WO2021037140A1 - 基于北斗短报文的信息查询方法及装置 - Google Patents

基于北斗短报文的信息查询方法及装置 Download PDF

Info

Publication number
WO2021037140A1
WO2021037140A1 PCT/CN2020/111747 CN2020111747W WO2021037140A1 WO 2021037140 A1 WO2021037140 A1 WO 2021037140A1 CN 2020111747 W CN2020111747 W CN 2020111747W WO 2021037140 A1 WO2021037140 A1 WO 2021037140A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
short message
beidou short
query
user terminal
Prior art date
Application number
PCT/CN2020/111747
Other languages
English (en)
French (fr)
Inventor
权浩
王颖
Original Assignee
权浩
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 权浩 filed Critical 权浩
Publication of WO2021037140A1 publication Critical patent/WO2021037140A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1853Satellite systems for providing telephony service to a mobile station, i.e. mobile satellite service
    • H04B7/18565Arrangements for preventing unauthorised access or for providing user protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Definitions

  • This application relates to the technical field of information query and verification, and specifically, to an information query method and device based on Beidou short messages.
  • information query and verification such as common QR code anti-counterfeiting queries, online verification reports, etc., are basically implemented based on Internet communications.
  • the purpose of the embodiments of this application includes providing an information query method and device based on Beidou short message, using Beidou satellite technology, obtaining query information that can be used to verify target information through Beidou short message, and sending it to the user terminal. This enables more regions to query and verify information, and effectively reduces the possibility of information being stolen or tampered with.
  • the embodiment of the application provides an information query method based on Beidou short message, including:
  • the second Beidou short message is sent to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information.
  • the identification code is an identification code, a two-dimensional code or a barcode.
  • the user terminal is configured to communicate with a Beidou satellite, and convert the identification code into a Beidou short message, and convert the Beidou short message into the identification code;
  • the user terminal has at least one of camera scan code, radio frequency digital identification, and NFC identification reading functions.
  • the first query information includes tag information and first identification information, wherein the tag information is used as an identifier of the first identification information, and the first identification information is used to verify the authenticity of the target information. Pseudo.
  • the first query information includes tag information, first identification information, verification information, and authorization information, wherein the tag information is used as an identifier of the first identification information, and the first identification information is used
  • the verification information is used to request secondary verification of the target information
  • the authorization information is used to verify the authority of the user terminal.
  • obtaining the first query information by the user terminal further includes:
  • the user terminal When the user terminal requests to obtain the first query information, the user terminal requests to obtain the first query information again;
  • the first identification information is only part of the complete identification information, and the verification information can be used as a verification code for the user terminal to request secondary verification of target information.
  • the method further includes:
  • the fourth Beidou short message is sent to the user terminal, so that the user terminal converts the fourth Beidou short message to obtain the second query information.
  • the second query information includes tag information and second identification information, wherein the tag information is also used as an identifier of the second identification information, and the second identification information is used to verify the target The authenticity of the information.
  • the first query information and the second query information may be stored in the data center, or stored in other locations, and the data center may obtain them from the other locations.
  • the embodiment of the application also provides an information query device based on Beidou short message, including:
  • a communication module configured to receive a first Beidou short message sent by a user terminal, where the first Beidou short message is converted by the user terminal according to an identification code
  • An encoding module configured to convert the first Beidou short message into the identification code
  • the communication module is also configured to send the identification code to the data center;
  • the communication module is further configured to receive first query information fed back by the data center, where the first query information is obtained by querying the data center according to the identification code;
  • the encoding module is further configured to convert the first query information to obtain a second Beidou short message
  • the communication module is further configured to send the second Beidou short message to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information.
  • the first query information includes tag information, first identification information, verification information, and authorization information, wherein the tag information is used as an identifier of the first identification information, and the first identification information is used
  • the verification information is used to request secondary verification of the target information
  • the authorization information is used to verify the authority of the user terminal.
  • the communication module is further configured to receive a third Beidou short message sent by a user terminal, and the third Beidou short message is used by the user terminal according to the tag information, the verification information, and the The authorization information is converted;
  • the encoding module is further configured to convert the third Beidou short message into the label information, the verification information, and the authorization information;
  • the communication module is further configured to send the tag information, the verification information, and the authorization information to the data center;
  • the communication module is further configured to receive second query information fed back by the data center, the second query information being obtained by the data center based on the tag information, the verification information, and the authorization information;
  • the encoding module is further configured to convert the second query information to obtain a fourth Beidou short message
  • the communication module is further configured to send the fourth Beidou short message to the user terminal, so that the user terminal converts the fourth Beidou short message to obtain the second query information.
  • the user terminal is further configured to obtain the first query information again when requesting to obtain the first query information;
  • the first identification information is only part of the complete identification information, and the verification information can be used as a verification code for the user terminal to request secondary verification of target information.
  • An embodiment of the present application also provides an electronic device, including a memory and a processor, the memory is configured to store a computer program, and the processor runs the computer program to make the electronic device execute the aforementioned Beidou-based short message Information query method.
  • the embodiment of the present application also provides a computer-readable storage medium, which stores the computer program used in the above-mentioned electronic device.
  • FIG. 1 is a schematic flowchart of an information query method based on Beidou short message provided in Embodiment 1 of this application;
  • FIG. 2 is a schematic flowchart of the information query method based on Beidou short message provided in the second embodiment of the application;
  • FIG. 3 is a schematic structural diagram of an information query device based on Beidou short message provided in Embodiment 3 and Embodiment 4 of this application.
  • this application provides an information query method and device based on Beidou short messages, which utilize Beidou satellite technology to obtain query information that can be used to verify the authenticity of target information through Beidou short messages. And send inquiry information to the user terminal, Beidou satellite can cover more areas, so that more areas can realize the inquiry and verification of information, and the information transmission through Beidou short message can improve the security of information. Effectively reduce the possibility of information being stolen or tampered with.
  • the execution subject of the following information query method based on Beidou short message may be a device with storage and processing functions such as a server.
  • FIG. 1 is a schematic flowchart of a method for querying information based on Beidou short messages according to an embodiment of the application.
  • Step S101 Receive a first Beidou short message sent by a user terminal, where the first Beidou short message is converted by the user terminal according to the identification code.
  • the identification code may be an identification code, a two-dimensional code, a barcode, a radio frequency identification (RFID) code, an NFC identification code, or other electronic identification codes, etc.
  • RFID radio frequency identification
  • the identification code is an identification code, which can facilitate the conversion of Beidou short messages; if the identification code is a two-dimensional code or a barcode, the user terminal can obtain the corresponding code according to the corresponding identification code, and then convert the corresponding code into a Beidou short message .
  • the process and principle of converting the corresponding code into the Beidou short message please refer to the supporting documents of the related short message and other related algorithms in the technical standard of the Beidou satellite system in the prior art, which will not be repeated here.
  • the user terminal can scan and detect the identification code by scanning or approaching the identification code medium (for example, when the identification code is implemented based on NFC) to read it.
  • the identification code is a text code, it can also be manually input by the user on the user terminal.
  • the identification code is used as the identification code for more exemplary description.
  • the user terminal may be a handheld terminal, which can communicate with the Beidou satellite and has an encoding function, which can convert the identification code into a Beidou short message and convert the Beidou short message into an identification code.
  • the user terminal can also be other electronic devices that can communicate with Beidou satellites, such as personal computers, tablet computers, on-board computers, smart home devices or other Internet of Things (IoT) devices, etc., as long as they can meet the requirements, they can send the above The first Beidou short message is enough.
  • Beidou satellites such as personal computers, tablet computers, on-board computers, smart home devices or other Internet of Things (IoT) devices, etc.
  • the user terminal may also have at least one of functions such as camera scan code, radio frequency digital identification, or NFC identification reading.
  • the user terminal directly sends the above-mentioned Beidou short message to the satellite in the Beidou satellite system, and the Beidou short message reaches the executive body of this method through the Beidou satellite system ( In this embodiment, it is a server).
  • the user terminal may also choose to first send the first Beidou short message to other communication equipment, such as forwarding the base station, and then the other communication equipment sends the first Beidou short message
  • the text is sent to the Beidou satellite, that is, the forwarding communication between the user terminal and the Beidou satellite is realized through the other communication equipment.
  • the above-mentioned forwarding communication method is adaptable to the scene and deployment flexibility
  • the above has certain advantages.
  • Step S102 Convert the aforementioned first Beidou short message into an identification code, and send the identification code to the data center.
  • the conversion is performed in the same encoding and decoding manner as the user terminal.
  • the data center is an important part of the Beidou satellite, and the execution subject of the information query method based on the Beidou short message of the embodiment of the present application can communicate with the data center.
  • Step S103 Receive the first query information fed back by the aforementioned data center, and the first query information is obtained by the data center based on the aforementioned identification code query.
  • the first query information may be stored locally in the data center, or stored in other locations, and obtained by the data center from other locations, for example, stored in other storage devices that are in communication with the data storage center or stored in the cloud.
