Check patentability & draft patents in minutes with Patsnap Eureka AI!

Two-dimensional code security verification method

A security verification and two-dimensional code technology, applied in security communication devices, user identity/authority verification, payment systems, etc., can solve problems such as property loss, deception, impersonation, etc., and achieve the effect of increasing security and avoiding property loss

Inactive Publication Date: 2018-03-16
厦门吉比特网络技术股份有限公司
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the scammer can quickly send a screenshot of the received QR code (generally, the QR code is valid for 1 minute) to the user, tricking the user into scanning the QR code, so as to impersonate the user to log in or pay. If you scan the static QR code picture sent by the scammer, the account will be logged in by the scammer, resulting in property loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code security verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to elaborate the content of the present invention, the following examples are given for detailed description.

[0014] The invention discloses a safety verification method of a two-dimensional code, which comprises the following steps:

[0015] Step 1. The client initiates a login or transaction security verification request to the server, and the server sends the valid data information of the QR code to the client after receiving the request, for example, text="block=A, account=B, password=C" , while sending the timestamp of the QR code, for example, time=n;

[0016] Step 2. After receiving the QR code data information, the client adds a heartbeat function executed at fixed time intervals to the QR code data information. The heartbeat function combines the effective data information of the QR code with the time stamp to generate a new binary code. QR code string; when the time interval of the heartbeat function is 1 second, the new QR code string generated by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a two-dimensional code security verification method. A timestamp is added to two-dimensional code data information, so that a client can generate a dynamic two-dimensional code changed with time; a mobile phone APP scans the dynamic two-dimensional code for multiple times to perform verification, so that a server adds multiple timestamps of the dynamic two-dimensional codeto perform continuity judgment before performing validity judgment of the two-dimensional code data information; and therefore, the security of two-dimensional code verification is improved and the property loss caused by the fact that an internet user is cheated to scan a two-dimensional code screenshot provided by a cheater can be avoided.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a security verification method of a two-dimensional code. Background technique [0002] At present, in the network, scanning QR codes is generally used for account login verification or payment verification, but these solutions use static QR codes: the client initiates a verification request to the server, and the server generates a unique and fixed QR code The data is returned to the client, and the client converts the data into a fixed QR code image and displays it to the user. In this case, the scammer can quickly send a screenshot of the received QR code (generally, the QR code is valid for 1 minute) to the user, tricking the user into scanning the QR code, so as to impersonate the user to log in or pay. If the static QR code picture sent by the scammer is scanned, the account will be logged in by the scammer, resulting in property loss. Contents of the invention [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/32G06Q20/38H04L9/32
CPCG06Q20/3276G06Q20/38215H04L9/3297
Inventor 王呈徐军董少华
Owner 厦门吉比特网络技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More