Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server

A server and two-dimensional code technology, applied in the field of information processing, can solve the problems of increasing the cost of reading two-dimensional codes, not being able to guarantee the security of private information, and unfavorable application of two-dimensional codes, so as to reduce generation and reading costs and ensure safety , the effect of expanding the scope of application

Active Publication Date: 2015-02-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The first type of two-dimensional code generation method encrypts private information, so that the information recorded in the generated two-dimensional code contains encrypted private information, and the encrypted private information has the risk of being cracked, and the security of private information cannot be guaranteed. , and the encryption of private information increases the cost of generating two-dimensional codes; the first reading method of two-dimensional codes needs to use the decryption method corresponding to the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0069] Example one

[0070] For private information, the embodiment of the present invention provides a method for generating a two-dimensional code. The method is applicable to a two-dimensional code generation system. The system includes a terminal and a server, and both the terminal and the server are in a network environment. Taking the perspective of the terminal executing the method provided in the embodiment of the present invention as an example, see figure 1 , The method flow includes:

[0071] 101: Obtain the private information input by the user, and send the obtained private information to the server through the network, and the server stores the private information, and generates an information access address corresponding to the private information;

[0072] 102: Receive the information access address returned by the server through the network;

[0073] As an optional embodiment, the information access address returned by the receiving server via the network includes:

[...

Example Embodiment

[0090] Example two

[0091] Regarding the method for generating a two-dimensional code provided in the first embodiment, an embodiment of the present invention provides a method for reading a two-dimensional code, which is suitable for a two-dimensional code reading system, which includes a terminal and a server, and Both the terminal and the server are in a network environment. Taking the perspective of the terminal executing the method provided in the embodiment of the present invention as an example, see image 3 , The method flow includes:

[0092] 301: Obtain a QR code containing an information access address, and scan the QR code to obtain the information access address contained in the QR code, and the information access address is used to access private information;

[0093] 302: Send the information access address to the server via the network, and the server will query the corresponding private information according to the information access address;

[0094] 303: Receive t...

Example Embodiment

[0113] Example three

[0114] The embodiment of the present invention provides a method for generating a two-dimensional code, and the method provided by the embodiment of the present invention is explained in detail in combination with the content of the first embodiment. See Figure 5 , The method flow includes:

[0115] 501: The terminal obtains the private information input by the user, and sends the obtained private information to the server via the network;

[0116] Regarding the manner of obtaining the private information input by the user, this embodiment does not specifically limit it. In specific implementation, including but not limited to providing an information input interface, the input interface also provides a submit button; acquiring information input by the user through the information input interface, and when it is detected that the user clicks the submit button, the user input through the information input interface The information serves as the obtained priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimension code generating method, terminal and server and a two-dimension code reading method, terminal and server, and belongs to the technical field of information processing. The two-dimension code generating method comprises the steps of obtaining privacy information input by a user, sending the privacy information to the two-dimension code generating server through a network, receiving an information access address returned by the server through the network and generating a two-dimension code containing the information access address. The two-dimension code reading method comprises the steps of obtaining the two-dimension code containing the information access address, scanning the two-dimension code to obtain the information access address contained in the two-dimension code, sending the information access address to the two-dimension code reading server through the network, receiving the privacy information returned by the server through the network and using the privacy information as the reading result of the two-dimension code, wherein the information access address is used for enabling the user to have access to privacy information. According to the two-dimension code generating method, terminal and server and the two-dimension code reading method, terminal and server, the information access address is used for replacing the privacy information, so that the security of the privacy information is guaranteed; encryption and decryption are not needed, so that the generating and reading cost of the two-dimension code is reduced, and the application range of the two-dimension-code is widened.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a method for generating and reading a two-dimensional code, a terminal and a server. Background technique [0002] With the continuous development of information processing technology, two-dimensional codes have been widely used due to their wide coding range and strong fault tolerance. QR (Quick Response, quick response) two-dimensional code is a kind of two-dimensional code, and each QR two-dimensional code is represented in the form of an image, and the image is a square array. The generation of two-dimensional codes refers to the conversion of information into images, and the reading of two-dimensional codes refers to the conversion of images into information. Due to the expansion of the application scope of two-dimensional codes, the types and quantities of information recorded in two-dimensional codes are increasing, especially information related to user pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/06G06K7/10G06F17/30H04L29/06
CPCH04L63/10G06F16/9554G06K7/1417G06K19/06037H04L9/0643
Inventor 卜满钊唐文宁黄平杨海松
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products