Data identification method for two-dimension code safety verification

A security verification, two-dimensional code technology, applied in data processing applications, electronic digital data processing, computer security devices, etc., can solve problems affecting user experience, reducing user satisfaction, participation enthusiasm, database server paralysis, etc., to prevent The effect of brute force

Active Publication Date: 2015-08-12
SIGMATRIX TECH CO LTD
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if it is a 100% winning lottery or a large-scale high-value reward lottery, many people may use brute-force cracking programs, that is, specially compile a simulation program, and try to use the program to crack random codes to obtain benefits. In the above-mentioned random code encoding method, the database needs to be queried every time a user accesses. When someone cracks the random code violently, it will cause a large number of database accesses in an instant, thus easily paralyzing the database server.
If you use an operation method similar to that of a desktop computer and let users enter the verification code every time, it will greatly affect the user experience, reduce user satisfaction and participation enthusiasm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data identification method for two-dimension code safety verification
  • Data identification method for two-dimension code safety verification
  • Data identification method for two-dimension code safety verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific technical content of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0037] In order to prevent malicious cracking of random codes through programs, and simulation programs that cause a large number of database accesses, it is easy to paralyze the server. The invention provides a new method for authenticating data, that is, adopting a verification random code in a two-dimensional code. The so-called verification random code is to add a verification code to the random code. After the background server receives the verification random code, it analyzes whether the random code is legal through the verification code. Only the legal verification random code can access the database again. If it fails The random code verified by the check code is returned directly, thus effectively preventing brute force cracking and database paralysis caused by a large number of database acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data identification method for two-dimension code safety verification. The method comprises the following steps of S1, adding a verification code in a character random code to form a byte stream random number, and performing data encryption and data conversion to form a verification random code; S2, combining the verification random code and a URL (Uniform Resource Locator) to form a background visit address, and generating a two-dimension code with the background visit address; S3, scanning the two-dimension code to obtain the verification random code and the URL, restoring the verification random code through decryption to form the character random code and the verification code, and generating a new verification code according to the character random code; and S4, comparing the verification restored by decryption and the new verification code, returning a message of verification failure if the verification restored by decryption and the new verification code are not consistent, and performing next verification operation of the verification restored by decryption and the new verification code are consistent. The method provided by the invention can effectively prevent influences of brute force attack, can prevent database paralysis caused by lots of data access, and can improve the safety of the two-dimension code to a certain extent.

Description

technical field [0001] The invention relates to a data forgery verification method, in particular to a data forgery verification method for two-dimensional code security verification, and belongs to the technical field of anti-counterfeit verification. Background technique [0002] The two-dimensional code is automatically read by image input equipment or photoelectric scanning equipment to realize automatic information processing. It is an important entrance of the mobile phone. Through the two-dimensional code, the mobile phone can quickly access the Internet. With the application of QR codes, various QR code-related products have also emerged in large numbers, such as QR code electronic tickets, QR code vouchers, QR code payment, QR code anti-counterfeiting, QR code traceability, QR code code points, etc. More and more QR codes are applied to fast-moving consumer goods. QR codes are applied to every can of milk powder and every bottle of mineral water. And when two-dime...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06K19/06
CPCG06Q30/0185G06K19/06G06Q30/00G06F21/602G06K19/06037
Inventor 吴林
Owner SIGMATRIX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products