  • the first query information may be empty information, or the content of the first query information may be "none", “none”, “no such information”, etc.
  • the first query information includes tag information and first identification information, where the tag information is used to identify the first identification information, and the first identification information is used to verify the authenticity of the target information.
  • the above-mentioned label information uniquely corresponds to the first identification information, and the implementation of authenticity verification of the first identification information can refer to mature technical solutions in the prior art, such as barcode anti-counterfeiting, two-dimensional code anti-counterfeiting, etc., which will not be repeated here.
  • the first identification information is used to verify the authenticity of the target information
  • the label information is used as the identification of the first identification information.
  • Step S104 Convert the above-mentioned first query information to obtain a second Beidou short message.
  • the conversion is also performed in the same encoding and decoding manner as the user terminal.
  • Step S105 Send the second Beidou short message to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information.
  • the first Beidou short message is converted by the user terminal according to the identification code; then the first Beidou short message is converted into the identification code, and Send the identification code to the data center; then receive the first query information fed back by the data center, the first query information is obtained by the data center based on the identification code query; then the first query information is converted to obtain the second Beidou short message; Then the second Beidou short message is sent to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information, which can be used as information for the user to verify the authenticity of the target information.
  • the information query method based on the Beidou short message in the embodiment of the application uses Beidou satellite technology to obtain query information that can be used to verify the authenticity of the target information through the Beidou short message, and sends the query information to the user terminal.
  • the Beidou satellite can Covering more regions, enabling more regions to realize information query and verification, and information transmission through Beidou short messages can improve the security of information and effectively reduce the possibility of information being stolen or tampered with Sex.
  • the user terminal when the user terminal receives the above-mentioned second Beidou short message, it converts the second Beidou short message in the same way of encoding and decoding to obtain the first query information, and output (usually display) the second Beidou short message.
  • the Query information when the user terminal receives the above-mentioned second Beidou short message, it converts the second Beidou short message in the same way of encoding and decoding to obtain the first query information, and output (usually display) the second Beidou short message. 1. Query information.
  • the first query information can be used as information for the user to verify the authenticity of the target information.
  • the information query method based on the Beidou short message in the embodiment of the application uses Beidou satellite technology to obtain query information that can be used to verify the authenticity of the target information through the Beidou short message, and sends the query information to the user terminal.
  • the Beidou satellite can Covering more regions, enabling more regions to realize information query and verification, and information transmission through Beidou short messages can improve the security of information and effectively reduce the possibility of information being stolen or tampered with Sex.
  • FIG. 2 is a schematic flowchart of another information query method based on Beidou short message according to an embodiment of the application.
  • Step S201 Receive a first Beidou short message sent by a user terminal, where the first Beidou short message is converted by the user terminal according to the identification code.
  • Step S202 Convert the aforementioned first Beidou short message into an identification code, and send the identification code to the data center.
  • Step S203 Receive the first query information fed back by the aforementioned data center, where the first query information is obtained by the data center based on the aforementioned identification code query.
  • the first query information includes label information, first identification information, verification information, and authorization information, where the label information is used as an identifier for the first identification information, and the first identification information is used for verification.
  • the authenticity of the target information, the verification information is used to request secondary verification of the target information, and the authorization information is used to verify the authority of the user terminal.
  • the user terminal when the user terminal requests the first query information, due to authority and/or confidentiality issues, the first identification information is only part of the complete identification information. If you want to obtain more identification information or complete Based on the authorization information, the user terminal can request to obtain the first query information again, and the verification information can be used for the verification code of the user terminal to request the second verification of the target information. In this way, the target information can be verified. Preliminary verification of the authenticity of the information (that is, after the preliminary verification, if no further verification is required, the first query information may not be requested again), and the security of the information is guaranteed, effectively avoiding the random acquisition of information. Optionally, when the authenticity of the target information needs to be further verified, the first query information can also be requested again.
  • Step S204 Convert the above-mentioned first query information to obtain a second Beidou short message.
  • Step S205 Send the second Beidou short message to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information.
  • Step S206 Receive the third Beidou short message sent by the user terminal, where the third Beidou short message is converted by the user terminal according to the tag information, the verification information, and the authorization information.
  • Step S207 Convert the aforementioned third Beidou short message into the aforementioned label information, verification information, and authorization information, and send the label information, verification information, and authorization information to the data center.
  • the conversion is performed in the same encoding and decoding manner as the user terminal.
  • Step S208 Receive second query information fed back by the aforementioned data center, where the second query information is obtained by the data center based on the aforementioned label information, verification information, and authorization information.
  • the first identification information is only part of the complete identification information. If you want to obtain more identification information or complete identification Information, based on the authorization information, the user terminal can request to obtain the query information again, and the verification information can be used for the user terminal to request the verification code for the secondary verification of the target information. In this way, the authenticity of the target information can be verified Preliminary verification (that is, after the preliminary verification, if no further verification is required, you may not request to obtain the query information again), and ensure the security of the information, effectively avoiding the random acquisition of information, and at the same time, when the authenticity of the target information needs to be further verified, You can also request it again.
  • the second query information may be stored locally in the data center, or stored in other locations, and obtained by the data center from other locations, for example, stored in other storage devices that are in communication with the data storage center or stored in the cloud.
  • the second query information includes tag information and second identification information, where the tag information is also used as an identifier of the second identification information, and the second identification information is used to verify the authenticity of the target information.
  • the second identification information may be complete identification information, or more identification information including the first identification information, or other identification information that is different from the first identification information in the complete identification information, and so on.
  • the second identification information when the user terminal requests to obtain identification information again, the second identification information can be used to more accurately and completely verify the authenticity of the target information, and the label information is used as the identification of the second identification information.
  • the second identification information when querying to obtain the second identification information, because the second identification information has corresponding label information, it can effectively and quickly obtain the exact second identification information by querying the corresponding label information, thereby improving the efficiency and accuracy of information query.
  • Step S209 Convert the above-mentioned second query information to obtain the fourth Beidou short message.
  • the conversion is also performed in the same encoding and decoding manner as the user terminal.
  • Step S210 Send the fourth Beidou short message to the user terminal, so that the user terminal converts the fourth Beidou short message to obtain the second query information.
  • the user terminal when the user terminal receives the fourth Beidou short message, it converts the fourth Beidou short message in the same way of encoding and decoding to obtain the second query information, and output (usually display) the first 2. Query information.
  • the second query information is used to more accurately and completely verify the authenticity of the target information.
  • the second query information is obtained, and the second query information is converted to obtain the fourth Beidou short message, and the fourth Beidou short message is sent to the user terminal , So that the user terminal can convert the fourth Beidou short message to obtain the second query information.
  • the second query information can be used to verify the authenticity of the target information more accurately and completely, so that the verification effect is better.
  • FIG. 3 is a schematic structural diagram of an information query device based on Beidou short message provided by an embodiment of the application.
  • the communication module 310 is configured to receive the first Beidou short message sent by the user terminal, and the first Beidou short message is converted by the user terminal according to the identification code.
  • the identification code may be an identification code, a two-dimensional code, a barcode radio frequency identification (RFID) code, an NFC identification code, or other electronic identification codes.
  • RFID radio frequency identification
  • the user terminal may also have at least one of functions such as camera scan code, radio frequency digital identification, or NFC identification reading.
  • the identification code is an identification code, which can facilitate the conversion of Beidou short messages; if the identification code is a two-dimensional code or a barcode, the user terminal can obtain the corresponding code according to the corresponding identification code, and then convert the corresponding code into a Beidou short message .
  • the identification code is used as the identification code for more exemplary description.
  • the user terminal may be a handheld terminal, which can communicate with the Beidou satellite and has an encoding function, which can convert the identification code into a Beidou short message and convert the Beidou short message into an identification code.
  • the user terminal can also be other electronic devices that can communicate with Beidou satellites, such as personal computers, tablets, on-board computers, smart home devices or other Internet of Things (IoT) devices, etc., as long as they can meet the requirements.
  • Beidou satellites such as personal computers, tablets, on-board computers, smart home devices or other Internet of Things (IoT) devices, etc., as long as they can meet the requirements.
  • IoT Internet of Things
  • the encoding module 320 is configured to convert the aforementioned first Beidou short message into an identification code.
  • the conversion when converting the first Beidou short message into an identification code, the conversion is performed in the same encoding and decoding manner as the user terminal.
  • the communication module 310 is also configured to send the aforementioned identification code to the data center.
