Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A two-dimensional code authentication method, device and computer-readable storage medium

An authentication method and two-dimensional code technology, applied in the field of computer-readable storage media, two-dimensional code authentication methods, and devices, can solve the problem of relying on the security model of the two-dimensional code virus database, unable to prove the source of the two-dimensional code, and unable to guarantee security, etc. question

Active Publication Date: 2020-12-29
CHINA MOBILE COMM GRP CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, Scheme 1 relies on the completeness of the QR code virus database and the effectiveness of the security model, however, it is usually difficult to satisfy both
More importantly, it cannot verify the source of the QR code, so it cannot guarantee security
Solution 2 only solves the problem of information leakage and tampering of the QR code, but still cannot prove whether the source of the QR code is reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-dimensional code authentication method, device and computer-readable storage medium
  • A two-dimensional code authentication method, device and computer-readable storage medium
  • A two-dimensional code authentication method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] An embodiment of the present invention provides a two-dimensional code authentication method, such as figure 1 As shown, the method includes:

[0104] S101. Obtain a platform digital signature and a second key corresponding to the identity feature information of the issuing terminal, and use the second key to encrypt the first sent content feature value to generate a personal digital signature;

[0105] The platform digital signature is obtained by encrypting the platform identification information with the first key;

[0106] Obtaining the platform digital signature and the second key corresponding to the identity feature information of the issuing terminal includes: sending the first communication identification representing the identity feature of the issuing terminal to the authentication platform; receiving the corresponding first communication key sent by the authentication platform; An identified digital certificate and a second key, the digital certificate carr...

Embodiment 2

[0126] An embodiment of the present invention provides a two-dimensional code authentication method, such as figure 2 shown, including:

[0127] S201. Scan the QR code to obtain QR code information including authentication information, where the authentication information includes a platform digital signature, a fourth key, and a personal digital signature;

[0128] Here, the fourth key corresponds to the identity feature information of the issuing terminal.

[0129] After the scanning terminal scans the two-dimensional code issued by the issuing terminal, information about the two-dimensional code is obtained, wherein the information may be unencrypted two-dimensional code information or encrypted two-dimensional code information.

[0130] When the information is encrypted two-dimensional code information, the key for encrypting the two-dimensional code information is the third key corresponding to the identity feature information of the scanning terminal, and the key for d...

Embodiment 3

[0154] The embodiment of the present invention provides a two-dimensional code authentication method, wherein, in the embodiment of the present invention, the complete process of generating and identifying a two-dimensional code is used as a specific application scenario for the two-dimensional code authentication method in the embodiment of the present invention Be explained. Here, the issuing terminal that generates the two-dimensional code and the scanning terminal that recognizes the two-dimensional code are pre-installed with a client that interacts with the authentication platform, so as to obtain the communication identification based on the issuing terminal or scanning terminal through interaction with the authentication platform The key is used to generate or identify the two-dimensional code, and the root certificate of the authentication platform is installed, that is, the first key to decrypt the digital signature of the platform, so as to authenticate the digital s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a QR code authentication method. The method comprises the following steps: acquiring a platform digital signature and a second key corresponding to identity feature informationof a release platform; encrypting the first sending content feature value through a second key to generate personal digital signature, wherein the platform digital signature is obtained by encryptingthe first platform identification information through the first key; determining authentication information including the platform digital signature, a fourth key corresponding to the second key andthe personal digital signature, and generating a QR code based on the QR code information including the authentication information. The invention further discloses a QR code authentication device anda computer readable storage medium.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a two-dimensional code authentication method, device and computer-readable storage medium. Background technique [0002] With the development and popularization of the mobile Internet, the application of QR codes has spread all over the basic necessities of Chinese people. However, while bringing convenience to the lives of the public, its inherent safety hazards cannot be ignored. Security incidents caused by QR codes occur from time to time, which touches the nerves of the public. For example, when a mobile phone user scans a QR code from an unknown source, he may be linked to a malicious website, causing the mobile phone to be infected with a virus or implanted with a Trojan horse, causing unpredictable security risks and economic losses. On the other hand, two-dimensional codes are widely used. If the two-dimensional codes containing user real-name infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCG06F21/33G06F21/62H04L9/0861H04L9/3247
Inventor 龚雪冰吴华挚范敏袁晨光
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products