WO2020143567A1 - 一种自我核验的二维码及其编码方法 - Google Patents

一种自我核验的二维码及其编码方法 Download PDF

Info

Publication number
WO2020143567A1
WO2020143567A1 PCT/CN2020/070434 CN2020070434W WO2020143567A1 WO 2020143567 A1 WO2020143567 A1 WO 2020143567A1 CN 2020070434 W CN2020070434 W CN 2020070434W WO 2020143567 A1 WO2020143567 A1 WO 2020143567A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
self
irreversible
dimensional code
Prior art date
Application number
PCT/CN2020/070434
Other languages
English (en)
French (fr)
Inventor
刘少磊
沈怡
罗年庆
祝哲海
Original Assignee
尤尼泰克(嘉兴)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201910010800.4A external-priority patent/CN109447217A/zh
Priority claimed from CN201910010795.7A external-priority patent/CN109740717A/zh
Application filed by 尤尼泰克(嘉兴)信息技术有限公司 filed Critical 尤尼泰克(嘉兴)信息技术有限公司
Publication of WO2020143567A1 publication Critical patent/WO2020143567A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

Definitions

  • the invention relates to the field of data recognition, in particular to the formation and capture technology of two-dimensional codes.
  • Two-dimensional codes as an important contemporary coding technology, are widely used in high-tech industries, storage and transportation industries, wholesale and retail industries and other industries that need to quickly mark items. Its data capacity, recognition speed, recognition security and recognition diversity are all important considerations for the development of QR codes.
  • FIG 1 Chinese patent application with patent publication number CN103295046A, its technical coding process is shown in Figure 1, and its decoding process is shown in Figure 2, which discloses a method and equipment for generating and using a secure two-dimensional code.
  • the invention cannot perform 100% digital security self-verification on the digital abstracts of the published content generated during the encoding process; the published content is limited to the textual information such as certificate information and authentication information that is intended to be published, and does not emphasize the information in the form of pictures and other forms.
  • Information such as pictures, audio and other formats are subject to digital security self-checking.
  • the present invention solves the technical problems of incomplete digital security self-checking of the digital summary of the published content generated in the encoding process and the single format of the published content in the prior art, and proposes a complete data verification, which effectively prevents data tampering and supports multiple texts.
  • the present invention provides a coding method for self-checking of data, which includes:
  • Step 1 Obtain data information
  • Step 2 Perform an irreversible operation on all data information to obtain the first irreversible value N 1 ;
  • Step 3 Integrate and compress all data information and the complete first irreversible value N 1 , and perform separate encryption to obtain encrypted data;
  • Step 4 Binary encode the encrypted data to generate binary encoded data
  • Step 5 Draw the binary coded data into the two-dimensional code encoding area.
  • the data information in step 1 includes: text information, picture information, audio information, video information, and personal biometrics.
  • the two-dimensional code is used for information authentication in an offline state or a non-network state.
  • the two-dimensional code is used for identification of the certificate
  • the certificate includes: a license, a business card, and a nameplate.
  • the two-dimensional code is used to identify financial documents
  • the financial documents include: insurance policies, bills, traffic tickets, and financial statements.
  • the two-dimensional code is used for announcement identification.
  • the announcement includes: legal documents, certificates, instructions, product packaging, advertisements and printed matter.
  • a decoding method for self-checking data includes:
  • Step 1 Scan to identify the QR code
  • Step 2 Decode the QR code to obtain the QR code information
  • Step 3 Use the decryption algorithm to analyze the two-dimensional code encoding information to obtain the analysis data
  • Step 4 Separate all the data information in the parsed data and the complete first irreversible value N 1 ;
  • Step 5 Perform an irreversible operation on all data information to obtain a second irreversible value N 2 ;