  • the data center is an important component of the Beidou satellite, and the execution subject of the information query method based on the Beidou short message of the embodiment of the present application can communicate with the data center.
  • the communication module 310 is further configured to receive the first query information fed back by the above-mentioned data center, and the first query information is obtained by querying the data center according to the above-mentioned identification code.
  • the first query information may be stored in the data center, or stored in other locations, and obtained by the data center from other locations, for example, stored in other storage devices that are in communication with the data storage center or stored in the cloud.
  • the first query information may be empty information, or the content of the first query information may be "none", “none”, “no such information”, etc.
  • the first query information includes tag information and first identification information, where the tag information is used to identify the first identification information, and the first identification information is used to verify the authenticity of the target information.
  • the first identification information is used to verify the authenticity of the target information
  • the label information is used as the identification of the first identification information.
  • the encoding module 320 is further configured to convert the above-mentioned first query information to obtain a second Beidou short message.
  • the conversion is also performed in the same encoding and decoding manner as the user terminal.
  • the communication module 310 is further configured to send the second Beidou short message to the user terminal, so that the user terminal converts the second Beidou short message to obtain the first query information.
  • each encoding module can convert the received information to obtain corresponding information, thereby facilitating the efficiency of sending and receiving data by the information query device, the user terminal, and the data center.
  • each encoding module is configured to use the same encoding for the identification code, first query information, label information, verification information, and authorization information, and the first, second, third, and fourth Beidou short messages. Ways, etc. are converted mutually.
  • the encoding modules of the information query device, user terminal and data center can be implemented based on the same or similar technical principles, but this does not mean that they are the same in specific implementation.
  • Each encoding module can be specifically designed and have different Structure and function, etc., will not be repeated here.
  • the foregoing user terminal and/or the encoding module of the data center may be implemented in the form of hardware, such as embedded or external hardware, or implemented in the form of software, such as a computer program.
  • the communication module first receives the first Beidou short message sent by the user terminal.
  • the first Beidou short message is converted by the user terminal according to the identification code;
  • the encoding module then converts the first Beidou short message into an identification
  • the communication module then sends the identification code to the data center;
  • the communication module receives the first query information fed back by the data center, the first query information is obtained by the data center based on the identification code query;
  • the encoding module then converts the first query information, Obtain the second Beidou short message;
  • the communication module then sends the second Beidou short message to the user terminal so that the user terminal can convert the second Beidou short message to obtain the first query information, which can be used as The user verifies the authenticity of the target information.
  • the information query device based on the Beidou short message in the embodiment of this application uses Beidou satellite technology to obtain query information that can be used to verify the authenticity of the target information through the Beidou short message, and Send query information to the user terminal, Beidou satellite can cover more areas, so that more areas can realize information query and verification, and information transmission through Beidou short message can well improve the security of information, and it is effective. This reduces the possibility of information being stolen or tampered with.
  • the user terminal when the user terminal receives the above-mentioned second Beidou short message, it converts the second Beidou short message in the same way of encoding and decoding to obtain the first query information, and output (usually display) the second Beidou short message.
  • the Query information when the user terminal receives the above-mentioned second Beidou short message, it converts the second Beidou short message in the same way of encoding and decoding to obtain the first query information, and output (usually display) the second Beidou short message. 1. Query information.
  • the user terminal when the user terminal receives the second Beidou short message, it converts the second Beidou short message in the same encoding and decoding manner as the first Beidou short message obtained by the user terminal according to the identification code conversion.
  • the first query information can be used as information for the user to verify the authenticity of the target information.
  • the information query device based on the Beidou short message in the embodiment of the application uses Beidou satellite technology to obtain query information that can be used to verify the authenticity of the target information through the Beidou short message, and sends the query information to the user terminal.
  • the Beidou satellite can Covering more regions, enabling more regions to realize information query and verification, and information transmission through Beidou short messages can improve the security of information and effectively reduce the possibility of information being stolen or tampered with Sex.
  • the aforementioned information query device based on the Beidou short message can implement the information query method based on the Beidou short message of the first embodiment.
  • the optional options in the first embodiment are also applicable to this embodiment, and will not be described in detail here.
  • FIG. 3 is a schematic structural diagram of another information query device based on Beidou short message provided by an embodiment of the application.
  • the information query device based on the Beidou short message in the embodiment of the present application is based on the third embodiment described above.
  • the first query information includes label information, first identification information, verification information, and authorization information.
  • the label information is used as an identification of the first identification information
  • the first identification information is used to verify the authenticity of the target information
  • the verification information is used to Request for secondary verification of target information
  • authorization information is used to verify the authority of the user terminal.
  • the first identification information is only part of the complete identification information. If you want to obtain more identification information or complete identification Information, based on the authorization information, the user terminal can request to obtain the query information again, and the verification information can be used for the user terminal to request the verification code for the secondary verification of the target information. In this way, the authenticity of the target information can be verified Preliminary verification (that is, after the preliminary verification, if no further verification is required, you may not request to obtain the query information again), and ensure the security of the information, effectively avoiding the random acquisition of information, and at the same time, when the authenticity of the target information needs to be further verified, You can also request it again.
  • the communication module 310 is also configured to receive the third Beidou short message sent by the user terminal, and the third Beidou short message is converted by the user terminal according to tag information, verification information, and authorization information.
  • the encoding module 320 is further configured to convert the aforementioned third Beidou short message into the aforementioned label information, verification information, and authorization information.
  • the communication module 310 is also configured to send the above label information, verification information, and authorization information to the data center.
  • the communication module 310 is further configured to receive the second query information fed back by the aforementioned data center, and the second query information is obtained by the data center according to the aforementioned label information, verification information, and authorization information.
  • the encoding module 320 is also configured to convert the above-mentioned second query information to obtain the fourth Beidou short message.
  • the communication module 310 is further configured to send the fourth Beidou short message to the user terminal, so that the user terminal converts the fourth Beidou short message to obtain the second query information.
  • the second query information includes tag information and second identification information, where the tag information is also used as an identifier of the second identification information, and the second identification information is used to verify the authenticity of the target information.
  • the communication module 310 receives the second query information obtained by the data center query, and the encoding module 320 converts the second query information to obtain the fourth Beidou short message.
  • the module 310 sends the fourth Beidou short message to the user terminal so that the user terminal can convert the fourth Beidou short message to obtain the second query information.
  • the second query information can be used to verify the target information more accurately and completely. Authenticity, in order to make the verification effect better.
  • the aforementioned information query device based on the Beidou short message can implement the information query method based on the Beidou short message of the first and second embodiments.
  • the above-mentioned optional items in Embodiment 1, Embodiment 2 and Embodiment 3 are also applicable to this embodiment, and will not be described in detail here.
  • An embodiment of the present application provides an electronic device including a memory and a processor, the memory is configured to store a computer program, and the processor runs the computer program to make the electronic device execute the aforementioned Beidou short message-based information Query method.
  • the above electronic device may be a server.
  • the foregoing server may be a single server or a server set composed of multiple servers.
  • the aforementioned server may be the command center of the Beidou satellite, or a collection of the command center and the data center of the Beidou satellite; the aforementioned server may store query information.
  • the above-mentioned server may also be another data center communicatively connected with the command center or data center of the Beidou satellite. That is, a third-party organization or service provider authorized by the command center of Beidou satellite can act as the above-mentioned server.
  • the embodiment of the present application also provides a computer-readable storage medium, which stores the computer program used in the above-mentioned electronic device.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of the code, and the module, program segment, or part of the code contains one or more functions for realizing the specified logic function.
  • Executable instructions may also occur in a different order from the order marked in the drawings.
  • each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or actions Or it can be realized by a combination of dedicated hardware and computer instructions.
  • the functional modules in the various embodiments of the present application may be integrated together to form an independent part, or each module may exist alone, or two or more modules may be integrated to form an independent part.
  • the function is implemented in the form of a software function module and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .
  • the embodiment of the application provides an information query method and device based on Beidou short message.
  • the Beidou satellite technology is used to obtain query information that can be used to verify target information through the Beidou short message and send it to the user terminal to make it more More areas can realize information inquiry and verification, and effectively reduce the possibility of information being stolen or tampered with.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请提供一种基于北斗短报文的信息查询方法及装置,基于北斗短报文的信息查询方法,包括:接收由用户终端发送的第一北斗短报文,第一北斗短报文由用户终端根据识别码转换得到;将第一北斗短报文转换为识别码,并发送识别码至数据中心;接收由数据中心反馈的第一查询信息,第一查询信息由数据中心根据识别码查询获得;对第一查询信息进行转换,得到第二北斗短报文;将第二北斗短报文发送至用户终端,以使用户终端对第二北斗短报文进行转换,得到第一查询信息。本申请利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息的查询信息,并发送给用户终端,使得更多的地区能实现信息的查询及验证,并有效地降低了信息被窃取或篡改的可能性。

