Two-dimensional code anti-counterfeiting method, device and system based on security application
A security application, two-dimensional code technology, applied in the field of two-dimensional code anti-counterfeiting methods, equipment and systems, can solve the problem of low security of two-dimensional codes, achieve the effect of improving security and reducing the probability of risk occurrence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0059] Such as figure 1 As shown, the implementation of this application discloses a method for distributing certificates for two-dimensional codes, which specifically includes:
[0060] Step S11, the two-dimensional code management server generates an asymmetric key, including the two-dimensional code management server public key Public_Key_Server and the two-dimensional code management server private key Private_Key_Server; in the process of practical application, if the RSA algorithm is used to generate the key, its It generally consists of a public key and a modulus, as well as a private key and a modulus. The modulus is generally 1024 bits or 2048 bits.
[0061]Step S12, the two-dimensional code management server distributes the public key of the two-dimensional code management server to several terminal devices, such as smart phones, tablets, computers, etc., and the terminal devices can use the received two-dimensional code management server public key Public_Key_Server...
no. 2 example
[0094] In real life, QR codes can be used in many scenarios, such as payment scenarios or instant messaging scenarios. The following takes the payment scenario as an example to illustrate the QR code generation process.
[0095] With the progress of society, there are more and more convenience stores, which facilitate people's lives. The code scanning machine in the convenience store can settle the bill for the customer by scanning the bar code on the product purchased by the customer. After the settlement, it can be displayed through the QR code, and the user can scan the QR code to pay.
[0096] After the merchant confirms the settlement on the charged terminal device, the two-dimensional code display module in the terminal device will send a two-dimensional code information data generation request to the two-dimensional code security application, and the request will include information related to the settlement, such as payment collection Party account, amount and other i...
no. 3 example
[0109] In real life, QR codes can be used in many scenarios, such as payment scenarios or instant messaging scenarios. The following takes the instant messaging scene as an example to describe the QR code generation process.
[0110] With the development of mobile Internet, instant messaging software based on wireless Internet technology emerges in an endless stream, such as WeChat, DingTalk and so on. Instant messaging software generally provides the function of adding friends by scanning a QR code or joining a group by scanning a QR code.
[0111] In the prior art, when the two-dimensional code reading device scans the two-dimensional code to obtain relevant data, it does not verify its authenticity, which has potential safety hazards.
[0112] In this application, when a user agrees to add another user as a friend by scanning his own QR code, the QR code display module in the terminal device used by the other user will send the QR code to the QR code security application ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