  • Step 6 Compare whether the first irreversible value N 1 and the second irreversible value N 2 are the same to determine whether the information has been tampered with.
  • the step 4 further includes decompressing the parsing data.
  • the step 6 further includes:
  • the parsed data is displayed; if the first irreversible value N 1 and the second irreversible value N2 do not match, the parsed data is not displayed.
  • the two-dimensional code is used for information authentication in an offline state or a non-network state.
  • the two-dimensional code is used for identification of the certificate
  • the certificate includes: a license, a business card, and a nameplate.
  • the two-dimensional code is used to identify financial documents
  • the financial documents include: insurance policies, bills, traffic tickets, and financial statements.
  • the two-dimensional code is used for announcement identification.
  • the announcement includes: legal documents, certificates, instructions, product packaging, advertisements and printed matter.
  • a self-checking QR code including:
  • the coding area includes four centrally symmetric main positioning points at four vertices of the coding area,
  • the data area uses an irreversible data verification mechanism for data sources in multiple information formats.
  • the irreversible data verification mechanism includes: comparing the first irreversible value N 1 before data encryption with the second irreversible value N 2 after data decryption to determine whether the information has been tampered with.
  • the data sources supporting multiple information formats include: text information, picture information, audio information, video information, and personal biometrics.
  • the first irreversible value N 1 before data encryption is a calculation result obtained after performing irreversible calculation on the data obtained from the data source;
  • the second irreversible value N 2 after data decryption is analysis after decrypting the data A calculation result obtained by performing irreversible calculation on the obtained data;
  • the data area includes a complete first irreversible value N 1 before writing encoded data before encryption, and an intermediate calculation result generated by the irreversible operation.
  • the two-dimensional code further includes a frame outline area for reducing data pollution; the two-dimensional code further includes a main partition area between the frame outline area and the coding area, and camouflage isolation for different data areas Area.
  • the data area adopts a partition optimization mechanism, and the partition optimization mechanism includes capacity maximization processing per unit area.
  • the two-dimensional code is used for information authentication in an offline state or a non-network state.
  • FIG. 1 is a schematic diagram of encoding in the prior art solution 1
  • Fig. 2 is a schematic diagram of decoding in the prior art solution 1
  • Embodiment 3 is a flowchart of a two-dimensional code encoding method provided in Embodiment 1 of the present invention
  • FIG. 4 is a flowchart of a two-dimensional code decoding method provided by Embodiment 2 of the present invention
  • Embodiments of the present invention provide a method for encoding and decoding a self-checking two-dimensional code of data to achieve complete data verification, prevent data tampering, support single or mixed data verification of multiple texts, and have strong reliability.
  • This embodiment provides a coding method for self-checking of data, as shown in FIG. 3,
  • Step 1 Read text, pictures and other data
  • Step 2 Back up the data on the setting background of the coding area, and perform an irreversible operation on the backup data to form an irreversible value;
  • Step 3 Integrate and compress the data with all irreversible values, and encrypt separately with the customized asymmetric password
  • Step 4 Binary encode the encrypted data
  • Step 5 Enter the encoded information according to the two-dimensional code structure.
  • Read text, pictures, audio, personal biometrics and other data X N back up the data on the background of the coding area, the backup data is X N1 , and the irreversible value operation is performed on the backup data X N1 to form the irreversible value X N2 ;