Description

基于北斗短报文的信息查询方法及装置
相关申请交叉引用
本申请要求于2019年08月27日提交中国专利局的申请号为201910798853.7、名称为“基于北斗短报文的信息查询方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息的查询、验证技术领域,具体而言,涉及一种基于北斗短报文的信息查询方法及装置。
背景技术
目前,信息的查询及验证,例如常见的二维码防伪查询、在线验证报告等等基本是基于互联网通信实现的。
现有的基于互联网通信实现的信息的查询及验证,需要在网络覆盖的地区才可实现,而现今网络能覆盖的地区往往比较有限,不够全面,导致网络覆盖不到的地区无法实现信息的查询及验证,并且,现有的基于互联网通信实现的信息的查询及验证,信息会通过较多节点进行传输,导致信息被窃取或篡改的可能性增加。
发明内容
本申请实施例的目的包括提供一种基于北斗短报文的信息查询方法及装置,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息的查询信息,并发送给用户终端,使得更多的地区能实现信息的查询及验证,并有效地降低了信息被窃取或篡改的可能性。
本申请实施例提供了一种基于北斗短报文的信息查询方法,包括:
接收由用户终端发送的第一北斗短报文,所述第一北斗短报文由所述用户终端根据识别码转换得到;
将所述第一北斗短报文转换为所述识别码,并发送所述识别码至数据 中心;
接收由所述数据中心反馈的第一查询信息,所述第一查询信息由所述数据中心根据所述识别码查询获得;
对所述第一查询信息进行转换,得到第二北斗短报文;
将所述第二北斗短报文发送至所述用户终端,以使所述用户终端对所述第二北斗短报文进行转换,得到所述第一查询信息。
可选地,所述识别码为识别代码、二维码或条形码。
可选地,所述用户终端配置为北斗卫星进行通信,并将所述识别代码转换为北斗短报文,以及将所述北斗短报文转换为所述识别代码;
所述用户终端具有照相扫码、射频数字识别、及NFC识别读取功能中的至少一种。
可选地,所述第一查询信息包括标签信息及第一识别信息,其中,所述标签信息用于作为所述第一识别信息的标识,所述第一识别信息用于验证目标信息的真伪。
可选地,所述第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,所述标签信息用于作为所述第一识别信息的标识,所述第一识别信息用于验证目标信息的真伪,所述验证信息用于请求进行二次验证目标信息,所述授权信息用于验证用户终端的权限。
可选地,所述用户终端得到所述第一查询信息还包括:
所述用户终端请求获得所述第一查询信息时,所述用户终端请求再次获得所述第一查询信息;
其中,所述第一识别信息仅为完整的所述识别信息中的部分信息,所述验证信息则可用于所述用户终端请求进行二次验证目标信息的验证码。
可选地,在所述将所述第二北斗短报文发送至所述用户终端之后,所述方法还包括:
接收由用户终端发送的第三北斗短报文,所述第三北斗短报文由所述 用户终端根据所述标签信息、所述验证信息及所述授权信息转换得到;
将所述第三北斗短报文转换为所述标签信息、所述验证信息及所述授权信息,并发送所述标签信息、所述验证信息及所述授权信息至所述数据中心;
接收由所述数据中心反馈的第二查询信息,所述第二查询信息由所述数据中心根据所述标签信息、所述验证信息及所述授权信息查询获得;
对所述第二查询信息进行转换,得到第四北斗短报文;
将所述第四北斗短报文发送至所述用户终端,以使所述用户终端对所述第四北斗短报文进行转换,得到所述第二查询信息。
可选地,所述第二查询信息包括标签信息及第二识别信息,其中,所述标签信息还用于作为所述第二识别信息的标识,所述第二识别信息用于验证所述目标信息的真伪。
可选地,所述第一查询信息和所述第二查询信息可存储于所述数据中心,或存储于其他位置,由所述数据中心从所述其他位置获取。
本申请实施例还提供了一种基于北斗短报文的信息查询装置,包括:
通讯模块,配置为接收由用户终端发送的第一北斗短报文,所述第一北斗短报文由所述用户终端根据识别码转换得到;
编码模块,配置为将所述第一北斗短报文转换为所述识别码;
所述通讯模块,还配置为发送所述识别码至数据中心;
所述通讯模块,还配置为接收由所述数据中心反馈的第一查询信息,所述第一查询信息由所述数据中心根据所述识别码查询获得;
所述编码模块,还配置为对所述第一查询信息进行转换,得到第二北斗短报文;
所述通讯模块,还配置为将所述第二北斗短报文发送至所述用户终端,以使所述用户终端对所述第二北斗短报文进行转换,得到所述第一查询信息。
可选地,所述第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,所述标签信息用于作为所述第一识别信息的标识,所述第一识别信息用于验证目标信息的真伪,所述验证信息用于请求进行二次验证目标信息,所述授权信息用于验证用户终端的权限。
可选地,所述通讯模块,还配置为接收由用户终端发送的第三北斗短报文,所述第三北斗短报文由所述用户终端根据所述标签信息、所述验证信息及所述授权信息转换得到;
所述编码模块,还配置为将所述第三北斗短报文转换为所述标签信息、所述验证信息及所述授权信息;
所述通讯模块,还配置为发送所述标签信息、所述验证信息及所述授权信息至所述数据中心;
所述通讯模块,还配置为接收由所述数据中心反馈的第二查询信息,所述第二查询信息由所述数据中心根据所述标签信息、所述验证信息及所述授权信息查询获得;
所述编码模块,还配置为对所述第二查询信息进行转换,得到第四北斗短报文;
所述通讯模块,还配置为将所述第四北斗短报文发送至所述用户终端,以使所述用户终端对所述第四北斗短报文进行转换,得到所述第二查询信息。
可选地,所述用户终端还配置为在请求获得所述第一查询信息时,再次获得所述第一查询信息;
其中,所述第一识别信息仅为完整的所述识别信息中的部分信息,所述验证信息则可用于所述用户终端请求进行二次验证目标信息的验证码。
本申请实施例还提供了一种电子设备,包括存储器及处理器,所述存储器配置为存储计算机程序,所述处理器运行所述计算机程序以使所述电子设备执行上述的基于北斗短报文的信息查询方法。
本申请实施例还提供了一种计算机可读存储介质,其存储有上述的电子设备中所使用的计算机程序。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本申请的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。
图1为本申请实施例一提供的基于北斗短报文的信息查询方法的流程示意图;
图2为本申请实施例二提供的基于北斗短报文的信息查询方法的流程示意图;
图3为本申请实施例三和实施例四提供的基于北斗短报文的信息查询装置的结构示意图。
附图标号:
310-通讯模块;320-编码模块。
具体实施方式
为使本发明申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。显然,所描述的实施例是本发明申请一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本发明申请实施例的组件可以以各种不同的配置来布置和设计。
因此,以下对在附图中提供的本发明申请的实施例的详细描述并非旨在限制要求保护的本发明申请的范围,而是仅仅表示本发明申请的选定实施例。基于本发明申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明申请保护的范围。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。同时,在本申请的描述中,术语“第一”、“第二”等仅用于区分描述,而不能理解为指示或暗示相对重要性。
针对现有技术中的问题,本申请提供了一种基于北斗短报文的信息查询方法及装置,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息真伪的查询信息,并发送查询信息给用户终端,北斗卫星能覆盖更多的地区,使得更多的地区能实现信息的查询及验证,并且,通过北斗短报文进行信息传输能很好地提高信息的安全性,有效地降低了信息被窃取或篡改的可能性。
本申请实施例中执行下述的基于北斗短报文的信息查询方法的执行主体可以是服务器等具有存储及处理功能的设备。
参见图1,图1为本申请实施例提供的基于北斗短报文的信息查询方法的流程示意图。
本申请实施例的基于北斗短报文的信息查询方法,包括如下步骤:
步骤S101,接收由用户终端发送的第一北斗短报文,第一北斗短报文由用户终端根据识别码转换得到。
在本实施例中,识别码可为识别代码、二维码、条形码、射频识别(RFID)码、NFC识别码或其他电子识别代码等。
识别码为识别代码,能便于北斗短报文的转换;若识别码为二维码或条形码等,用户终端可根据相应的识别码获得对应的代码,再将对应的代码转换为北斗短报文。上述将对应的代码转换为北斗短报文的过程和原理可以参考现有技术中的北斗卫星系统技术标准中有关短报文的支持文档以及其他有关算法,在此不再赘述。
其中,用户终端可以通过扫描或靠近识别码介质(例如当识别码是基于NFC实现时的情况下)时对识别码扫描检测以对其进行读取。当识别码 为文字代码时,也可以由用户在用户终端上进行人工输入。
在本实施例中,以识别码为识别代码进行更多的示例性地说明。
在本实施例中,用户终端可为手持终端,其可与北斗卫星进行通信,并具有编码功能,即可将识别代码转换为北斗短报文,以及将北斗短报文转换为识别代码。
需要说明的是,用户终端还可以为其他能与北斗卫星进行通信的电子设备,例如个人计算机、平板电脑、车载计算机、智能家居设备或其他物联网(IoT)设备等,只要能够满足可以发送上述第一北斗短报文即可。
