Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device

An authentication method and authentication device technology, applied in the field of two-dimensional codes, can solve problems such as defrauding users of phone charges, failing to solve the problem of two-dimensional code issuer authentication, and two-dimensional code standards are not easy to implement, so as to achieve improved security and effective authentication Effect

Inactive Publication Date: 2016-05-11
AEROSPACE INFORMATION
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some problems in the current application of QR codes: For example, some people store virus links in QR codes, supplemented with normal introductory texts to induce people to scan, and then engage in activities such as defrauding users of phone charges and installing malware; In code ticket anti-counterfeiting applications, if you want to add quick access links or introductory texts and private data that do not need to be cared about by ticket buyers, it is not easy to implement based on the existing national standard QR code standards, so there will be an application scenario where train tickets are fully encrypted
[0004] The disadvantage of the coding scheme of a two-dimensional code in the above-mentioned prior art is: this method does not solve the issuer authentication problem of the two-dimensional code itself, and enterprises using two-dimensional codes need to develop two-dimensional codes and generate authentication systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device
  • Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device
  • Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] The embodiment of the present invention provides a multi-segment data encoding method in the two-dimensional code through a unique two-dimensional code generation and identification method, which can not only hide the data that does not want to be disclosed, realize the simultaneous preservation of public content and private content in the two-dimensional code, but also realize The legality of the two-dimensional code itself is certified, and it can provide two-dimensional code use services for customers who are unwilling to develop two-dimensional code generation certification or do not have the ability to develop it.

[0050] This embodiment provides a processing flow of a two-dimensional code codec and authentication method as follows: figure 1 As shown, the following processing steps are included:

[0051] Step S110, the two-dimensional code encoding and decoding and authentication method system in the embodiment of the present invention provides users with function...

Embodiment 2

[0077] This embodiment provides a two-dimensional code encoding and decoding and authentication device, and its specific implementation structure is as follows: Figure 4 As shown, it can specifically include the following modules:

[0078] Standard data segment coding module 41, for setting standard coded data segment in the encoded two-dimensional code data;

[0079] The authentication data segment encoding module 42 is used to set the two-dimensional code authentication data segment in the encoded two-dimensional code data, and the standard encoded data segment and the two-dimensional code authentication data segment are divided by two-dimensional code segmentation marks ; Set a two-dimensional code verification identifier in the two-dimensional code authentication data segment, and the two-dimensional code verification identifier is used to verify that the encoded two-dimensional code data is issued by a designated two-dimensional code issuer.

[0080] Further, the authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a two-dimensional code coding-and-decoding and authentication method and a two-dimensional code coding-and-decoding and authentication device. The two-dimensional code coding-and-decoding and authentication method mainly comprises the steps of setting a standard coded data segment and a two-dimensional code authentication data segment in coded two-dimensional code data, wherein the standard coded data segment is separated from the two-dimensional code authentication data segment through two-dimensional code segmenting marks; and setting a two-dimensional code verification mark in the two-dimensional code authentication data segment, wherein the two-dimensional code verification mark is used for verifying whether the coded two-dimensional code data are issued by a preset two-dimensional code issuing party. The two-dimensional code coding-and-decoding and authentication method and the two-dimensional code coding-and-decoding and authentication device have advantages of effectively improving safety in accessing the two-dimensional code, conveniently and effectively performing authentication on the validity of the two-dimensional code, simultaneously accommodating an open content and a private content in the two-dimensional code data, hiding the private content, and realizing no identification for existence of the private content, and realizing no use experience reduction.

Description

technical field [0001] The invention relates to the technical field of two-dimensional codes, in particular to a method and device for encoding, decoding and authenticating two-dimensional codes. Background technique [0002] Two-dimensional code technology is widely used in many fields such as network access, fast payment, and ticket anti-counterfeiting. However, there are some problems in the current application of QR codes: For example, some people store virus links in QR codes, supplemented with normal introductory texts to induce people to scan, and then engage in activities such as defrauding users of phone charges and installing malware; In code ticket anti-counterfeiting applications, if you want to add quick access links or introductory texts and private data that do not need to be cared about by ticket buyers, it is not easy to implement based on the existing national standard QR code standards, so there will be an application scenario where train tickets are fully...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K19/06
Inventor 王启刚王占厚
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products