Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-dimensional code anti-counterfeiting method, device and system based on security application

A security application, two-dimensional code technology, applied in the field of two-dimensional code anti-counterfeiting methods, equipment and systems, can solve the problem of low security of two-dimensional codes, achieve the effect of improving security and reducing the probability of risk occurrence

Inactive Publication Date: 2019-04-12
ADVANCED NEW TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present application provides a two-dimensional code anti-counterfeiting method, device and system based on security applications, which are used to solve the problem of low security of two-dimensional codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code anti-counterfeiting method, device and system based on security application
  • Two-dimensional code anti-counterfeiting method, device and system based on security application
  • Two-dimensional code anti-counterfeiting method, device and system based on security application

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0059] Such as figure 1 As shown, the implementation of this application discloses a method for distributing certificates for two-dimensional codes, which specifically includes:

[0060] Step S11, the two-dimensional code management server generates an asymmetric key, including the two-dimensional code management server public key Public_Key_Server and the two-dimensional code management server private key Private_Key_Server; in the process of practical application, if the RSA algorithm is used to generate the key, its It generally consists of a public key and a modulus, as well as a private key and a modulus. The modulus is generally 1024 bits or 2048 bits.

[0061]Step S12, the two-dimensional code management server distributes the public key of the two-dimensional code management server to several terminal devices, such as smart phones, tablets, computers, etc., and the terminal devices can use the received two-dimensional code management server public key Public_Key_Server...

no. 2 example

[0094] In real life, QR codes can be used in many scenarios, such as payment scenarios or instant messaging scenarios. The following takes the payment scenario as an example to illustrate the QR code generation process.

[0095] With the progress of society, there are more and more convenience stores, which facilitate people's lives. The code scanning machine in the convenience store can settle the bill for the customer by scanning the bar code on the product purchased by the customer. After the settlement, it can be displayed through the QR code, and the user can scan the QR code to pay.

[0096] After the merchant confirms the settlement on the charged terminal device, the two-dimensional code display module in the terminal device will send a two-dimensional code information data generation request to the two-dimensional code security application, and the request will include information related to the settlement, such as payment collection Party account, amount and other i...

no. 3 example

[0109] In real life, QR codes can be used in many scenarios, such as payment scenarios or instant messaging scenarios. The following takes the instant messaging scene as an example to describe the QR code generation process.

[0110] With the development of mobile Internet, instant messaging software based on wireless Internet technology emerges in an endless stream, such as WeChat, DingTalk and so on. Instant messaging software generally provides the function of adding friends by scanning a QR code or joining a group by scanning a QR code.

[0111] In the prior art, when the two-dimensional code reading device scans the two-dimensional code to obtain relevant data, it does not verify its authenticity, which has potential safety hazards.

[0112] In this application, when a user agrees to add another user as a friend by scanning his own QR code, the QR code display module in the terminal device used by the other user will send the QR code to the QR code security application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimensional code anti-counterfeiting method, device and system based on a security application. The method comprises the steps that a two-dimensional code security application receives a request for generating two-dimensional code information data; the two-dimensional code security application signs the two-dimensional code service information according to the privatekey of the two-dimensional code security application; the two-dimensional code security application sends two-dimensional code information data; wherein the two-dimensional code security applicationis provided with an asymmetric key composed of a public key of the two-dimensional code security application and a private key of the two-dimensional code security application; wherein the two-dimensional code information data comprises two-dimensional code service information and a signature of the two-dimensional code security application to the two-dimensional code service information.

Description

technical field [0001] The present application relates to the field of security, in particular to a two-dimensional code anti-counterfeiting method, device and system based on security applications. Background technique [0002] With the development of the mobile Internet, QR codes have been widely used, such as scanning codes to open shared bicycles, scanning payment and so on. In order to improve the security of QR codes, some companies also provide dynamic QR codes. The data in the dynamic QR codes will be updated over time to display the changing QR codes. However, in the two-dimensional code verification solutions currently on the market, the two-dimensional code information itself has no anti-counterfeiting capability, that is, after the two-dimensional code is parsed by the decoding device, the plain text two-dimensional code data is directly obtained, and the two-dimensional code data and business information data Consistent, the code scanning device cannot locally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00G06Q30/00
CPCG06K17/0022G06Q30/0185
Inventor 孙曦落红卫
Owner ADVANCED NEW TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More