Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

QR code authentication method, communication equipment and storage medium

An authentication method and two-dimensional code technology, which are applied in the fields of communication equipment and storage media, and two-dimensional code authentication methods, to achieve the effects of avoiding computational burden, improving security, and safe and effective authentication.

Active Publication Date: 2021-11-19
PING AN TECH (SHENZHEN) CO LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides a two-dimensional code authentication method, communication equipment and storage medium to solve the problem of how to improve the security of two-dimensional code use in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • QR code authentication method, communication equipment and storage medium
  • QR code authentication method, communication equipment and storage medium
  • QR code authentication method, communication equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see figure 1 , figure 1 It shows the implementation flowchart of the first two-dimensional code authentication method provided by the embodiment of the present application. The execution body of the method is a user terminal, which includes but not limited to smart phones, tablet computers, notebooks, desktop computers, etc. Such as figure 1 The QR code authentication method shown is detailed as follows:

[0059] In S101, a two-dimensional code is acquired.

[0060] In the embodiment of the present application, the user terminal reads the data of the two-dimensional code by scanning the two-dimensional code. The two-dimensional code can be a two-dimensional code displayed on the display screen of the communication device, or a two-dimensional code printed on paper or other object planes, or a two-dimensional code contained in a picture received by the user terminal itself. code.

[0061] The above-mentioned two-dimensional codes include but are not limited to stack...

Embodiment 2

[0123] see figure 2 , figure 2 It shows the implementation flowchart of the second two-dimensional code authentication method provided by the embodiment of the present application, and the execution body of the method is the server. Such as figure 2 The QR code authentication method shown is detailed as follows:

[0124] In S201, a public key query instruction sent by a user terminal is received.

[0125] Corresponding to step S102 in Embodiment 1, the server may receive a public key query command sent by the user terminal, and the public key query command is an command sent by the user terminal after confirming that the data of the two-dimensional code contains a digital certificate.

[0126] In S202, obtain the server public key pre-stored in the server according to the public key query instruction, and return the server public key to the user terminal, so as to instruct the user terminal to verify the legitimacy of the two-dimensional code.

[0127] After receiving t...

Embodiment 3

[0157] Figure 10 It shows a schematic structural diagram of a first two-dimensional code authentication device provided by the embodiment of the present application. The first two-dimensional code authentication device is applied to a user terminal. part:

[0158] The first two-dimensional code authentication device includes: a two-dimensional code acquisition module 101 , a public key query module 102 , a public key acquisition module 103 , and a two-dimensional code legality verification module 104 . in:

[0159] The two-dimensional code acquisition module 101 is configured to acquire the two-dimensional code.

[0160] The public key query module 102 is configured to send a public key query instruction to the server if the data of the two-dimensional code includes a digital certificate; wherein, the digital certificate includes encoded public key and certificate signature information.

[0161] The public key obtaining module 103 is configured to obtain the server public ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of information security, and provides a QR code authentication method, a communication device and a storage medium, and the QR code authentication method applied to a user terminal comprises the steps: sending a public key query instruction to a server after determining that the data of a QR code comprises a digital certificate, and obtaining a server public key; verifying the validity of the certificate signature information through the server public key: when the server public key confirms that the certificate signature information is legal, determining that the digital certificate is legal, and at the moment, further confirming the validity of the QR code according to the certificate public key in the digital certificate and the QR code signature information of the QR code. According to the embodiment of the invention, the use safety of the QR code can be improved. In a digital medical scene, by using the QR code authentication method provided by the embodiment of the invention, the security and reliability of the obtained medical data can be ensured.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a two-dimensional code authentication method, communication equipment and a storage medium. Background technique [0002] Two-dimensional code is a very popular coding method on mobile devices in recent years. It is widely used because of its advantages of large information capacity, high storage density, ability to represent more data types, low production cost and easy dissemination. . For example, in the field of digital medicine, medical data or access address information of medical data can be encoded into corresponding QR codes, so that patients or doctors can efficiently obtain relevant medical data only by scanning the QR codes. [0003] However, with the widespread use of two-dimensional codes, some illegally forged and untrustworthy two-dimensional codes have also appeared. These illegal two-dimensional codes may carry some wrong information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3263H04L9/3247H04L63/0442H04L63/123
Inventor 尹嘉峻
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products