可选地,用户终端还可具有照相扫码、射频数字识别、或NFC识别读取等功能中的至少一种。
需要说明的是,在本实施例中,作为一种实现方式,用户终端直接向北斗卫星系统中的卫星发送上述北斗短报文,通过北斗卫星系统使北斗短报文到达本方法的执行主体(在本实施例中为服务器)。在本申请其他可选的实施方式中,也可以选择先由用户终端将上述第一北斗短报文发送至其他通信设备,例如转发基站,然后再由该其他通信设备将该第一北斗短报文发送至北斗卫星,即通过该其他通信设备实现用户终端和北斗卫星之间的转发通信。在用户终端的使用场景较为特殊不利于信号发射或用户终端对能耗较为敏感导致发射功率比较低(如在IoT领域的应用中)的情况下,上述转发通信方式在场景适应性和部署灵活性上具有一定的优势。
步骤S102,将上述第一北斗短报文转换为识别码,并发送识别码至数据中心。
在本实施例中,在将第一北斗短报文转换为识别码时,以与用户终端同样的编译码方式进行转换。
数据中心为北斗卫星的一重要组成部分,执行本申请实施例的基于北斗短报文的信息查询方法的执行主体可与数据中心通讯。
步骤S103,接收由上述数据中心反馈的第一查询信息,第一查询信息 由数据中心根据上述识别码查询获得。
在本实施例中,第一查询信息可存储于数据中心本地,或存储于其他位置,由数据中心从其他位置获取,例如存储在与数据存储中心通信连接的其他存储设备或存储在云端。
如果数据中心根据识别码查询不到对应的第一查询信息,那么第一查询信息可为空信息,或第一查询信息内容为“无”、“没有”、“无此信息”等。
作为一种可选的实施方式,第一查询信息包括标签信息及第一识别信息,其中,标签信息用于作为第一识别信息的标识,第一识别信息用于验证目标信息的真伪。上述标签信息与第一识别信息唯一地对应,第一识别信息进行真伪验证的实现方式可以参考现有技术中的成熟技术方案,如条形码防伪、二维码防伪等,在此不再赘述。
在上述实现过程中,第一识别信息用于验证目标信息的真伪,标签信息用于作为第一识别信息的标识,数据中心在根据识别码查询获得第一识别信息时,因为第一识别信息有相应的标签信息,其可通过识别码查询对应的标签信息,进而有效、快速地获得确切的第一识别信息,提高信息查询效率和准确率。
步骤S104,对上述第一查询信息进行转换,得到第二北斗短报文。
在本实施例中,在对第一查询信息进行转换得到第二北斗短报文时,同样以与用户终端同样的编译码方式进行转换。
步骤S105,将上述第二北斗短报文发送至上述用户终端,以使用户终端对第二北斗短报文进行转换,得到上述第一查询信息。
在上述实现过程中,先接收由用户终端发送的第一北斗短报文,第一北斗短报文是由用户终端根据识别码转换得到;再将第一北斗短报文转换为识别码,并发送识别码至数据中心;再接收由数据中心反馈的第一查询信息,第一查询信息是由数据中心根据识别码查询获得;再对第一查询信 息进行转换,得到第二北斗短报文;进而再将第二北斗短报文发送至用户终端,以使用户终端对第二北斗短报文进行转换,得到第一查询信息,第一查询信息能作为用户验证目标信息的真伪的信息,本申请实施例的基于北斗短报文的信息查询方法,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息真伪的查询信息,并发送查询信息给用户终端,北斗卫星能覆盖更多的地区,使得更多的地区能实现信息的查询及验证,并且,通过北斗短报文进行信息传输能很好地提高信息的安全性,有效地降低了信息被窃取或篡改的可能性。
在本实施例中,用户终端在接收到上述第二北斗短报文时,以同样的编译码方式对第二北斗短报文进行转换,得到第一查询信息,并输出(通常为显示)第一查询信息。
第一查询信息能作为用户验证目标信息的真伪的信息。
本申请实施例的基于北斗短报文的信息查询方法,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息真伪的查询信息,并发送查询信息给用户终端,北斗卫星能覆盖更多的地区,使得更多的地区能实现信息的查询及验证,并且,通过北斗短报文进行信息传输能很好地提高信息的安全性,有效地降低了信息被窃取或篡改的可能性。
参见图2,图2为本申请实施例提供的另一基于北斗短报文的信息查询方法的流程示意图。
本申请实施例的基于北斗短报文的信息查询方法,包括如下步骤:
步骤S201,接收由用户终端发送的第一北斗短报文,第一北斗短报文由用户终端根据识别码转换得到。
步骤S202,将上述第一北斗短报文转换为识别码,并发送识别码至数据中心。
步骤S203,接收由上述数据中心反馈的第一查询信息,第一查询信息由数据中心根据上述识别码查询获得。
可选地,在本实施例中,第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,标签信息用于作为第一识别信息的标识,第一识别信息用于验证目标信息的真伪,验证信息用于请求进行二次验证目标信息,授权信息用于验证用户终端的权限。
在上述实现过程中,用户终端请求获得第一查询信息时,由于权限和/或保密的问题,第一识别信息仅为完整的识别信息中的部分信息,如果要获得更多的识别信息或完整的识别信息,在有授权信息的基础上,用户终端可请求再次获得第一查询信息,验证信息则可用于用户终端请求进行二次验证目标信息的验证码,通过此种方式,能实现对目标信息真伪的初步验证(即在初步验证后,无需进一步验证的,可以不请求再次获得第一查询信息),并保障信息的安全性,有效避免信息的随意获得。可选地,在需要进一步验证目标信息的真伪时,也能再次请求获得第一查询信息。
步骤S204,对上述第一查询信息进行转换,得到第二北斗短报文。
步骤S205,将上述第二北斗短报文发送至上述用户终端,以使用户终端对第二北斗短报文进行转换,得到上述第一查询信息。
步骤S206,接收由用户终端发送的第三北斗短报文,第三北斗短报文由用户终端根据标签信息、验证信息及授权信息转换得到。
步骤S207,将上述第三北斗短报文转换为上述标签信息、验证信息及授权信息,并发送标签信息、验证信息及授权信息至数据中心。
在本实施例中,在将第三北斗短报文转换为标签信息、验证信息及授权信息时,以与用户终端同样的编译码方式进行转换。
步骤S208,接收由上述数据中心反馈的第二查询信息,第二查询信息由数据中心根据上述标签信息、验证信息及授权信息查询获得。
在上述实现过程中,用户终端请求获得查询信息时,由于权限和/或保密的问题,第一识别信息仅为完整的识别信息中的部分信息,如果要获得更多的识别信息或完整的识别信息,在有授权信息的基础上,用户终端可 请求再次获得查询信息,验证信息则可用于用户终端请求进行二次验证目标信息的验证码,通过此种方式,能实现对目标信息真伪的初步验证(即在初步验证后,无需进一步验证的,可以不请求再次获得查询信息),并保障信息的安全性,有效避免信息的随意获得,同时,在需要进一步验证目标信息的真伪时,也能再次请求获得。
在本实施例中,第二查询信息可存储于数据中心本地,或存储于其他位置,由数据中心从其他位置获取,例如存储在与数据存储中心通信连接的其他存储设备或存储在云端。
作为一种可选的实施方式,第二查询信息包括标签信息及第二识别信息,其中,标签信息还用于作为第二识别信息的标识,第二识别信息用于验证目标信息的真伪。
可选地,第二识别信息可以是完整的识别信息,或包含第一识别信息的更多识别信息,或完整的识别信息中区别于第一识别信息的其他识别信息等等。
在上述实现过程中,在用户终端请求再次获得识别信息时,第二识别信息能用于更准确、完整地验证目标信息的真伪,标签信息用于作为第二识别信息的标识,数据中心在查询获得第二识别信息时,因为第二识别信息有相应的标签信息,其可通过查询对应的标签信息,有效、快速地获得确切的第二识别信息,提高信息查询效率和准确率。
步骤S209,对上述第二查询信息进行转换,得到第四北斗短报文。
在本实施例中,在对第二查询信息进行转换得到第四北斗短报文时,同样以与用户终端同样的编译码方式进行转换。
步骤S210,将上述第四北斗短报文发送至上述用户终端,以使用户终端对第四北斗短报文进行转换,得到上述第二查询信息。
在本实施例中,用户终端在接收到上述第四北斗短报文时,以同样的编译码方式对第四北斗短报文进行转换,得到第二查询信息,并输出(通 常为显示)第二查询信息。
第二查询信息用于更准确、完整地验证目标信息的真伪。
在上述实现过程中,在用户终端请求再次获得查询信息时,获得第二查询信息,并对第二查询信息进行转换,得到第四北斗短报文,将第四北斗短报文发送至用户终端,以使用户终端对第四北斗短报文进行转换,得到第二查询信息,第二查询信息能用于更准确、完整地验证目标信息的真伪,以使验证效果更佳。
本申请实施例的其余内容可参照上述实施例一的内容,在本实施例中,不再进行赘述。
参见图3,图3为本申请实施例提供的基于北斗短报文的信息查询装置的结构示意图。
本申请实施例的基于北斗短报文的信息查询装置,包括:
通讯模块310,配置为接收由用户终端发送的第一北斗短报文,第一北斗短报文由用户终端根据识别码转换得到。
在本实施例中,识别码可为识别代码、二维码、条形码射频识别(RFID)码、NFC识别码或其他电子识别代码等。
可选地,用户终端还可具有照相扫码、射频数字识别、或NFC识别读取等功能中的至少一种。
识别码为识别代码,能便于北斗短报文的转换;若识别码为二维码或条形码等,用户终端可根据相应的识别码获得对应的代码,再将对应的代码转换为北斗短报文。
在本实施例中,以识别码为识别代码进行更多的示例性地说明。
在本实施例中,用户终端可为手持终端,其可与北斗卫星进行通信,并具有编码功能,即可将识别代码转换为北斗短报文,以及将北斗短报文转换为识别代码。