  • the data X N is integrated and compressed with all the irreversible values X N2 and encrypted separately with the customized asymmetric cipher; the encrypted secret value is binary encoded; the encoding information X N3 is input according to the two-dimensional code structure.
  • the method for decoding a self-checking two-dimensional code of data provided by an embodiment of the present invention supports single or mixed data check of multiple texts, and supports multiple information sources such as text information, picture information, audio information, video information, and personal biometric information.
  • This embodiment provides a decoding method for data self-checking, as shown in FIG. 4,
  • Step 1 Develop a device to scan the QR code
  • Step 2 Two-dimensional code decoding to obtain coding information
  • Step 3 Use the asymmetric decryption password in the device for data analysis
  • Step 4 Decompress the data, separate the original data and its irreversible value
  • Step 5 Back up the original data on the setting background of the coding area, and perform irreversible calculation on the backup data to form a new irreversible value;
  • Step 6 Compare the irreversible value with the new irreversible value. If they match, the data will be displayed. If they do not match, the display will fail.
  • the device scan the QR code; decode the QR code to obtain the encoded information X N3 ; use the asymmetric decryption password in the device to analyze the data; decompress the data, separate the original data X * N and its irreversible value X N2 ; set the background in the coding area Back up the original data, the backup data is X * N1 , and the irreversible operation is performed on the backup data to form an irreversible value X * N2 ; compare the values of X N2 and X * N2 , if they are consistent, the data is displayed, and if they are inconsistent, the display fails.
  • user A 1 has a public key a 11 and a private key a 12 ; user A N has a public key a N1 and a private key a N2 .
  • the two-dimensional code compiled by user A 1 with public key a 11 must be recognized by the device with private key a 12 developed by user A 1 ; the two-dimensional code compiled by user A N with public key a N1 , The device with the private key a N2 developed by user AN can be recognized.
  • the data self-verification two-dimensional code decoding method provided by the embodiment of the invention has complete data verification, prevents data tampering, supports single or mixed data verification of multiple texts, and has strong reliability.
  • This embodiment provides a self-checking two-dimensional code. As shown in FIG. 5, it includes a frame outline area 102 for reducing data pollution, a coding area, and a main space 103 between the frame outline area and the coding area
  • the coding area includes four centrally symmetric main positioning points 100 located at the four vertices of the coding area, a plurality of data areas, and a camouflage isolation area 106 with different data areas.
  • the data area includes: six equal-sized data areas B1-1, B1-2, B2-1, B2-2, B3-1, B3- of the same size located on the upper and lower edges of the coding area separated by auxiliary positioning points 2.
  • the data area is optimized for partitions to maximize the capacity per unit area and supports information verification in multiple formats.
  • This embodiment provides a two-dimensional code that uses an irreversible data verification mechanism. Using the principle that the same data undergoes irreversible calculations and generates the same value, the irreversible values before and after data encryption are compared to determine whether the information has been tampered with , And finally achieve data verification.
  • Supported information in multiple formats includes: text information, picture information, audio information, video information, personal biometrics, etc., but is not limited to text information, picture information, audio information, video information, personal biometrics.
  • the irreversible calculation results of the data are all encoded into the two-dimensional code to ensure that all the data generated by the decoding is true and reliable, and thus to ensure the complete self-checking of the data.
  • the above embodiment effectively prevents data tampering, supports single or mixed data verification of multiple texts, and improves the reliability of the self-verification data source.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Processing (AREA)

