Method and device for identifying time-varying dynamic two-dimensional code entrance guard
A technology of time-varying and identifying devices, applied in the field of two-dimensional code access control identification, can solve problems such as hidden dangers of access control identification methods, and achieve the effect of preventing theft or copying and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0030] Specific Embodiment 1: A time-varying dynamic two-dimensional code access control identification method described in this embodiment, the method is realized based on a smart phone and a two-dimensional code identification device, and an encrypted two-dimensional code generation module is embedded in the smart phone , the working process of the encrypted two-dimensional code generation module includes the following steps:
[0031] Steps for entering personally identifiable information;
[0032] Steps for storing entered personally identifiable information;
[0033] Steps for obtaining current time information;
[0034] Steps for receiving a public key;
[0035] Steps for encrypting personally identifiable information and current time information with a public key;
[0036] Steps for generating a QR code from encrypted information and displaying it;
[0037] A two-dimensional code recognition module is embedded in the two-dimensional code recognition device, and the w...
specific Embodiment approach 2
[0043] Specific embodiment 2: This embodiment is a further limitation of the time-varying dynamic two-dimensional code access control identification method described in specific embodiment 1. The personal identification information is fingerprint information, palmprint information, retinal information or face information.
specific Embodiment approach 3
[0044] Specific embodiment three: this embodiment is a further limitation of the time-varying dynamic two-dimensional code access control identification method described in specific embodiment one, and the asymmetric key algorithm is RSA algorithm, ElGamal algorithm, knapsack algorithm Any one of , Rabin algorithm, and elliptic curve encryption algorithm.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 