需要说明的是,用户终端还可以为其他能与北斗卫星进行通信的电子 设备,例如,个人计算机、平板电脑、车载计算机、智能家居设备或其他物联网(IoT)设备等,只要能够满足可以发送上述第一北斗短报文即可。
编码模块320,配置为将上述第一北斗短报文转换为识别码。
在本实施例中,在将第一北斗短报文转换为识别码时,以与用户终端同样的编译码方式进行转换。
通讯模块310,还配置为发送上述识别码至数据中心。
数据中心为北斗卫星的一重要组成部分,执行本申请实施例的基于北斗短报文的信息查询方法的执行主体可与数据中心通讯。
通讯模块310,还配置为接收由上述数据中心反馈的第一查询信息,第一查询信息由数据中心根据上述识别码查询获得。
在本实施例中,第一查询信息可存储于数据中心,或存储于其他位置,由数据中心从其他位置获取,例如存储在与数据存储中心通信连接的其他存储设备或存储在云端。
如果数据中心根据识别码查询不到对应的第一查询信息,那么第一查询信息可为空信息,或第一查询信息内容为“无”、“没有”、“无此信息”等。
作为一种可选的实施方式,第一查询信息包括标签信息及第一识别信息,其中,标签信息用于作为第一识别信息的标识,第一识别信息用于验证目标信息的真伪。
在上述实现过程中,第一识别信息用于验证目标信息的真伪,标签信息用于作为第一识别信息的标识,数据中心在根据识别码查询获得第一识别信息时,因为第一识别信息有相应的标签信息,其可通过识别码查询对应的标签信息,进而有效、快速地获得确切的第一识别信息,提高信息查询效率和准确率。
编码模块320,还配置为对上述第一查询信息进行转换,得到第二北斗短报文。
在本实施例中,在对第一查询信息进行转换得到第二北斗短报文时,同样以与用户终端同样的编译码方式进行转换。通讯模块310,还配置为将上述第二北斗短报文发送至上述用户终端,以使用户终端对第二北斗短报文进行转换,得到上述第一查询信息。
需要说明的是,在本申请实施方式中的上述“同样的编码方式”指的是,在本申请的技术方案中,上述基于北斗短报文的信息查询装置、用户终端和数据中心具有各自的编码模块,各编码模块能够对所收到的信息进行转换得到对应的信息,从而有利于信息查询装置、用户终端和数据中心收发数据的效率。换而言之,各编码模块配置为对识别码、第一查询信息、标签信息、验证信息、授权信息,与第一、第二、第三、第四北斗短报文之间使用同样的编码方式等进行相互转换。信息查询装置、用户终端和数据中心的编码模块可以基于相同或类似的技术原理实现,但这并不意味着它们在具体实现时是相同的,各编码模块可以进行针对性的设计并具有不同的结构功能等,在此不再赘述。
可选地,上述用户终端和/或数据中心的编码模块可以通过硬件形式实现,例如嵌入式或者外接式的硬件,也通过软件形式实现,例如计算机程序等。
在上述实现过程中,通讯模块先接收由用户终端发送的第一北斗短报文,第一北斗短报文由用户终端根据识别码转换得到;编码模块再将第一北斗短报文转换为识别码;通讯模块再发送识别码至数据中心;通讯模块再接收由数据中心反馈的第一查询信息,第一查询信息由数据中心根据识别码查询获得;编码模块再对第一查询信息进行转换,得到第二北斗短报文;通讯模块进而再将第二北斗短报文发送至用户终端,以使用户终端对第二北斗短报文进行转换,得到第一查询信息,第一查询信息能作为用户验证目标信息的真伪的信息,本申请实施例的基于北斗短报文的信息查询装置,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息真 伪的查询信息,并发送查询信息给用户终端,北斗卫星能覆盖更多的地区,使得更多的地区能实现信息的查询及验证,并且,通过北斗短报文进行信息传输能很好地提高信息的安全性,有效地降低了信息被窃取或篡改的可能性。
在本实施例中,用户终端在接收到上述第二北斗短报文时,以同样的编译码方式对第二北斗短报文进行转换,得到第一查询信息,并输出(通常为显示)第一查询信息。
可选地,用户终端在接收到上述第二北斗短报文时,以与用户终端根据识别码转换得到第一北斗短报文同样的编译码方式对第二北斗短报文进行转换。
第一查询信息能作为用户验证目标信息的真伪的信息。
本申请实施例的基于北斗短报文的信息查询装置,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息真伪的查询信息,并发送查询信息给用户终端,北斗卫星能覆盖更多的地区,使得更多的地区能实现信息的查询及验证,并且,通过北斗短报文进行信息传输能很好地提高信息的安全性,有效地降低了信息被窃取或篡改的可能性。
上述的基于北斗短报文的信息查询装置可实施上述实施例一的基于北斗短报文的信息查询方法。上述实施例一中的可选项也适用于本实施例,这里不再详述。
本申请实施例的其余内容可参照上述实施例一的内容,在本实施例中,不再进行赘述。
参见图3,图3为本申请实施例提供的另一基于北斗短报文的信息查询装置的结构示意图。
在本实施例中,本申请实施例的基于北斗短报文的信息查询装置基于上述实施例三。
基于上述实施例三,在本申请实施例的基于北斗短报文的信息查询装 置中:
第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,标签信息用于作为第一识别信息的标识,第一识别信息用于验证目标信息的真伪,验证信息用于请求进行二次验证目标信息,授权信息用于验证用户终端的权限。
在上述实现过程中,用户终端请求获得查询信息时,由于权限和/或保密的问题,第一识别信息仅为完整的识别信息中的部分信息,如果要获得更多的识别信息或完整的识别信息,在有授权信息的基础上,用户终端可请求再次获得查询信息,验证信息则可用于用户终端请求进行二次验证目标信息的验证码,通过此种方式,能实现对目标信息真伪的初步验证(即在初步验证后,无需进一步验证的,可以不请求再次获得查询信息),并保障信息的安全性,有效避免信息的随意获得,同时,在需要进一步验证目标信息的真伪时,也能再次请求获得。
通讯模块310,还配置为接收由用户终端发送的第三北斗短报文,第三北斗短报文由用户终端根据标签信息、验证信息及授权信息转换得到。
编码模块320,还配置为将上述第三北斗短报文转换为上述标签信息、验证信息及授权信息。
通讯模块310,还配置为发送上述标签信息、验证信息及授权信息至数据中心。
通讯模块310,还配置为接收由上述数据中心反馈的第二查询信息,第二查询信息由数据中心根据上述标签信息、验证信息及授权信息查询获得。
编码模块320,还配置为对上述第二查询信息进行转换,得到第四北斗短报文。
通讯模块310,还配置为将上述第四北斗短报文发送至上述用户终端,以使用户终端对第四北斗短报文进行转换,得到上述第二查询信息。
作为一种可选的实施方式,第二查询信息包括标签信息及第二识别信 息,其中,标签信息还用于作为第二识别信息的标识,第二识别信息用于验证目标信息的真伪。
在上述实现过程中,在用户终端请求再次获得查询信息时,通讯模块310接收数据中心查询获得的第二查询信息,编码模块320对第二查询信息进行转换,得到第四北斗短报文,通讯模块310将第四北斗短报文发送至用户终端,以使用户终端对第四北斗短报文进行转换,得到第二查询信息,第二查询信息能用于更准确、完整地验证目标信息的真伪,以使验证效果更佳。
上述的基于北斗短报文的信息查询装置可实施上述实施例一和实施例二的基于北斗短报文的信息查询方法。上述实施例一、实施例二和实施例三中的可选项也适用于本实施例,这里不再详述。
本申请实施例的其余内容可参照上述实施例一、实施例二和实施例三的内容,在本实施例中,不再进行赘述。
本申请实施例提供一种电子设备,包括存储器及处理器,所述存储器配置为存储计算机程序,所述处理器运行所述计算机程序以使所述电子设备执行上述的基于北斗短报文的信息查询方法。
作为一种可选的实施方式,上述电子设备可以是服务器。
可选地,上述服务器可以是单个服务器,或由多个服务器组成的服务器集。
上述服务器可以是北斗卫星的指挥中心,也可以是北斗卫星的指挥中心与数据中心的集合;上述服务器可存储有查询信息。
可选地,上述服务器还可以是与北斗卫星的指挥中心或数据中心通信连接的其他数据中心。即,可以由得到北斗卫星的指挥中心授权的第三方机构或服务提供者充当上述服务器的角色。
另外,本申请实施例还提供一种计算机可读存储介质,其存储有上述的电子设备中所使用的计算机程序。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,也可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,附图中的流程图和框图显示了根据本申请的多个实施例的装置、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现方式中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
另外,在本申请各个实施例中的各功能模块可以集成在一起形成一个独立的部分,也可以是各个模块单独存在,也可以两个或两个以上模块集成形成一个独立的部分。
所述功能如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅为本申请的实施例而已,并不用于限制本申请的保护范围,对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请 的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
工业实用性
本申请实施例提供了一种基于北斗短报文的信息查询方法及装置,利用了北斗卫星技术,通过北斗短报文获得能用于验证目标信息的查询信息,并发送给用户终端,使得更多的地区能实现信息的查询及验证,并有效地降低了信息被窃取或篡改的可能性。