Abstract

一种数据自我核验的编码、解码方法。编码方法包括:获得数据信息;对全部数据信息进行不可逆运算,获得第一不可逆值N 1;整合压缩全部数据信息与完整的第一不可逆值N 1,进行单独加密,获得加密数据;对加密数据进行二进制编码,生成二进制编码数据;将二进制编码数据绘制至二维码编码区。本方法,数据核验完全,有效防止数据篡改,支持多种文本的单一或者混合数据核验,自我核验可靠性高。

Description

一种自我核验的二维码及其编码方法 技术领域
本发明涉及数据识别领域,特别是二维码的形成与捕捉技术。
背景技术
二维码,作为当代重要的编码技术,在高科技行业、储存运输业、批发零售业等需要对物品进行快捷的标示信息的行业广泛使用。其数据的容纳能力、识别速度、识别安全性和识别多样性,都是二维码发展的重要考量因素。
专利公开号为CN103295046A的中国专利申请,其技术编码流程如图1所示,解码流程如图2所示,公开了一种生成和使用安全二维码的方法和设备。该发明不能对编码过程中生成的发布内容数字摘要进行100%数字安全自我核验;发布内容限于证书信息、认证信息等想要发布的文字类信息,并不强调图片等形式的信息,即不能对图片、音频等格式的信息进行数字安全自我核验。
发明内容
本发明解决了现有技术存在的对编码过程中生成的发布内容数字摘要数字安全自我核验不全,发布内容格式单一的技术问题,提出一种数据核验完全,有效防止数据篡改,支持多种文本的单一或者混合数据核验,提升自我核验可靠性的编码方法。
为实现上述目的,本发明提供一种数据自我核验的编码方法,包括:
步骤1:获得数据信息;
步骤2:对全部数据信息进行不可逆运算,获得第一不可逆值N 1
步骤3:整合压缩全部数据信息与完整的第一不可逆值N 1,进行单独加密,获得加密数据;
步骤4:对加密数据进行二进制编码,生成二进制编码数据;
步骤5:将二进制编码数据绘制至二维码编码区。
优选的,所述步骤1中的数据信息包括:文本信息、图片信息、音频信息、视频信息、个人生物特征。
优选的,所述二维码用于离线状态或无网状态的信息认证。
优选的,所述二维码用于证件识别,所述证件包括:证照,名片,铭牌。
优选的,所述二维码用于财务文件识别,所述财务文件包括:保单,票据,交通罚单,财务报表。
优选的,所述二维码用于公告识别,所述公告包括:法律文书,证书,说明书,产品包装,广告及印刷品。
一种数据自我核验的解码方法,包括:
步骤1:扫描识别二维码;
步骤2:解码二维码,获得二维码编码信息;
步骤3:利用解密算法进行二维码编码信息解析,获得解析数据;
步骤4:分离解析数据中的全部数据信息及完整的第一不可逆值N 1
步骤5:对全部数据信息进行不可逆运算,获得第二不可逆值N 2
步骤6:对比第一不可逆值N 1与第二不可逆值N 2是否相同,从而判断信息是否被篡改。
优选的,所述步骤4还包括解压解析数据。
优选的,所述步骤6还包括:
若第一不可逆值N 1与第二不可逆值N 2一致,则显示解析数据;若第一不可 逆值N 1与第二不可逆值N2不一致,则不显示解析数据。
优选的,所述二维码用于离线状态或无网状态的信息认证。
优选的,所述二维码用于证件识别,所述证件包括:证照,名片,铭牌。
优选的,所述二维码用于财务文件识别,所述财务文件包括:保单,票据,交通罚单,财务报表。
优选的,所述二维码用于公告识别,所述公告包括:法律文书,证书,说明书,产品包装,广告及印刷品。
一种自我核验的二维码,包括:
编码区,
所述编码区包括位于编码区四个顶点的四个中心对称的主定位点,
及多个数据区。
所述数据区采用多种信息格式数据源的不可逆的数据核验机制。
所述不可逆的数据核验机制包括:对比数据加密前的第一不可逆值N 1与数据解密后的第二不可逆值N 2,判断信息是否被篡改。
优选的,所述支持的多种信息格式数据源包括:文本信息、图片信息、音频信息、视频信息、个人生物特征。
优选的,所述数据加密前的第一不可逆值N 1为对从数据源获得的数据进行不可逆运算后得到的计算结果;所述数据解密后的第二不可逆值N 2为对数据解密后解析获得的数据进行不可逆运算后得到的计算结果;所述数据区包括写入编码后的数据加密前完整的第一不可逆值N 1、及不可逆运算产生的中间计算结果。
优选的,所述二维码还包括用于降低数据污染的边框轮廓区;所述二维码还包括所述边框轮廓区与编码区之间的主间隔区,及间隔不同数据区的伪装隔 离区。
优选的,所述数据区采用分区优化机制,所述分区优化机制包括单位面积的容量最大化处理。
优选的,所述二维码用于离线状态或无网状态的信息认证。
附图说明
图1为现有技术方案一编码示意图
图2为现有技术方案一解码示意图
图3为本发明实施例一提供的二维码的编码方法流程图
图4为本发明实施例二提供的二维码的解码方法流程图
