Two-dimensional-code security protection method and system

A security protection and two-dimensional code technology, applied in the field of two-dimensional code security protection methods and systems, can solve the problems of no unified security authentication method and certification center, two-dimensional code detection cannot be treated differently, unfavorable promotion and use, etc. To achieve the effect of convenient promotion and use, protection and security, and convenient access

Active Publication Date: 2019-03-08
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing security detection is generally integrated within the respective programs, which is not conducive to promotion and use. The detection of QR codes cannot be flexibly treated differently according to the usage scenarios.
For authentication, there is no unified security authentication method and authentication center

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional-code security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] First of all, it needs to be explained that the present invention is an application of computer technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. Everything mentioned in the application documents of the present invention belongs to this category, and the applicant will not list them one by one.

[0058] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0059] For QR code security, it is divided into two types of rectification schemes on a large scale: the first is to do corresponding secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to network security, and aims to provide a two-dimensional-code security protection method and system. The two-dimensional-code security protection method and system can realizeeffect of: 1) using anti-counterfeiting authentication of security encryption on generation of a two-dimensional code; and 2) in a two-dimensional-code use process, carrying out security protection byusing the following steps: L0 security level scanning detection, L1 security level scanning detection, L2 security level scanning detection and L3 security level scanning detection. The method and system can provide multi-dimension multi-level corresponding security means for two-dimensional codes generated in different scenes, different industries and different manners, and are more convenient and faster; and the method and system can carry out real-time security detection for massive two-dimensional codes.

Description

technical field [0001] The invention relates to the field of network security, in particular to a two-dimensional code security protection method and system. Background technique [0002] In recent years, with the development of the mobile Internet, the two-dimensional code, a super-popular coding method on mobile devices, has been widely used in various industries due to its advantages of large data storage capacity, high security, strong resistance to damage, and low cost. Universal application. However, as the information transmission carrier, the two-dimensional code is also facing severe challenges in terms of the security of its use. In recent years, security incidents such as two-dimensional code security incidents have occurred frequently, causing major economic losses to society and seriously threatening the security of cyberspace. Therefore, for large-scale two-dimensional code security detection technology, it has become the preferred method to prevent two-dimen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06G06F21/51G06F21/56
CPCH04L9/0861H04L9/0866H04L63/1441G06F21/51G06F21/562G06F2221/033G06F2221/2119
Inventor 薛磊范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products