Two-dimension code publisher identity authentication method based on reliable digital signature

A digital signature and identity authentication technology, applied in the field of network communication, can solve the problem that the publisher of the two-dimensional code has not carried out effective authentication and cannot bear the responsibility of the two-dimensional code, and achieves the effect of easy operation, simple method and information security

Active Publication Date: 2014-08-27
HENAN RONGXIN DATA
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no valid certification for the issuer of the QR code, so the issuer of the QR code cannot be held accountable for his actions
Therefore, how to authenticate the authenticity of the two-dimensional code issuer has always been a technical problem that those skilled in the art hope to solve, but so far there is no public report on the effective authentication of the two-dimensional code issuer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The specific implementation of the present invention will be described in detail below in combination with specific situations.

[0011] In the specific implementation of the present invention, it includes: key management of the quasi-code issuer, quasi-code generation, quasi-code authentication and content identification, and the specific method is:

[0012] (1), Quasi-code issuer key management (module): The quasi-code issuer obtains the public key certificate and signature private key for signing from the certificate certification center, and the quasi-code issuer key management follows PKI (Pubic Key Infrastructure) According to the specification, the certificate authentication center (Certificate Authority center, an authoritative, reliable, and impartial third-party organization) issues a public key certificate to realize the binding of the quasi-code issuer's identity Id and the corresponding public key pk, and the signature private key is stored in USB The Key m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a two-dimension code publisher identity authentication method based on a reliable digital signature. The identity of a two-dimension code publisher can be effectively identified, and the authenticity of two-dimension code publication is ensured. The method comprises the steps of quasi-perfect code publisher key management, quasi-perfect code generation, quasi-perfect code identity identification and content identification. The method comprises the following steps: generating a secret key for a quasi-perfect code publisher and providing key management and an effectiveness identification service; providing a digital signature for information to be published, then generating and publishing a new two-dimension code image based on the information to be published and signature information according to format coding; reading the content in the quasi-perfect code, extracting the information to the published and the digital signature, verifying the effectiveness of the signature, and if the signature is effective, outputting the information to be published and the identity of the publisher. The two-dimension code publisher identity authentication method based on the reliable digital signature is simple, easy to operate and capable of effectively achieving tracking, supervision and management of the two-dimension code publisher, enables information of internet communication to be safe, accurate and reliable, and has huge economic and social benefits.

Description

technical field [0001] The invention relates to network communication, in particular to a method for authenticating the identity of a two-dimensional code issuer based on a reliable digital signature. Background technique [0002] With the rapid popularization of mobile Internet and smart phones, QR codes have gradually integrated into all aspects of public life. However, while QR codes bring various conveniences to our lives, illegal activities such as using QR codes to spread malicious websites and release mobile phone viruses have gradually increased. How to authenticate the identity of the QR code issuer and ensure the non-repudiation of their behavior is of great significance to the legal application of the QR code. [0003] Two-dimensional codes use geometric figures corresponding to "0" and "1" bit streams to represent numerical information, and then arrange these specific geometric figures on a two-dimensional plane according to certain rules to obtain two-dimension...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06K19/06
CPCG06F21/33
Inventor 樊依民顾纯祥
Owner HENAN RONGXIN DATA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products