图5为本发明实施例三提供的二维码示例图
具体实施方法
下面结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护范围。
鉴于现有的方法不能对编码过程中生成的发布内容的数字摘要进行100%数据安全自我核验,发布内容仅局限于证书信息、认证信息和想要发布的内容,并不强调图片等信息的数据安全。本发明实施例提供一种数据自我核验二维码的编码和解码方法,实现数据核验完全,防止数据篡改,支持多种文本的单一或混合数据核验,可靠性强。
实施例一
本实施例提供一种数据自我核验的编码方法,如图3所示,
步骤1:读取文本、图片等数据;
步骤2:在编码区设定背景上对数据进行备份,对备份数据进行不可逆运算,形成不可逆值;
步骤3:数据与全部的不可逆值整合压缩,与订制的非对称密码进行单独加密;
步骤4:对加密数据进行二进制编码;步骤5:按二维码结构输入编码信息。
读取文本、图片、音频、个人生物特征等数据X N;在编码区设定背景上对数据进行备份,备份数据为X N1,对备份数据X N1进行不可逆值运算,形成不可逆值X N2;数据X N与全部的不可逆值X N2整合压缩,与订制的非对称密码进行单独加密;对加密密值进行二进制编码;按二维码结构输入编码信息X N3
本发明实施例提供的数据自我核验二维码的解码方法,支持多种文本的单一或者混合数据核验,支持文本信息、图片信息、音频信息、视频信息、个人生物特征信息等多种信息源。
实施例二
本实施例提供一种数据自我核验的解码方法,如图4所示,
步骤1:制定设备扫描二维码;
步骤2:二维码解码获得编码信息;
步骤3:利用设备内非对称解密密码进行数据解析;
步骤4:数据解压,分离原数据及其不可逆值;
步骤5:在编码区设定背景上对原数据进行备份,对备份数据进行不可逆运 算,形成新的不可逆值;
步骤6:对比不可逆值与新的不可逆值,若一致则显示数据,若不一致则显示失败。
制定设备扫描二维码;二维码解码获得编码信息X N3;利用设备内非对称解密密码进行数据解析;数据解压,分离原数据X * N及其不可逆值X N2;在编码区设定背景上对原数据进行备份,备份数据为X * N1,对备份数据进行不可逆运算,形成不可逆值X * N2;对比X N2与X * N2的值,若一致则显示数据,若不一致则显示失败。
在二维码自我核验过程中,用户A 1,拥有公钥a 11和私钥a 12;用户A N,拥有公钥a N1和私钥a N2。用户A 1用公钥a 11所编译生成的二维码,必须由用户A 1开发的带有私钥a 12的设备才能识别;用户A N用公钥a N1所编译生成的二维码,必须由用户A N开发的带有私钥a N2的设备才能识别。其他用户,只要没有私钥a 12,就不能解析得到A 1编译的二维码内的数据;同理,其他用户,只要没有私钥a N2,就不能解析得到A N编译的二维码内的数据X N3
本发明实施例提供的数据自我核验二维码的解码方法,数据核验完全,防止数据篡改,支持多种文本的单一或混合数据核验,可靠性强。
实施例三
本实施例提供一种自我核验的二维码,如图5所示,包括用于降低数据污染的边框轮廓区102,编码区,以及所述边框轮廓区与编码区之间的主间隔区103;所述编码区包括位于编码区四个顶点的四个中心对称的主定位点100,多个数据区及间隔不同数据区的伪装隔离区106。
所述数据区包括:位于编码区上下边线被辅助定位点间隔开的等大小的6个第二类数据区B1-1,B1-2,B2-1,B2-2,B3-1,B3-2,位于水平方向轴对称 的两个定位点之间等大小的2个第一类数据区A0,A3,2个第一类内数据区A1,A2,以及夹于第一类数据区与第二类数据区之间等大小的3个第三类数据区C1,C2,C3。
数据区做分区优化,实现单位面积的容量最大化,支持多种格式的信息核验。
实施例四
本实施例提供一种采用不可逆的数据核验机制的二维码,利用相同数据经过不可逆运算后,产生的值相同的原理,对比数据加密前和数据解密后的不可逆值,来判断信息是否被篡改,最终实现数据核验。
支持的多种格式的信息包括:文本信息、图片信息、音频信息、视频信息、个人生物特征等,但不限于文本信息、图片信息、音频信息、视频信息、个人生物特征。
数据不可逆运算结果全部编码到二维码内,确保解码生成的数据全部是真实可靠的,进而确保数据自我核验完全。
上述实施例,有效防止数据篡改,支持多种文本的单一或者混合数据核验,提升自我核验数据源的可靠性。
以上所述的具体实施例,对本发明的目的,技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施例,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (19)