Claims (17)

  1. 一种基于北斗短报文的信息查询方法,其特征在于,包括:
    接收由用户终端发送的第一北斗短报文,所述第一北斗短报文由所述用户终端根据识别码转换得到;
    将所述第一北斗短报文转换为所述识别码,并发送所述识别码至数据中心;
    接收由所述数据中心反馈的第一查询信息,所述第一查询信息由所述数据中心根据所述识别码查询获得;
    对所述第一查询信息进行转换,得到第二北斗短报文;
    将所述第二北斗短报文发送至所述用户终端,以使所述用户终端对所述第二北斗短报文进行转换,得到所述第一查询信息。
  2. 根据权利要求1所述的基于北斗短报文的信息查询方法,其特征在于,所述识别码为识别代码、二维码或条形码。
  3. 根据权利要求1或2所述的基于北斗短报文的信息查询方法,其特征在于,所述用户终端配置为北斗卫星进行通信,并将所述识别代码转换为北斗短报文,以及将所述北斗短报文转换为所述识别代码;
    所述用户终端具有照相扫码、射频数字识别、及NFC识别读取功能中的至少一种。
  4. 根据权利要求1至3中任一项所述的基于北斗短报文的信息查询方法,其特征在于,所述第一查询信息包括标签信息及第一识别信息,其中,所述标签信息用于作为所述第一识别信息的标识,所述第一识别信息用于验证目标信息的真伪。
  5. 根据权利要求1至3中任一项所述的基于北斗短报文的信息查询方法,其特征在于,所述第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,所述标签信息用于作为所述第一识别信息的标识, 所述第一识别信息用于验证目标信息的真伪,所述验证信息用于请求进行二次验证目标信息,所述授权信息用于验证用户终端的权限。
  6. 根据权利要求5所述的基于北斗短报文的信息查询方法,其特征在于,所述用户终端得到所述第一查询信息还包括:
    所述用户终端请求获得所述第一查询信息时,所述用户终端请求再次获得所述第一查询信息;
    其中,所述第一识别信息仅为完整的所述识别信息中的部分信息,所述验证信息则可用于所述用户终端请求进行二次验证目标信息的验证码。
  7. 根据权利要求5或6所述的基于北斗短报文的信息查询方法,其特征在于,在所述将所述第二北斗短报文发送至所述用户终端之后,所述方法还包括:
    接收由用户终端发送的第三北斗短报文,所述第三北斗短报文由所述用户终端根据所述标签信息、所述验证信息及所述授权信息转换得到;
    将所述第三北斗短报文转换为所述标签信息、所述验证信息及所述授权信息,并发送所述标签信息、所述验证信息及所述授权信息至所述数据中心;
    接收由所述数据中心反馈的第二查询信息,所述第二查询信息由所述数据中心根据所述标签信息、所述验证信息及所述授权信息查询获得;
    对所述第二查询信息进行转换,得到第四北斗短报文;
    将所述第四北斗短报文发送至所述用户终端,以使所述用户终端对所述第四北斗短报文进行转换,得到所述第二查询信息。
  8. 根据权利要求7所述的基于北斗短报文的信息查询方法,其特征在于,所述第二查询信息包括标签信息及第二识别信息,其中,所述标签信息还用于作为所述第二识别信息的标识,所述第二识别信息用于验证所述目标信息的真伪。
  9. 根据权利要求1至8中任一项所述的基于北斗短报文的信息查询方 法,其特征在于,所述第一查询信息和所述第二查询信息可存储于所述数据中心,或存储于其他位置,由所述数据中心从所述其他位置获取。
  10. 一种基于北斗短报文的信息查询装置,其特征在于,包括:
    通讯模块,配置为接收由用户终端发送的第一北斗短报文,所述第一北斗短报文由所述用户终端根据识别码转换得到;
    编码模块,配置为将所述第一北斗短报文转换为所述识别码;
    所述通讯模块,还配置为发送所述识别码至数据中心;
    所述通讯模块,还配置为接收由所述数据中心反馈的第一查询信息,所述第一查询信息由所述数据中心根据所述识别码查询获得;
    所述编码模块,还配置为对所述第一查询信息进行转换,得到第二北斗短报文;
    所述通讯模块,还配置为将所述第二北斗短报文发送至所述用户终端,以使所述用户终端对所述第二北斗短报文进行转换,得到所述第一查询信息。
  11. 根据权利要求10所述的基于北斗短报文的信息查询装置,其特征在于,所述识别码为识别代码、二维码或条形码。
  12. 根据权利要求10或11所述的基于北斗短报文的信息查询装置,其特征在于,所述用户终端配置为北斗卫星进行通信,并将所述识别代码转换为北斗短报文,以及将所述北斗短报文转换为所述识别代码;
    所述用户终端具有照相扫码、射频数字识别、及NFC识别读取功能中的至少一种。
  13. 根据权利要求10至12中任一项所述的基于北斗短报文的信息查询装置,其特征在于,所述第一查询信息包括标签信息、第一识别信息、验证信息及授权信息,其中,所述标签信息用于作为所述第一识别信息的标识,所述第一识别信息用于验证目标信息的真伪,所述验证信息用于请求进行二次验证目标信息,所述授权信息用于验证用户终端的权限。
  14. 根据权利要求13所述的基于北斗短报文的信息查询装置,其特征在于,
    所述通讯模块,还配置为接收由用户终端发送的第三北斗短报文,所述第三北斗短报文由所述用户终端根据所述标签信息、所述验证信息及所述授权信息转换得到;
    所述编码模块,还配置为将所述第三北斗短报文转换为所述标签信息、所述验证信息及所述授权信息;
    所述通讯模块,还配置为发送所述标签信息、所述验证信息及所述授权信息至所述数据中心;
    所述通讯模块,还配置为接收由所述数据中心反馈的第二查询信息,所述第二查询信息由所述数据中心根据所述标签信息、所述验证信息及所述授权信息查询获得;
    所述编码模块,还配置为对所述第二查询信息进行转换,得到第四北斗短报文;
    所述通讯模块,还配置为将所述第四北斗短报文发送至所述用户终端,以使所述用户终端对所述第四北斗短报文进行转换,得到所述第二查询信息。
  15. 根据权利要求14所述的基于北斗短报文的信息查询装置,其特征在于,
    所述用户终端还配置为在请求获得所述第一查询信息时,再次获得所述第一查询信息;
    其中,所述第一识别信息仅为完整的所述识别信息中的部分信息,所述验证信息则可用于所述用户终端请求进行二次验证目标信息的验证码。
  16. 一种电子设备,其特征在于,包括存储器及处理器,所述存储器配置为存储计算机程序,所述处理器运行所述计算机程序以使所述电子设备执行根据权利要求1至9中任一项所述的基于北斗短报文的信息查询方法。
  17. 一种计算机可读存储介质,其特征在于,其存储有权利要求19所述的电子设备中所使用的计算机程序。
PCT/CN2020/111747 2019-08-27 2020-08-27 基于北斗短报文的信息查询方法及装置 WO2021037140A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910798853.7 2019-08-27
CN201910798853.7A CN110493243A (zh) 2019-08-27 2019-08-27 基于北斗短报文的信息查询方法及装置

