Identification code generation method, device, identification code decryption method and device

A technology for identifying codes and generating units, applied to public keys, electrical components, transmission systems, etc. Effect

Inactive Publication Date: 2016-07-13
PEKING UNIV FOUNDER GRP CO LTD +1
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the private code has a certain confidentiality effect, if the private coding engine is leaked or deciphered, anyone who obtains the coding engine can decrypt the private code. It can be seen that the encryption method of the private code is relatively simple, and the confidentiality is relatively strong. weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification code generation method, device, identification code decryption method and device
  • Identification code generation method, device, identification code decryption method and device
  • Identification code generation method, device, identification code decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] This embodiment provides a method for generating an identification code, such as figure 1 Shown include:

[0056] S11. Obtain content to be encrypted. The content to be encrypted may be various business contents, such as certain commodity information, including commodity name, code, quantity and so on.

[0057] S12. Generate a key according to a preset encryption type. The encryption type refers to the method of encrypting the content to be encrypted, or is called an encryption algorithm. In practical applications, an encryption type can be selected according to actual business needs. Preferably, the encryption type includes AES (AdvancedEncryptionStandard), which is an advanced encryption algorithm in cryptography, DES (DataEncryptionStandard), which is a data encryption algorithm, TDES (TripleDataEncryptionAlgorithm), which is a triple data encryption algorithm, or a private encryption algorithm, which is an encryption algorithm. Encryption algorithm created by th...

Embodiment 2

[0066] The present invention also provides a decoding method corresponding to the identification code generated in the first embodiment above, such as figure 2 The method shown includes:

[0067] S21. Obtain an identification code. Specifically, the acquisition method may be scanning and acquisition, and the visible identification code may be converted into a character string after acquisition. Preferably, the identification code may be a two-dimensional code.

[0068] S22. Determine whether the identification code is within the validity period. Specifically, the long character string corresponding to the identification code may be composed of multiple substrings, including a character string used to indicate the validity period, for example, the first four digits of a long character string are a character string indicating the validity period, and its content is A012, According to the recorded validity period data, it can be known that the validity period of the identific...

Embodiment 3

[0077] This embodiment provides an identification code generation device, such as Figure 4 The unit shown consists of:

[0078] A content-to-be-encrypted acquisition unit 41, configured to acquire content to be encrypted;

[0079] A key generating unit 42, configured to generate a key according to a preset encryption type;

[0080] An encryption unit 43, configured to use the key to encrypt the content to be encrypted;

[0081] A character string generating unit 44, configured to generate an identification code character string, the identification code character string including a character string corresponding to the encryption type, the key, and the encrypted encrypted content;

[0082] An identification code generating unit 45, configured to generate an identification code according to the identification code string.

[0083] Preferably, the identification code string generated by the character string generation unit 44 also includes a character string corresponding to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identification code generation method, an identification code generation device, an identification code decryption method and an identification code decryption device. The identification code generation method includes the following steps that: content to be encrypted is obtained; a key is generated according to a preset encryption type; the key is utilized to encrypt the content to be encrypted; an identification code character string is generated, wherein the identification code character string includes the encryption type, the key and a character string corresponding to the encrypted content; and an identification code is generated according to the identification code character string. With the identification code generation method and device as well as the identification code decryption method and device of the invention adopted, the encryption modes of the identification code are richer, and therefore, security strength can be improved.

Description

technical field [0001] The invention relates to information encryption technology, in particular to an identification code generation method and an identification code decryption method and device. Background technique [0002] In the context of the rapid development of informatization, identification codes are widely used. Identification codes are usually attached to objects, people, places, bills and other objects to meet the various business needs of users. For identification code users, part of the identification code attached to the object has certain confidentiality purposes in various businesses, and its real code content can only be obtained under certain conditions, that is, to ensure the security of the identification code in business sex. [0003] At present, identification codes are usually widely used in the form of scannable barcodes, such as two-dimensional barcodes. The use of two-dimensional barcodes can play a certain role in confidentiality. The existing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30
Inventor 沈刚曹开
Owner PEKING UNIV FOUNDER GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products