  1. 一种数据自我核验的编码方法,其特征在于,包括:
    步骤1:获得数据信息;
    步骤2:对全部数据信息进行不可逆运算,获得第一不可逆值N 1
    步骤3:整合压缩全部数据信息与完整的第一不可逆值N 1,进行单独加密,获得加密数据;
    步骤4:对加密数据进行二进制编码,生成二进制编码数据;
    步骤5:将二进制编码数据绘制至二维码编码区。
  2. 如权利要求1所述的数据自我核验的编码方法,其特征在于,所述步骤1中的数据信息包括:文本信息、图片信息、音频信息、视频信息、个人生物特征。
  3. 如权利要求1-2所述的数据自我核验的编码方法,其特征在于,所述二维码用于离线状态或无网状态的信息认证。
  4. 如权利要求1-2所述的数据自我核验的编码方法,其特征在于,所述二维码用于证件识别,所述证件包括:证照,名片,铭牌。
  5. 如权利要求1-2所述的数据自我核验的编码方法,其特征在于,所述二维码用于财务文件识别,所述财务文件包括:保单,票据,交通罚单,财务报表。
  6. 如权利要求1-2所述的数据自我核验的编码方法,其特征在于,所述二维码用于公告识别,所述公告包括:法律文书,证书,说明书,产品包装,广告及印刷品。
  7. 一种数据自我核验的解码方法,其特征在于,包括:
    步骤1:扫描识别二维码;
    步骤2:解码二维码,获得二维码编码信息;
    步骤3:利用解密算法进行二维码编码信息解析,获得解析数据;
    步骤4:分离解析数据中的全部数据信息及完整的第一不可逆值N 1
    步骤5:对全部数据信息进行不可逆运算,获得第二不可逆值N 2
    步骤6:对比第一不可逆值N 1与第二不可逆值N 2是否相同,从而判断信息是否被篡改。
  8. 如权利要求7所述的数据自我核验的解码方法,其特征在于,所述步骤4还包括解压解析数据。
  9. 如权利要求8所述的数据自我核验的解码方法,其特征在于,所述步骤6还包括:
    若第一不可逆值N 1与第二不可逆值N 2一致,则显示解析数据;若第一不可逆值N 1与第二不可逆值N2不一致,则不显示解析数据。
  10. 如权利要求7-9所述的数据自我核验的解码方法,其特征在于,所述二维码用于离线状态或无网状态的信息认证。
  11. 如权利要求7-9所述的数据自我核验的解码方法,其特征在于,所述二维码用于证件识别,所述证件包括:证照,名片,铭牌。
  12. 如权利要求7-9所述的数据自我核验的解码方法,其特征在于,所述二维码用于财务文件识别,所述财务文件包括:保单,票据,交通罚单,财务报表。
  13. 如权利要求7-9所述的数据自我核验的解码方法,其特征在于,所述二维码用于公告识别,所述公告包括:法律文书,证书,说 明书,产品包装,广告及印刷品。
  14. 一种自我核验的二维码,其特征在于,包括:
    编码区,
    所述编码区包括位于编码区四个顶点的四个中心对称的主定位点,
    及多个数据区。
    所述数据区采用多种信息格式数据源的不可逆的数据核验机制。
    所述不可逆的数据核验机制包括:对比数据加密前的第一不可逆值N 1与数据解密后的第二不可逆值N 2,判断信息是否被篡改。
  15. 如权利要求14所述的自我核验的二维码,其特征在于,所述支持的多种信息格式数据源包括:文本信息、图片信息、音频信息、视频信息、个人生物特征。
  16. 如权利要求15所述的自我核验的二维码,其特征在于,所述数据加密前的第一不可逆值N 1为对从数据源获得的数据进行不可逆运算后得到的计算结果;所述数据解密后的第二不可逆值N 2为对数据解密后解析获得的数据进行不可逆运算后得到的计算结果;所述数据区包括写入编码后的数据加密前完整的第一不可逆值N 1、及不可逆运算产生的中间计算结果。
  17. 如权利要求14-16所述的自我核验的二维码,其特征在于,所述二维码还包括用于降低数据污染的边框轮廓区;所述二维码还包括所述边框轮廓区与编码区之间的主间隔区,及间隔不同数据区的伪装隔离区。
  18. 如权利要求14-16所述的自我核验的二维码,其特征在于,所述数据区采用分区优化机制,所述分区优化机制包括单位面积的容量最大化处理。
  19. 如权利要求14-16所述的自我核验的二维码,其特征在于,所述二维码用于离线状态或无网状态的信息认证。
PCT/CN2020/070434 2019-01-07 2020-01-06 一种自我核验的二维码及其编码方法 WO2020143567A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201910010800.4A CN109447217A (zh) 2018-12-30 2019-01-07 一种自我核验的二维码
CN201910010795.7 2019-01-07
CN201910010800.4 2019-01-07
CN201910010795.7A CN109740717A (zh) 2018-12-30 2019-01-07 一种数据自我核验的编码、解码方法

