Construction verification method and device capable of verifying security two-dimensional code offline

A verification method and two-dimensional code technology, applied in the field of offline verification of secure two-dimensional code construction verification, can solve problems such as difficulty in verification of publishing sources, inability to read and verify sources, and verification of two-dimensional code security.

Active Publication Date: 2017-02-22
王栋
View PDF5 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

QR codes are coded in clear codes. Although they have information error-tolerant redundancy checks, the information is easy to be modified and forged, and it is difficult to verify the source of the release.
The current verification methods include two types: one is to use an application system similar to the scan code guard, scan and identify the QR code information, connect to the dedicated server of the application system through the network, and retrieve the QR code URL information and the database records in the server Comparison: If a matching record can be retrieved in the system database, it can be given whether the source of the QR code is safe according to the attributes of the record; if there is no matching record, the security cannot be judged
The other is to encrypt the two-dimensional code information, connect to a dedicated server through the network, read the authentication information, and compare it with the encrypted information in the two-dimensional code for verification; this type of application is a closed system, and the encrypted password The

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction verification method and device capable of verifying security two-dimensional code offline
  • Construction verification method and device capable of verifying security two-dimensional code offline
  • Construction verification method and device capable of verifying security two-dimensional code offline

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0127] The specific implementation steps are as follows:

[0128] 1. Enter the information and type information to be encoded

[0129] The information to be coded includes basic information, target information, and dynamic information. Basic information: Base:{Name:ABC Bank}, target information: OBJ:{URI:https: / / www.abc.com}, dynamic information: DYN:{Created:2016-1-1 12:00 :00|Expired:2026-1-1 12:00:00}. The type information is a public information security QR code.

[0130] Connect the input information with vertical bars and brackets, as shown in Table 1.

[0131] Table 1 Information to be encoded in Example 1

[0132] [OBJ:{URI:https: / / www.abc.com}Base:{Name:ABC Bank}DYN:{Created:2016-1-112:00:00|Expired:2026-1-1 12:00: 00}]

[0133] 2. Perform digital signature operations and encryption operations on the information to be encoded

[0134] Using the SHA256 hash algorithm, the hash value of the information to be encoded in Table 1 is calculated as:

[0135] sha256: 9f2a8e9ace06537b...

Embodiment 2

[0191] The specific implementation steps are as follows:

[0192] 1. Enter the information to be encoded and type information

[0193] The information to be coded includes basic information, target information, and dynamic information. The basic information is: Base:{TaxiID:沪A12345|LicenseID:123456|UserID:12345678|Domain:abcpay.com}, the target information is: OBJ:{URI:https: / / sqr.abcpay.com / zrk1rjziurlr2w3ira}, dynamic The information is: DYN:{Created:2016-1-112:00:00|Expired:2017-1-1 12:00:00}. The type information is a QR code for public information security.

[0194] Connect the input information with vertical bars and brackets, as shown in Table 8.

[0195] Table 8 Information to be encoded in Example 2

[0196] [OBJ:{URI:https: / / sqr.abcpay.com / zrk1rjziurlr2w3ira}Base:{TaxiID:沪A12345|LicenseID:123456|UserID:12345678|Domain:abcpay.com}DYN:{Created:2016-1-1 12:00:00|Expired:2017-1-1 12:00:00}]

[0197] In this embodiment, the encoding information needs to include multi-byte chara...

Embodiment 3

[0226] The specific implementation steps are as follows:

[0227] 1. Enter the information to be encoded and type information

[0228] The information to be coded includes basic information, target information, and dynamic information. The basic information is: Base:{Name:ABC Mall|Addr:No.1288,ABC Rd.,Shanghai|Domain:abcpay.com}, and the target information is: OBJ:{URI:https: / / pay.abcpay.com / dkri67zin9oo8tzxy9ojquz8mcaedhzcljix1jeu}, the dynamic information is: DYN:{Created:2016-5-1 12:00:00|Expired:2016-5-1 12:10:00|PaymentID:e7db7c48642c78a669fd|Total:580.00RMB}. The type information is a QR code for public information security.

[0229] Connect the input information with vertical bars and brackets, as shown in Table 12.

[0230] Table 12 Information to be encoded in Embodiment 3

[0231] [OBJ:{URI:https: / / pay.abcpay.com / dkri67zin9oo8tzxy9ojquz8mcaedhzcljix1jeu}Base:{Name:ABC Mall|Addr:No.1288,ABC Rd.,Shanghai|Domain:abcpay.com}DYN:{Created:2016 -5-1 12:00:00|Expired:2016-5-1 12...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.

Description

Technical field [0001] The invention relates to the field of information technology and security verification, and in particular to a method and device for verifying the structure of a secure two-dimensional code that can be verified offline. Background technique [0002] A two-dimensional code is a specific geometric figure that uses several symbols corresponding to the binary system to be distributed on a two-dimensional plane according to a certain rule to record data information. Two-dimensional codes use graphic symbols to represent text and numerical information. Various symbologies have been developed in terms of symbol representation technology, such as QR Code, Data Matrix, Maxi Code, PDF417 and so on. The two-dimensional code is recognized by image input equipment or photoelectric scanning equipment. It can deal with common problems such as changes in the size of symbols, rotation of graphics, and partial defacement. It realizes automatic identification of encoded infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32G06K19/06G06K17/00
CPCG06K17/00G06K19/06037G06K19/06056H04L9/0861H04L9/3247H04L9/3263
Inventor 王栋
Owner 王栋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products