Publications (1)

Publication Number Publication Date
WO2021037140A1 true WO2021037140A1 (zh) 2021-03-04

Family

ID=68554565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/111747 WO2021037140A1 (zh) 2019-08-27 2020-08-27 基于北斗短报文的信息查询方法及装置

Country Status (2)

Country Link
CN (1) CN110493243A (zh)
WO (1) WO2021037140A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347583A (zh) * 2021-06-24 2021-09-03 中电科卫星导航运营服务有限公司 一种高频度精容量北斗短报文发送方法
CN113364512A (zh) * 2021-05-21 2021-09-07 广东海启星海洋科技有限公司 北斗短报文的封装解析方法及装置
CN115396951A (zh) * 2022-10-31 2022-11-25 电科疆泰(深圳)科技发展有限公司 报文通信方法、装置、终端设备及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493243A (zh) * 2019-08-27 2019-11-22 权浩 基于北斗短报文的信息查询方法及装置
CN114584347A (zh) * 2022-01-28 2022-06-03 深圳源中瑞科技有限公司 验证短信收发方法、服务器、终端及存储介质
CN114759972B (zh) * 2022-04-01 2023-06-23 权浩 一种基于北斗卫星的信息查验方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217323A (zh) * 2014-06-27 2014-12-17 武汉理工大学 一种基于rdss和nfc的无人区景区的电子支付方法
CN105447344A (zh) * 2014-08-26 2016-03-30 成都振芯科技股份有限公司 一种基于北斗卫星的软件授权系统及方法
CN106059848A (zh) * 2016-05-06 2016-10-26 南京大学 基于北斗短报文通信的电力数据采集传输处理系统和方法
CN108389016A (zh) * 2018-01-26 2018-08-10 王珏 一种危险品运输智能物流平台
CN110493243A (zh) * 2019-08-27 2019-11-22 权浩 基于北斗短报文的信息查询方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101685503B (zh) * 2008-09-23 2013-01-16 中兴通讯股份有限公司 产品信息查询方法和产品信息查询系统
CN102892093B (zh) * 2012-11-06 2015-03-18 北京和协芯宇科技有限公司 北斗rdss系统的移动通信网络拓展通讯系统及方法
US9742479B2 (en) * 2016-01-04 2017-08-22 Blackberry Limited Method and apparatus for detecting an abnormal antenna condition
CN107395574B (zh) * 2017-06-30 2021-05-07 上海策赢网络科技有限公司 信息标识、信息请求及提供方法和装置、存储介质和设备
CN109636409B (zh) * 2018-11-09 2023-07-25 陈哲川 电线电缆的防伪方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217323A (zh) * 2014-06-27 2014-12-17 武汉理工大学 一种基于rdss和nfc的无人区景区的电子支付方法
CN105447344A (zh) * 2014-08-26 2016-03-30 成都振芯科技股份有限公司 一种基于北斗卫星的软件授权系统及方法
CN106059848A (zh) * 2016-05-06 2016-10-26 南京大学 基于北斗短报文通信的电力数据采集传输处理系统和方法
CN108389016A (zh) * 2018-01-26 2018-08-10 王珏 一种危险品运输智能物流平台
CN110493243A (zh) * 2019-08-27 2019-11-22 权浩 基于北斗短报文的信息查询方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113364512A (zh) * 2021-05-21 2021-09-07 广东海启星海洋科技有限公司 北斗短报文的封装解析方法及装置
CN113347583A (zh) * 2021-06-24 2021-09-03 中电科卫星导航运营服务有限公司 一种高频度精容量北斗短报文发送方法
CN113347583B (zh) * 2021-06-24 2022-06-17 中电科卫星导航运营服务有限公司 一种高频度精容量北斗短报文发送方法
CN115396951A (zh) * 2022-10-31 2022-11-25 电科疆泰(深圳)科技发展有限公司 报文通信方法、装置、终端设备及存储介质

Also Published As

Publication number Publication date
CN110493243A (zh) 2019-11-22

Similar Documents

Publication Publication Date Title
WO2021037140A1 (zh) 基于北斗短报文的信息查询方法及装置
US10212217B2 (en) Method and apparatus for data transmission in a distributed storage system
US20180160255A1 (en) Nfc tag-based web service system and method using anti-simulation function
EP2487629B1 (en) Secure smart poster
TWI683567B (zh) 安全校驗方法、裝置、伺服器及終端
US9053518B1 (en) Constructing social networks
WO2017000820A1 (zh) 基于云端存储的文件分享方法、装置与系统
US10728244B2 (en) Method and system for credential management
US9378386B1 (en) Content sharing technology
WO2014101522A1 (zh) 基于二维码进行签到的方法、系统、扫描终端和显示终端
US9191213B2 (en) Methods and systems for messaging with physical presence and temporal verifications
Park An IoT application service using mobile RFID technology
KR20130030474A (ko) Nfc 단말 간 통신 시스템 및 방법
CN104410649A (zh) 基于身份标识码的跨屏同步登录方法
US10740665B2 (en) Visual authentication key for matrix barcode
CN105101203A (zh) 无线局域网络信息的处理方法及装置
CN112383914B (zh) 一种基于安全硬件的密码管理方法
CN106779711A (zh) 基于eID的安全支付方法及装置
US9189560B2 (en) Discovery of asset information through scanning of communication tags associated with assets
Ruiz et al. Combining of NFC, BLE and physical web technologies for objects authentication on IoT scenarios
CN104168362A (zh) 终端、二维码管理装置和电子名片管理方法
US9319858B2 (en) Managing information about content transmission
CN102750561B (zh) 一种高效的主动安全射频识别认证的方法
CN103903036A (zh) 一种大容量、易更新的二维码系统
Sanchez et al. Efficient detection of missing tags for passive RFID systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20858988

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20858988

Country of ref document: EP

Kind code of ref document: A1