And opening the passing authority of the target equipment for the user of the target terminal, wherein the target equipment is used for performing code scanning verification and opening the passing authority after the code scanning verification is passed.
8. The two-dimensional code verification method is characterized by comprising the following steps of:
Displaying a first target two-dimensional code, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, the target two-dimensional code is used for representing identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and the one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code;
Displaying a second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used for completing secondary verification under the condition that the primary verification passes, the second target two-dimensional code is also used for completing three times of verification under the condition that the secondary verification passes, the secondary verification is used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the three times of verification are used for verifying identity information corresponding to the second target two-dimensional code;
and under the condition that the three times of verification pass, determining the identity information associated with the target terminal.
9. The method of claim 8, wherein displaying the second target two-dimensional code comprises:
And displaying the second target two-dimensional code under the condition that the time interval between the current time point and the first time point is greater than or equal to a first time interval, wherein the first time interval is a preset updating interval of the target two-dimensional code.
10. The method of claim 8, wherein the step of determining the position of the first electrode is performed,
Before the displaying of the first target two-dimensional code, the method further includes:
Acquiring a first identity character sent by a server, wherein the server stores identity information associated with the target terminal, and the first identity character is generated by the server based on the identity information associated with the target terminal;
Assigning a first sequence value to the first identity character;
Forming the first target two-dimensional code based on the first identity character and the first sequence value;
Before the displaying the second target two-dimensional code, the method further includes:
acquiring a second identity character sent by the server, wherein the second identity character is generated by the server based on the identity information associated with the target terminal;
A second sequence value is allocated to the second identity character, wherein the first sequence value and the second sequence value are used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code;
And forming the second target two-dimensional code based on the second identity character and the second sequence value.
11. The utility model provides a verifying attachment of two-dimensional code which characterized in that includes:
The first verification unit is used for verifying the identity information corresponding to the first target two-dimensional code once under the condition that the first target two-dimensional code is obtained, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, and the target two-dimensional code is used for representing the identity information associated with the target terminal;
The second verification unit is used for performing secondary verification on the continuity of the first target two-dimensional code and the second target two-dimensional code under the condition that the primary verification passes and the second target two-dimensional code is obtained, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, and the second time point is located after the first time point;
and the third verification unit is used for carrying out three times of verification on the identity information corresponding to the second target two-dimensional code under the condition that the second verification passes, and determining that the identity information associated with the target terminal is correct under the condition that the third verification passes.
12. The utility model provides a verifying attachment of two-dimensional code which characterized in that includes:
The first display unit is used for displaying a first target two-dimensional code, wherein the first target two-dimensional code is a target two-dimensional code displayed on a target terminal at a first time point, the target two-dimensional code is used for representing identity information associated with the target terminal, the first target two-dimensional code is used for completing one-time verification, and the one-time verification is used for verifying the identity information corresponding to the first target two-dimensional code;
The second display unit is used for displaying a second target two-dimensional code, wherein the second target two-dimensional code is a target two-dimensional code displayed on the target terminal at a second time point, the second time point is located after the first time point, the second target two-dimensional code is used for completing secondary verification under the condition that the primary verification passes, the second target two-dimensional code is also used for completing three times of verification under the condition that the secondary verification passes, the secondary verification is used for verifying the continuity of the first target two-dimensional code and the second target two-dimensional code, and the three times of verification are used for verifying identity information corresponding to the second target two-dimensional code;
and the determining unit is used for determining that the identity information associated with the target terminal is correct under the condition that the three times of verification pass.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program is executable by a terminal device or a computer to perform the method of any one of claims 1 to 7 or 8 to 10.
14. A computer program product comprising computer programs/instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 7 or 8 to 10.
15. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method according to any of the claims 1-7 or 8-10 by means of the computer program.
CN202211407664.0A 2022-11-10 2022-11-10 Two-dimensional code verification method and device, storage medium and electronic equipment Pending CN118013495A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211407664.0A CN118013495A (en) 2022-11-10 2022-11-10 Two-dimensional code verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211407664.0A CN118013495A (en) 2022-11-10 2022-11-10 Two-dimensional code verification method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN118013495A true CN118013495A (en) 2024-05-10

Family

ID=90959092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211407664.0A Pending CN118013495A (en) 2022-11-10 2022-11-10 Two-dimensional code verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN118013495A (en)

Similar Documents

Publication Publication Date Title
US11250229B2 (en) Displaying and recognizing two-dimensional code
CN106656908B (en) Two-dimensional code processing method and device
CN111160845B (en) Service processing method and device
CN104468531A (en) Authorization method, device and system for sensitive data
CN108038388B (en) Method for realizing Web page seal, client and server
CN113011864B (en) Two-dimensional code generation and verification method, device, equipment and readable medium
CN112187804B (en) Communication method and device of server, computer equipment and storage medium
CN104618315A (en) Method, device and system for verification information push, and method, device and system for information verification
CN111125729A (en) Block chain-based vehicle driving information processing method and device and storage medium
CN110875932A (en) File uploading method, device and system
CN107682376B (en) Wind control data interaction method and device
CN108390848B (en) Information witness method and device
CN111243145B (en) Method, device, medium and electronic equipment for processing visitor information
CN108092947B (en) Method and device for identity authentication of third-party application
CN113037505B (en) Method and system for realizing trusted Web application
CN107623696B (en) User identity verification method and device based on user behavior characteristics
CN113852639A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN112995357A (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN112260934A (en) Resource interaction method and system based on education cloud platform
CN118013495A (en) Two-dimensional code verification method and device, storage medium and electronic equipment
CN110544087A (en) Mobile payment method, device, equipment and computer readable storage medium
CN111787642B (en) Third-party application based authentication networking method and device
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
CN109040781A (en) Video authentication method, device, system, electronic equipment and readable medium
CN113656782A (en) Method for aggregating identification codes, device for aggregating identification codes and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication