Trusted two-dimensional code generation method and device, electronic equipment and storage medium

A two-dimensional code and two-dimensional code information technology, applied in the field of communication, can solve the problems of unauthorized access, leakage of user private information, increase of two-dimensional code security problems, etc., and achieve the effect of improving security.

Active Publication Date: 2020-01-10
SICHUAN PANOVASIC TECH +1
View PDF12 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid popularization of QR codes, the security problems of QR codes are increasing day by day. Reports of economic losses caused by scanning QR codes containing security risks such as Trojan horses and viruses are often reported in the newspapers.
[0003] At present, there are mainly two types of security risks of QR codes. The first type is privacy issues, that is, whether private information of users will be leaked along with the spread of QR codes.
The second category is the problem of ultra vires, that is, whether there is an ultra vires operation that violates the user's intention
Although the currently commonly used two-dimensional code security strategies such as signature authentication, release pre-examination, and encryption can improve the security support capabilities of two-dimensional codes such as anti-tampering, anti-reversal, and traceability, they still cannot solve the problem of breaking through network access, hijacking or tampering with data communications. Security risk of means of intercepting and replacing QR codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted two-dimensional code generation method and device, electronic equipment and storage medium
  • Trusted two-dimensional code generation method and device, electronic equipment and storage medium
  • Trusted two-dimensional code generation method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0058] figure 1 The trusted two-dimensional code TV terminal architecture diagram provided for the embodiment of this application, such as figure 1 As shown, a general operating system application environment (Rich Execution Environment, REE) and a trusted execution environment (Trusted Execution Environment, TEE) are simultaneously running in the TV terminal. A common environment in IEDs is REE. In the embodiment of this application, the two-dimensional code application runs in the REE, and the trusted two-dimensional code application runs in the TEE. For example, the third-party communication application WeChat, its online chat function is executed in the REE WeChat application, and its online payment The functions of TEE are executed in the trusted WeChat application in TEE.

[0059] TEE is an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted two-dimensional code generation method and device, electronic equipment and a storage medium. The method comprises the following steps: sending two-dimensional code service information to an application server through a two-dimensional code application, wherein the two-dimensional code service information is obtained after signature by using an application privatekey; receiving two-dimensional code information sent by the application server through the trusted two-dimensional code application, wherein the two-dimensional code information comprises a two-dimensional code URL, and the two-dimensional code information is obtained after the application server encrypts the two-dimensional code URL by using an application public key; decrypting the two-dimensional code information through a trusted two-dimensional code application according to an application private key to obtain the two-dimensional code URL; and generating a corresponding two-dimensional code according to the two-dimensional code URL through the trusted two-dimensional code application. According to the embodiment of the invention, the trusted two-dimensional code application running inthe TEE communicates with the application server, so that the generation of the two-dimensional code is realized, and the TEE provides a secure execution environment for authorizing security software, so that the security of the generation of the two-dimensional code is improved.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, relates to a method, device, electronic equipment, and storage medium for generating a trusted two-dimensional code. Background technique [0002] As the core perception technology of the Internet of Things and an important information portal of the Internet, the two-dimensional code technology has developed rapidly and has gradually penetrated into various fields of the national economy and social life. At present, services such as user registration and payment in the TV system also mostly use QR code scanning. However, with the rapid popularization of QR codes, the security problems of QR codes are increasing day by day. Reports of economic losses caused by scanning QR codes containing security risks such as Trojan horses and viruses are often reported in the newspapers. [0003] At present, there are mainly two types of security risks of QR codes. The fir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06F21/57G06K19/06
CPCH04L9/3247H04L63/0428H04L67/02G06F21/57G06K19/06037
Inventor 翟栋杨超刘建敏周强强
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products