Publications (1)

Publication Number Publication Date
WO2020143567A1 true WO2020143567A1 (zh) 2020-07-16

Family

ID=71524841

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/070434 WO2020143567A1 (zh) 2019-01-07 2020-01-06 一种自我核验的二维码及其编码方法

Country Status (1)

Country Link
WO (1) WO2020143567A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750510A (zh) * 2012-06-19 2012-10-24 袁开国 基于pki和hash的可信二维码方案
CN106452756A (zh) * 2016-11-08 2017-02-22 王栋 可离线验证安全二维码构造验证方法与装置
CN107231235A (zh) * 2016-08-02 2017-10-03 天地融科技股份有限公司 电子凭条生成方法、业务办理系统及智能密钥设备
US20180331833A1 (en) * 2017-05-10 2018-11-15 Pq Solutions Limited Data verification
CN109447217A (zh) * 2018-12-30 2019-03-08 尤尼泰克(嘉兴)信息技术有限公司 一种自我核验的二维码
CN109740717A (zh) * 2018-12-30 2019-05-10 尤尼泰克(嘉兴)信息技术有限公司 一种数据自我核验的编码、解码方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750510A (zh) * 2012-06-19 2012-10-24 袁开国 基于pki和hash的可信二维码方案
CN107231235A (zh) * 2016-08-02 2017-10-03 天地融科技股份有限公司 电子凭条生成方法、业务办理系统及智能密钥设备
CN106452756A (zh) * 2016-11-08 2017-02-22 王栋 可离线验证安全二维码构造验证方法与装置
US20180331833A1 (en) * 2017-05-10 2018-11-15 Pq Solutions Limited Data verification
CN109447217A (zh) * 2018-12-30 2019-03-08 尤尼泰克(嘉兴)信息技术有限公司 一种自我核验的二维码
CN109740717A (zh) * 2018-12-30 2019-05-10 尤尼泰克(嘉兴)信息技术有限公司 一种数据自我核验的编码、解码方法

Similar Documents

Publication Publication Date Title
US11186111B1 (en) Digitally encoded seal for document verification
US11373265B2 (en) Digital identification document
US10320778B2 (en) Digital identification document
US8903744B2 (en) System and method for controlling access to personal identification information contained in documents
US20190188821A1 (en) System and Method for Digitally Watermarking Digital Facial Portraits
CN105976005A (zh) 二维码加密方法、二维码生成设备和二维码扫描设备
CN101281581A (zh) 一种检验纸制文档内容是否被篡改的方法
CN103415007A (zh) 一种基于信息隐藏的手机二维码安全使用方法
CN107992923A (zh) 一种qr二维码生成及读取的方法
CN107886333A (zh) 一种具有动态防伪信息的防伪系统及其防伪方法
CN102930634A (zh) 一种基于云计算和加密二维码的发票验真系统
KR20090100045A (ko) 전자 문서 발급 및 검증 시스템, 전자 문서 발급 방법 및전자 문서 검증 방법
US20040216031A1 (en) Verifying the veracity and creator of a printed document
CN108082723B (zh) 一种基于cpu密码芯片的防伪瓶盖及其工作方法
CN111242259B (zh) 一种智能防伪码的编码和解码方法及系统
CN101388076A (zh) 生成二维条码的方法及装置
US10460163B2 (en) System and method for digitally watermarking digital facial portraits
CN110020540A (zh) 一种基于二维码的证件识别方法及设备
US9189673B2 (en) Identifier and method of encoding information
WO2020143567A1 (zh) 一种自我核验的二维码及其编码方法
Dlamini et al. Mitigating the challenge of hardcopy document forgery
CN109992984B (zh) 一种基于二维码的文件识别方法及设备
CN1321507C (zh) 基于图形码子母印章族信息关联机制的软证件防伪方法
CN109964445A (zh) 针对未经授权的复制的保护(防克隆)方法和系统
CN107133801B (zh) 登机牌和验证信息编码的生成、登机牌验证方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20738670

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20738670

Country of ref document: EP

Kind code of ref document: A1